Skip to main content

Advertisement

Log in

Watermarking relational databases using bacterial foraging algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The main aspect of database protection is to prove the ownership of data that describes who is the originator of data. It is of particular importance in the case of electronic data, as data sets are often modified and copied without proper citation or acknowledgement of originating data set. We present a novel method for watermarking relational databases for identification and proof of ownership based on the secure embedding of blind and multi-bit watermarks using Bacterial Foraging Algorithm (BFA). Feasibility of BFA implementation is shown in the framed watermarking databases application. Identification of owner is cryptographically made secure and used as an embedded watermark. An improved hash partitioning approach is used that is independent of primary key of the database to secure ordering of the tuples. Strength of BFA is explored to make the technique robust, secure and imperceptible. BFA is implemented to give nearly global optimal values bounded by data usability constraints and thus makes database fragile to any attack. The parameters of BFA are tuned to reduce the execution time. BFA is experimentally proved to be better solution than Genetic Algorithm (GA). The technique proposed is experimentally proved to be resilient against malicious attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Agrawal R, Haas PJ, Kiernan J (2003) Watermarking relational data: framework, algorithms and analysis. VLDB J 12(2):157–169

    Article  Google Scholar 

  2. Ali YH, Mahdi BH (2011) Watermarking for relational database by using threshold generator. Eng Tech J 29(1):33–43

    Google Scholar 

  3. Ali A-H, Odeh A (2008) Robust and blind watermarking of relational database systems. J Comput Sci 4(12):1024–1029

    Article  Google Scholar 

  4. Bhattacharya S, Cortesi A (2009) A distortion free watermark framework for relational databases. In: Shishkov B, Cordeiro J, Ranchordas A (eds) ICSOFT 2009: Proceedings of the 4th international conference on software and data technologies, vol 2, Sofia, Bulgaria, INSTICC Press, pp 229–234

  5. Chen X, Chen P, He Y, Li L (2008) A self-resilience digital image watermark based on relational database. Int Symp Knowl Acquis Model 698–702

  6. Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan Kaufmann, Academic Press

  7. Cui H, Cui X, Meng M (2008) A public key cryptography based algorithm for watermarking relational databases. Proc IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, 1344–1347. doi:10.1109/IIH-MSP.2008.194

  8. Farfoura ME, Shi-Jinn H, Jui-Lin L, Ray-Shine R, Rong-Jian C, Khan MK (2012) A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst Appl 39(3):3185–3196

    Article  Google Scholar 

  9. Gupta VK (1997) Copyright issues relating to database use. DESlDOC Bull Inf Technol 17(4):11–16

    Article  Google Scholar 

  10. Hanmandlu M, Verma OP, Kumar NK, Kulkarni M (2009) A novel optimal fuzzy system for color image enhancement using bacterial foraging. IEEE Trans Instrum Meas 58(8):2867–2879

    Article  Google Scholar 

  11. Hanyurwimfura D, Liu Y, Liu Z (2010) Text format based relational database watermarking for non-numeric data. Proc IEEE International Conference on Computer Design and Applications (ICCDA), vol 4. Qinhuangdao, 312–316. doi:10.1109/ICCDA.2010.5541119

  12. Jiang C, Chen X, Li Z (2009) Watermarking relational databases for ownership protection based on DWT. Proc Fifth Int Conf Fifth International Conference on Information Assurance and Security, vol 1. Xi'an, 305–308. doi:10.1109/IAS.2009.220

  13. Khanduja V, Verma OP (2012) Identification and proof of ownership by watermarking relational databases. Int J Inf Electron Eng 2(2):274–277

    Google Scholar 

  14. Min H, Jia-heng C, Zhi-yong P, Cheng Z (2004) A new mechanism based on similar clouds watermark for database’s information security. Wuhan University. J Nat Sci 9(4):415–419. doi:10.1007/BF02830434

    Google Scholar 

  15. Mishra S (2005) A hybrid least square-fuzzy bacterial foraging strategy for harmonic estimation. IEEE Trans Evol Comput 9(1):61–73

    Article  Google Scholar 

  16. National geochemical survey database of the US, http://tin.er.usgs.gov/geochem/

  17. Odeh A, Al-Haj Ali (2008) Watermarking relational database systems. First International Conference on the Applications of Digital Information and Web Technologies, Ostrava, 270–274. doi:10.1109/ICADIWT.2008.4664357

  18. Passino KM (2002) Biomimmicry of bacterial foraging for distributed optimization and control. IEEE Control Syst Mag 22(3):52–67

    Article  MathSciNet  Google Scholar 

  19. Sardroudi HM, Ibrahim S (2010) A new approach for relational database watermarking using image. 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), Seoul, 606–610. doi:10.1109/ICCIT.2010.5711126

  20. Schneier B (2008) Applied cryptography, protocols, algorithms and source code in C. Wiley-India

  21. Shehab M, Bertino E, Ghafoor A (2008) Watermarking relational databases using optimization-based techniques. IEEE Trans Knowl Data Eng 20(1):116–129

    Article  Google Scholar 

  22. Silberschatz A, Korth HF, Sudarshan S (2005) Database system concepts. McGraw-Hill Int. Edition

  23. Sion R, Atallah M, Prabhakar S (2004) Rights protection for relational data. IEEE Trans Knowl Data Eng 16(12):1509–1525

    Article  Google Scholar 

  24. Stalling W (2006) Cryptography and network security- principles and practices. PHI

  25. Sun J, Cao Z, Hu Z (2008) Multiple watermarking relational databases using image. Proc IEEE Int Conf MultiMedia Inf Technol 373–376

  26. Tripathy M, Mishra S (2006) Bacteria foraging: a new tool for simultaneous robust design of UPFC controllers. International Joint Conference on Neural Networks (IJCNN). Vancouver, BC, 2274–2280. doi:10.1109/IJCNN.2006.247025

  27. Tripathy M, Mishra S, Lai LL, Zhang QP (2006) Transmission loss reduction based on FACTS and bacteria foraging algorithm. Lect Notes Comput Sci 4193:222–231

    Article  Google Scholar 

  28. Verma OP, Hanmandlu M, Kumar P, Chhabra S, Jindal A (2011) A novel bacterial foraging technique for edge detection. Pattern Recognit Lett 32(8):1187–1196

    Article  Google Scholar 

  29. Zhang Z-H, Jin X-M, Wan J-M (2004) Watermarking relational database using image. Proc IEEE Third International Conference on Machine Learning and Cybernetics, vol 3. 1739–1740. doi:10.1109/ICMLC.2004.1382056

  30. Zhang Y, Niu X, Zhao D (2005) A method of protecting relational databases copyright with cloud watermark. World Acad Sci Eng Technol 3:170–174

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vidhi Khanduja.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Khanduja, V., Verma, O.P. & Chakraverty, S. Watermarking relational databases using bacterial foraging algorithm. Multimed Tools Appl 74, 813–839 (2015). https://doi.org/10.1007/s11042-013-1700-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1700-9

Keywords

Navigation