Watermarking for Ontologies

  • Fabian M. Suchanek
  • David Gross-Amblard
  • Serge Abiteboul
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7031)

Abstract

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

Keywords

Security Parameter Open World Fact Pair Secure Hash Function Television Episode 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking Relational Data: Framework, Algorithms and Analysis. VLDB J. 12(2), 157–169 (2003)CrossRefGoogle Scholar
  2. 2.
    Auer, S., Bizer, C., Kobilarov, G., Lehmann, J., Cyganiak, R., Ives, Z.G.: DBpedia: A Nucleus for a Web of Open Data. In: Aberer, K., Choi, K.-S., Noy, N., Allemang, D., Lee, K.-I., Nixon, L.J.B., Golbeck, J., Mika, P., Maynard, D., Mizoguchi, R., Schreiber, G., Cudré-Mauroux, P. (eds.) ASWC 2007 and ISWC 2007. LNCS, vol. 4825, pp. 722–735. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Bizer, C., Heath, T., Idehen, K., Berners-Lee, T.: Linked data on the Web. In: Proceedings of the International Conference on World Wide Web (WWW), pp. 1265–1266. ACM, New York (2008)Google Scholar
  4. 4.
    Carroll, J.J., Bizer, C., Hayes, P., Stickler, P.: Named graphs, provenance and trust. In: WWW 2005: Proceedings of the 14th International Conference on World Wide Web, pp. 613–622. ACM, New York (2005)Google Scholar
  5. 5.
    Grimm, S., Wissmann, J.: Elimination of Redundancy in Ontologies. In: Antoniou, G., Grobelnik, M., Simperl, E., Parsia, B., Plexousakis, D., De Leenheer, P., Pan, J. (eds.) ESWC 2011, Part I. LNCS, vol. 6643, pp. 260–274. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  6. 6.
    Kong, H., Xue, G., Tian, K., Yao, S.: Techniques for owl-based ontology watermarking. In: WRI Global Congress on Intelligent Systems (GCIS), Xiamen, pp. 582–586 (2009)Google Scholar
  7. 7.
    Lafaye, J., Gross-Amblard, D., Constantin, C., Guerrouani, M.: Watermill: An optimized fingerprinting system for databases under constraints. IEEE Trans. Knowl. Data Eng. (TKDE) 20(4), 532–546 (2008)CrossRefGoogle Scholar
  8. 8.
    Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: Schemes and specialties. IEEE Trans. Dependable Sec. Comput. (TDSC) 2(1), 34–45 (2005)CrossRefGoogle Scholar
  9. 9.
    Matuszek, C., Cabral, J., Witbrock, M., Deoliveira, J.: An introduction to the syntax and content of cyc. In: Proceedings of the AAAI Spring Symposium on Formalizing and Compiling Background Knowledge and Its Applications to Knowledge Representation and Question Answering, pp. 44–49. AAAI Press, Menlo Park (2006)Google Scholar
  10. 10.
    Niles, I., Pease, A.: Towards a standard upper ontology. In: Proceedings of the international conference on Formal Ontology in Information Systems, pp. 2–9. ACM, New York (2001)Google Scholar
  11. 11.
    Noy, N., Fergerson, R., Musen, M.: The knowledge Model of Protégé-2000: Combining Interoperability and Flexibility. In: Dieng, R., Corby, O. (eds.) EKAW 2000. LNCS (LNAI), vol. 1937, pp. 17–32. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  12. 12.
    Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. (TKDE) 20(1), 116–129 (2008)CrossRefGoogle Scholar
  13. 13.
    Sion, R., Atallah, M., Prabhakar, S.: Resilient Information Hiding for Abstract Semi-Structures. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 141–153. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Sion, R., Atallah, M., Prabhakar, S.: Protecting rights over relational data using watermarking. IEEE Trans. Knowl. Data Eng. TKDE 16(12), 1509–1525 (2004)Google Scholar
  15. 15.
    Suchanek, F.M., Kasneci, G., Weikum, G.: YAGO: A core of semantic knowledge - unifying WordNet and Wikipedia. In: Williamson, C.L., Zurko, M.E., Patel-Schneider, P.J., Shenoy, P.F. (eds.) Proceedings of the International Conference on World Wide Web (WWW), Banff, Canada, pp. 697–706. ACM (2007)Google Scholar
  16. 16.
    Wikipedia. CSPRNG (2011)Google Scholar
  17. 17.
    Wikipedia. One-way function (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Fabian M. Suchanek
    • 1
  • David Gross-Amblard
    • 1
    • 2
  • Serge Abiteboul
    • 1
  1. 1.INRIA SaclayParisFrance
  2. 2.LE2I CNRS, Université de BourgogneDijonFrance

Personalised recommendations