Abstract
In recent years, many researchers have studied reversible watermarking techniques for relational databases. Most of the developed schemes have been based on a primary key attribute in order to determine the selected tuples and attributes to carry the watermark bits. What happens, however, when the primary key attribute does not exist for a relational database? In this paper, we propose a blind robust reversible watermarking scheme for a textual relational database. This scheme does not rely on the primary key attribute. To avoid the absolute dependence on the primary key attribute, as in existing schemes, in the proposed scheme the content of textual attributes are used to generate the virtual primary attribute that is applied in tuple and attribute selections. Moreover, the selection of attributes does not depend on the order of attributes in the relational database. Model and robustness analysis demonstrate that our proposed scheme achieves a high resilience against different types of tuple attacks, i.e., tuple attacks and attribute attacks. The experimental results also confirm that the proposed scheme is more secure and robust than other existing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: schemes and specialties. IEEE Trans. Dependable Secur. Comput. 2(1), 34–45 (2005)
Li, Y., Swarup, V., Jajodia, S.: Constructing a virtual primary key for fingerprinting relational data. In: Proceedings of the ACM Workshop Digital Rights Management (DRM), pp. 133–141 (2003)
Mansouri, A., Aznaveh, A.M., Torkamani, F., Kurugollu, F.: A low complexity video watermarking in H.264 compressed domain. IEEE Trans. Inf. Forensics Secur. 5(4), 649–657 (2010)
Kang, X.G., Yang, R., Huang, J.W.: Geometric invariant audio watermarking based on an LCM feature. IEEE Trans. Multimed. 13(2), 181–190 (2011)
Nguyen, T.S., Chang, C.C., Chung, T.F.: A tamper-detection scheme for BTC-compressed images with high-quality images. KSII Trans. Internet Inf. Syst. 8(6), 2005–2012 (2014)
Mali, M.L., Patil, N.N., Patil, J.B.: Implementation of text watermarking technique using natural language watermarks. In: International Conference on Communication Systems and Network Technologies (CSNT), pp. 482–486 (2013)
Nguyen, T.S., Chang, C.C., Lin, M.C.: Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding. Smart Comput. Rev. 4(3), 230–245 (2014)
Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proceedings of the 28th International Conference on Very Large Databases, pp. 155–166 (2002)
Sion, R., Atallah, M., Prabhakar, S.: Rights protection for categorical data. IEEE Trans. Knowl. Data Eng. 17(7), 912–926 (2005)
Al-Haj, A., Odeh, A.: Robust and blind watermarking of relational database systems. J. Comput. Sci. 4(12), 1024–1029 (2008)
Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. 20(1), 116–129 (2008)
Farfoura, M.E., Horng, S.J., Lai, J.L., Run, R.S., Chen, R.J., Khan, M.K.: A blind reversible method for watermarking relational databases based on a time-stamping. Expert Syst. Appl. 39, 3185–3196 (2012)
Chang, C.C., Nguyen, T.S., Lin, C.C.: A blind reversible robust watermarking scheme for relational database. Sci. World J. 2013, 1–12 (2013)
Rao, U.P., Patel, D.R., Vikani, P.M.: Relational database watermarking for ownership protection. In: 2nd International Conference on Communication, Computing & Security, India, pp. 988–995 (2012)
Prasannakumari, V.: A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inf. Technol. 1(3), 115–121 (2009)
Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modification in database relation. Sci. World J. 2013, 1–16 (2013)
Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252–264. Springer, Heidelberg (2009)
Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16, 721–730 (2007)
Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chang, CC., Nguyen, TS., Lin, CC. (2015). A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)