Skip to main content

A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Included in the following conference series:

Abstract

In recent years, many researchers have studied reversible watermarking techniques for relational databases. Most of the developed schemes have been based on a primary key attribute in order to determine the selected tuples and attributes to carry the watermark bits. What happens, however, when the primary key attribute does not exist for a relational database? In this paper, we propose a blind robust reversible watermarking scheme for a textual relational database. This scheme does not rely on the primary key attribute. To avoid the absolute dependence on the primary key attribute, as in existing schemes, in the proposed scheme the content of textual attributes are used to generate the virtual primary attribute that is applied in tuple and attribute selections. Moreover, the selection of attributes does not depend on the order of attributes in the relational database. Model and robustness analysis demonstrate that our proposed scheme achieves a high resilience against different types of tuple attacks, i.e., tuple attacks and attribute attacks. The experimental results also confirm that the proposed scheme is more secure and robust than other existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: schemes and specialties. IEEE Trans. Dependable Secur. Comput. 2(1), 34–45 (2005)

    Article  Google Scholar 

  2. Li, Y., Swarup, V., Jajodia, S.: Constructing a virtual primary key for fingerprinting relational data. In: Proceedings of the ACM Workshop Digital Rights Management (DRM), pp. 133–141 (2003)

    Google Scholar 

  3. Mansouri, A., Aznaveh, A.M., Torkamani, F., Kurugollu, F.: A low complexity video watermarking in H.264 compressed domain. IEEE Trans. Inf. Forensics Secur. 5(4), 649–657 (2010)

    Article  Google Scholar 

  4. Kang, X.G., Yang, R., Huang, J.W.: Geometric invariant audio watermarking based on an LCM feature. IEEE Trans. Multimed. 13(2), 181–190 (2011)

    Article  Google Scholar 

  5. Nguyen, T.S., Chang, C.C., Chung, T.F.: A tamper-detection scheme for BTC-compressed images with high-quality images. KSII Trans. Internet Inf. Syst. 8(6), 2005–2012 (2014)

    Article  Google Scholar 

  6. Mali, M.L., Patil, N.N., Patil, J.B.: Implementation of text watermarking technique using natural language watermarks. In: International Conference on Communication Systems and Network Technologies (CSNT), pp. 482–486 (2013)

    Google Scholar 

  7. Nguyen, T.S., Chang, C.C., Lin, M.C.: Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding. Smart Comput. Rev. 4(3), 230–245 (2014)

    Article  Google Scholar 

  8. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proceedings of the 28th International Conference on Very Large Databases, pp. 155–166 (2002)

    Google Scholar 

  9. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for categorical data. IEEE Trans. Knowl. Data Eng. 17(7), 912–926 (2005)

    Article  Google Scholar 

  10. Al-Haj, A., Odeh, A.: Robust and blind watermarking of relational database systems. J. Comput. Sci. 4(12), 1024–1029 (2008)

    Article  Google Scholar 

  11. Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. 20(1), 116–129 (2008)

    Article  Google Scholar 

  12. Farfoura, M.E., Horng, S.J., Lai, J.L., Run, R.S., Chen, R.J., Khan, M.K.: A blind reversible method for watermarking relational databases based on a time-stamping. Expert Syst. Appl. 39, 3185–3196 (2012)

    Article  Google Scholar 

  13. Chang, C.C., Nguyen, T.S., Lin, C.C.: A blind reversible robust watermarking scheme for relational database. Sci. World J. 2013, 1–12 (2013)

    Google Scholar 

  14. Rao, U.P., Patel, D.R., Vikani, P.M.: Relational database watermarking for ownership protection. In: 2nd International Conference on Communication, Computing & Security, India, pp. 988–995 (2012)

    Google Scholar 

  15. Prasannakumari, V.: A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inf. Technol. 1(3), 115–121 (2009)

    Article  Google Scholar 

  16. Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modification in database relation. Sci. World J. 2013, 1–16 (2013)

    Google Scholar 

  17. Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252–264. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  18. Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16, 721–730 (2007)

    Article  MathSciNet  Google Scholar 

  19. Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chang, CC., Nguyen, TS., Lin, CC. (2015). A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics