Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2006: Data and Applications Security XX pp 74–88Cite as

  1. Home
  2. Data and Applications Security XX
  3. Conference paper
Xml Streams Watermarking

Xml Streams Watermarking

  • Julien Lafaye18 &
  • David Gross-Amblard18 
  • Conference paper
  • 601 Accesses

  • 4 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4127)

Abstract

Xml streams are valuable, continuous, high-throughput sources of information whose owners must be protected against illegal redistributions. Watermarking is a known technique for hiding copyrights marks within documents, thus preventing redistributions. Here, we introduce a watermarking algorithm for Xml streams so that (i) the watermark embedding and detection processes are done online and use only a constant memory, (ii) the stream distortion is controlled, (iii) the type of the stream is preserved and finally (iv) the detection procedure does not require the original stream. We also evaluate, analytically and experimentally, the robustness of the algorithm against watermark removal attempts.

Keywords

  • Watermark Scheme
  • News Item
  • Watermark Embedding
  • Covered Edge
  • Constant Memory

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Work supported by the ACI Sécurité & Informatique TADORNE grant (2004-2007).

Chapter PDF

Download to read the full chapter text

References

  1. CNN RSS, http://www.cnn.com/services/rss/

  2. Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking Relational Data: Framework, Algorithms and Analysis. VLDB J 12(2), 157–169 (2003)

    CrossRef  Google Scholar 

  3. Arasu, A., Babcock, B., Babu, S., Datar, M., Ito, K., Motwani, R., Nishizawa, I., Srivastava, U., Thomas, D., Varma, R., Widom, J.: STREAM: The Stanford Stream Data Manager. IEEE Data Eng. Bull. 26(1), 19–26 (2003)

    Google Scholar 

  4. Camelia Constantin, D.G.-A., Guerrouani, M.: Watermill: an optimized fingerprinting tool for highly constrained data. In: ACM Workshop on Multimedia and Security (MMSec), August 1-2, 2005, pp. 143–155 (2005)

    Google Scholar 

  5. Gottlob, G., Koch, C., Pichler, R.: Efficient algorithms for processing xpath queries. ACM Trans. Database Syst. 30(2), 444–491 (2005)

    CrossRef  Google Scholar 

  6. Gross-Amblard, D.: Query-preserving watermarking of relational databases and XML documents. In: Symposium on Principles of Database Systems, pp. 191–201. ACM Press, New York (2003)

    Google Scholar 

  7. Gross-Amblard, D., Lafaye, J.: Xml streams watermarking. Technical report, CEDRIC, CEDRIC TR-976 (2005)

    Google Scholar 

  8. Hoeffding, W.: Probability Inequalities for Sums of Bounded Random Variables. Journal of the American Statistical Association 58(301), 13–30 (1963)

    CrossRef  MathSciNet  MATH  Google Scholar 

  9. Inoue, S., Makino, K., Murase, I., Takizawa, O., Matsumoto, T., Nakagawa, H.: Proposal on information hiding method using xml. In: The 1st Workshop on NLP and XML (2001)

    Google Scholar 

  10. Levenshtein, V.: Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady 10(7), 707–710 (1966)

    MathSciNet  MATH  Google Scholar 

  11. Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: Schemes and specialties. IEEE Trans. Dependable Sec. Comput. 2(1), 34–45 (2005)

    CrossRef  Google Scholar 

  12. Ludäscher, B., Mukhopadhyay, P., Papakonstantinou, Y.: A Transducer-Based XML Query Processor. In: VLDB, pp. 227–238 (2002)

    Google Scholar 

  13. Ng, W., Lau, H.L.: Effective approaches for watermarking XML data. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol. 3453, pp. 68–80. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  14. Radu Sion, M.A., Prabhakar, S.: Resilient information hiding for abstract semi-structures. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 141–153. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  15. Segoufin, L., Vianu, V.: Validating Streaming XML Documents. In: Symposium on Principles of Database Systems, pp. 53–64 (2002)

    Google Scholar 

  16. Sion, R., Atallah, M., Prabhakar, S.: Resilient Rights Protection for Sensor Streams. In: Proc. of the 30th International Conference on Very Large Data Bases, Toronto (2004)

    Google Scholar 

  17. Zhou, X., Pang, H., Tan, K.-L., Mangla, D.: Wmxml: A system for watermarking xml data. In: VLDB, pp. 1318–1321 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Laboratoire CEDRIC (EA 1395) – CC 432, Conservatoire national des arts et métiers, 292 rue Saint Martin, 75141 Cedex 3, PARIS, France

    Julien Lafaye & David Gross-Amblard

Authors
  1. Julien Lafaye
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. David Gross-Amblard
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Italy

    Ernesto Damiani

  2. The Logistics Institute, Northeastern University, Shenyang, China

    Peng Liu

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 IFIP International Federation for Information Processing

About this paper

Cite this paper

Lafaye, J., Gross-Amblard, D. (2006). Xml Streams Watermarking. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_6

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11805588_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36796-3

  • Online ISBN: 978-3-540-36799-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature