Copyright Declaration for Leaked Numeric Data

  • Che-Wei LeeEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 881)


A new copyright declaration method for leaked numeric data is proposed. The proposed method embeds an elaborate rights witness into the to-be-protected numeric data to generate the resulting protected numeric data. Once the protected numeric data are leaked or stealthily copied for illegitimate uses, our method is able to extract the embedded rights witness that can be derived from the values of copied numeric data to declare the copyright. The rights witness is derived based on polynomial interpolation which provides the trustworthy security in the proposed method. Experimental results and discussions are provided to prove the feasibility and effectiveness of the proposed method.


Copyright protection Numeric data Data security Ownership assertion 


  1. 1.
    Xiao, X., Sun, X., Chen, M.: Second-LSB-dependent robust watermarking for relational database. In: Proceedings of IEEE 3rd International Symposium on Information Assurance and Security (IAS 2007), Manchester, United Kingdom, pp. 292–300 (2007)Google Scholar
  2. 2.
    Bertino, E., Ooi, B.C., Yang, Y., Deng, R.H.: Privacy and ownership preserving of outsourced medical data. In: Proceedings of IEEE International Conference on Data Engineering (ICDE), Tokyo, Japan, pp. 521–532, April 2005Google Scholar
  3. 3.
    Farfoura, M.E., Horng, S.J., Lai, J.L., Run, R.S., Chen, R.J., Khan, M.K.: A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst. Appl. 39(3), 3185–3196 (2012)CrossRefGoogle Scholar
  4. 4.
    Farfoura, M.E., Horng, S.J.: A novel blind reversible method for watermarking relational databases. In: Proceedings of IEEE International Conference on Parallel and Distributed Processing with Applications (ISPA),Taipei, Taiwan, pp. 563–569, September 2010Google Scholar
  5. 5.
    Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. In: Proceedings of ACM SIGMOD, San Diego, USA, pp. 98–109, June 2003Google Scholar
  6. 6.
    Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Trans. Knowl. Data Eng. 16(12), 1509–1525 (2004)CrossRefGoogle Scholar
  7. 7.
    Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization based techniques. IEEE Trans. Knowl. Data Eng. 20(1), 51–52 (2008)CrossRefGoogle Scholar
  8. 8.
    Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Lee, C.W.: A secret transmission method via numeric data with a blind authentication capability. Multimed. Tools Appl. (2017). Scholar
  10. 10.
    Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 405–414 (2004)CrossRefGoogle Scholar
  11. 11.
    Lee, C.W., Tsai, W.H.: A covert communication method via spreadsheets by secret sharing with a self-authentication capability. J. Syst. Softw. 86(2), 324–334 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.National Kaohsiung University of Science and TechnologyKaohsiungTaiwan

Personalised recommendations