Skip to main content

A Generic Distortion Free Watermarking Technique for Relational Databases

  • Conference paper
Information Systems Security (ICISS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5905))

Included in the following conference series:

Abstract

In this paper we introduce a distortion free watermarking technique for relational databases based on the Abstract Interpretation framework. The watermarking technique is partition based. The partitioning can be seen as a virtual grouping, which does not change neither the value of the table’s elements nor their physical positions. Instead of inserting the watermark directly to the database partition, we treat it as an abstract representation of that concrete partition, such that any change in the concrete domain reflects in its abstract counterpart. The main idea is to generate a binary image of the partition as a watermark of that partition, that serves as ownership proof as well as tamper detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: 28th Int. Conference on Very Large Databases, Hong Kong, pp. 155–166 (2002)

    Google Scholar 

  2. Al-Haj, A., Odeh, A.: Robust and blind watermarking of relational database systems. Journal of Computer Science 4(12), 1024–1029 (2008)

    Article  Google Scholar 

  3. Bhattacharya, S., Cortesi, A.: A distortion free watermarking framework for relational databases. In: Proc. 4th International Conference on Software and Data technology, ICSOFT 2009, Sofia, Bulgaria, pp. 229–234 (2009)

    Google Scholar 

  4. Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Trans. Software Eng. 28, 735–746 (2000)

    Article  Google Scholar 

  5. Cousot, P.: Abstract interpretation based formal methods and future challenges. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 138–156. Springer, Heidelberg (2001)

    Google Scholar 

  6. Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: POPL 1977: Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pp. 238–252. ACM Press, New York (1977)

    Chapter  Google Scholar 

  7. Cousot, P., Cousot, R.: Abstract interpretation frameworks. Journal of Logic and Computation 2, 511–547 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  8. Cox, I.: Digital Watermarking: Principles and Practice. Morgan Kaufman Publ. Inc., San Francisco (2001)

    Google Scholar 

  9. Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. In: Proc. of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, San Diego, CA, USA, June 9-12, pp. 191–201 (2003)

    Google Scholar 

  10. de Haan, L., Koppelaars, T.: Applied Mathematics for Database Professionals. Apress, Berkely (2007)

    Google Scholar 

  11. Sushil, Z.J., Duric, J.N.F.: Information hiding: steganography and watermarking. In: Attacks and countermeasures. Kluwer Academic Publishers, Dordrecht (2000)

    Google Scholar 

  12. Mineta, N.Y., Shavers, C.L., Kammer, R.G., Mehuron, W.: The keyed-hash message authentication code (HMAC). Federal Information Process Standards Publication (2002)

    Google Scholar 

  13. Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)

    Google Scholar 

  14. Sion, R.: Proving ownership over categorical data, vol. 0, p. 584. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  15. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data, vol. 16, pp. 1509–1525. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhattacharya, S., Cortesi, A. (2009). A Generic Distortion Free Watermarking Technique for Relational Databases. In: Prakash, A., Sen Gupta, I. (eds) Information Systems Security. ICISS 2009. Lecture Notes in Computer Science, vol 5905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10772-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10772-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10771-9

  • Online ISBN: 978-3-642-10772-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics