Advertisement

Relational Database, XML, and Ontology Watermarking

  • Mohammad Ali Nematollahi
  • Chalee Vorakulpipat
  • Hamurabi Gamboa Rosales
Chapter
Part of the Springer Topics in Signal Processing book series (STSP, volume 11)

Abstract

Today, digital watermarking technology has emerged as an effective tool for relational databases and eXtensible Mark-up Language (XML) data in order to protect the copyright, detect tamper, trace traitor, and maintain the integrity of the data.

Keywords

Hash Function Relational Database Watermark Technique Linear Feedback Shift Register Watermark Extraction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Halder, R., S. Pal, and A. Cortesi. 2010. Watermarking techniques for relational databases: Survey, classification and comparison. Journal of UCS 16(21): 3164–3190.Google Scholar
  2. 2.
    Agrawal, R., P.J. Haas, and J. Kiernan. 2003. A system for watermarking relational databases. In Proceedings of the 2003 ACM SIGMOD international conference on management of data. ACM.Google Scholar
  3. 3.
    Agrawal, R., P.J. Haas, and J. Kiernan. 2003. Watermarking relational data: Framework, algorithms and analysis. The VLDB Journal 12(2): 157–169.CrossRefGoogle Scholar
  4. 4.
    Agrawal, R., and J. Kiernan, 2002. Watermarking relational databases. In Proceedings of the 28th international conference on Very Large Data Bases (pp. 155–166). VLDB Endowment.Google Scholar
  5. 5.
    Li, Y., V. Swarup, and S. Jajodia. 2003. Constructing a virtual primary key for fingerprinting relational data, 133–141. Workshop: In Digital Rights Management.Google Scholar
  6. 6.
    Al-Haj, A., and A. Odeh. 2008. Robust and blind watermarking of relational database systems.Google Scholar
  7. 7.
    Prasannakumari, V. 2009. A robust tamperproof watermarking for data integrity in relational databases. Research Journal of Information Technology 1(3): 115–121.CrossRefGoogle Scholar
  8. 8.
    Pournaghshband, V. 2008. A new watermarking approach for relational data. In Proceedings of the 46th annual southeast regional conference on XX. ACM.Google Scholar
  9. 9.
    Li, Y., H. Guo, and S. Jajodia. 2004. Tamper detection and localization for categorical data using fragile watermarks. In Proceedings of the 4th ACM workshop on digital rights management. ACM.Google Scholar
  10. 10.
    Bhattacharya, S., and A. Cortesi. 2009. A distortion free watermark framework for relational databases. In ICSOFT (2).Google Scholar
  11. 11.
    Li, Y. 2008. Database watermarking: A systematic view. In Handbook of database security, 329–355. Springer.Google Scholar
  12. 12.
    Tsai, M.-H., et al. 2007. Fragile database watermarking for malicious tamper detection using support vector regression. In Third international conference on intelligent information hiding and multimedia signal processing, 2007. IIHMSP 2007. IEEE.Google Scholar
  13. 13.
    Li, Y., and R.H. Deng. 2006. Publicly verifiable ownership protection for relational databases. In Proceedings of the 2006 ACM symposium on information, computer and communications security. ACM.Google Scholar
  14. 14.
    Kamel, I. 2009. A schema for protecting the integrity of databases. Computers & Security, 28(7): 698–709.Google Scholar
  15. 15.
    Qin, Z., et al. 2006. Watermark based copyright protection of outsourced database. In 10th International on database engineering and applications symposium, 2006. IDEAS’06. IEEE.Google Scholar
  16. 16.
    Wang, C., et al. 2008. Atbam: An arnold transform based method on watermarking relational data. In 2008 International conference on multimedia and ubiquitous engineering. IEEE.Google Scholar
  17. 17.
    Hu, Z., Z. Cao, and J. Sun. 2009. An image based algorithm for watermarking relational databases. In International conference on measuring technology and mechatronics automation, 2009. ICMTMA’09. IEEE.Google Scholar
  18. 18.
    Zhang, Y., et al. 2006. Relational databases watermark technique based on content characteristic. In First international conference on innovative computing, information and control, 2006. ICICIC’06. IEEE.Google Scholar
  19. 19.
    Zhang, Y., X. Niu, and D. Zhao. 2005. A method of protecting relational databases copyright with cloud watermark. International Journal of Information and Communication Engineering 1(7): 337–341.Google Scholar
  20. 20.
    Huang, M., et al. 2004. A new watermark mechanism for relational data. In Null. IEEE.Google Scholar
  21. 21.
    Zhou, X., et al. 2005. Wmxml: A system for watermarking xml data. In Proceedings of the 31st international conference on very large data bases. VLDB Endowment.Google Scholar
  22. 22.
    Rane, M.P.B., and B. Meshram. Xml-Based security for e-commerce application. Google Scholar
  23. 23.
    Gross-Amblard, D. 2011. Query-preserving watermarking of relational databases and xml documents. ACM Transactions on Database Systems (TODS) 36(1): 3.CrossRefGoogle Scholar
  24. 24.
    Romaric, T., E. Damiani, and N. Bennani. 2012. Robust XML watermarking using fuzzy queries. In 2012 IEEE 36th annual on computer software and applications conference workshops (COMPSACW). IEEE.Google Scholar
  25. 25.
    Mat Kiah, M., et al. 2011. A review of audio based steganography and digital watermarking. International Journal of Physical Sciences. 6(16): 3837–3850.Google Scholar
  26. 26.
    Franco-Contreras, J., et al. 2014. Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records. In 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE.Google Scholar
  27. 27.
    Suchanek, F.M., D. Gross-Amblard, and S. Abiteboul. 2011. Watermarking for ontologies. In The semantic web–ISWC 2011, 697–713. Springer.Google Scholar
  28. 28.
    Pazienza, M.T., A. Stellato, and A. Turbati. 2008. Linguistic watermark 3.0: An RDF framework and a software library for bridging language and ontologies in the semantic web. In SWAP.Google Scholar
  29. 29.
    Kong, H., et al. 2009. Techniques for owl-based ontology watermarking. In WRI global congress on intelligent systems, 2009. GCIS’09. IEEE.Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2017

Authors and Affiliations

  • Mohammad Ali Nematollahi
    • 1
  • Chalee Vorakulpipat
    • 1
  • Hamurabi Gamboa Rosales
    • 2
  1. 1.National Electronics and Computer Technology Center (NECTEC)PathumthaniThailand
  2. 2.Universidad Autónoma de ZacatecasZacatecasMexico

Personalised recommendations