Content Characteristics Based Robust Watermarking for Relational Database: A New Approach to Database Security

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Digital data such as text, relational database, audio, video and software are intellectual property of creators/ writers/owners. The database services have become easily available and economical since the booming of internet. However, their outsourcing through the internet accompanies multiple threats like copying, modifying as well as unauthorized distribution. Relational Database has a wide-spread use in many real-life applications, hence, it is essential to maintain integrity and provide copyright protection. To counter the threats, watermarking techniques have been playing a vital role since the last decade. As a security measure, Relational Database Watermarking is becoming more popular and strengthened day-by-day. This is also one of the upcoming areas of interest among researchers of the Database Security. A technique earlier used for Image Watermarking is applied to watermark Relational Databases. In Image Watermarking technique, a pixel or a pair of pixels must satisfy certain characteristics. Usually, database watermarking techniques concentrate on hiding a watermark in database. Extraction and matching of hidden watermark with original watermark confirms ownership of database. This paper demonstrates the use of image watermarking technique for relational databases. Here we align some properties of attributes of database by changing some bit(s) in attribute value. Using secret key, we have ensured that values of two attributes of a tuples satisfy some bit-similarity property and to do so, we slightly alter values of attributes. Detection of such characteristic in a database using secret key can be done easily to verify the presence of a watermark.



  • Keywords

    Relational database, audio, video and software.

  • References

      [1] F. Petitcolas, Watermarking schemes evaluation. IEEE Signal Processing, vol. 17,110.5, pp.58-64, 2000.

      [2] Agarwal, R., &Kiernan, J. Watermarking Relational Databases. InVLDB '02 Proceedings of the 28th international conference on Very Large Data Bases(pp.155-166). ACM, 2002.

      [3] Al-Haj, A., Odeh, A. (2008). Robust and Blind Watermarking of Relational Database Systems. Journal of Computer Science, 4 (12) 2008, pp.1024-1029.

      [4] Bhattacharya, S.,and Agostino, C. A Distortion Free Watermarking Framework for Relational Databases. In Proceedings of the 4th International Conference on Software and Data Technologies(ICSOFT ’09) (pp.229–234). Sofia, Bulgaria: INSTICC Press.

      [5] Dong,X., Li,X., Ge,Y.,and Lei, Z.(2009). An Algorithm Resistive to Invertibility Attack in Watermarking Relational Databases. IEEE Control and decision conference, China, 2009 (pp. 1532-1537).

      [6] Hu,Z., Cao,Z., and Sun,J. An Image Based Algorithm For Watermarking Relational Database. International Conference on Measuring Technology and Mechatronics Automation, 2009 (pp. 425-428).IEEE.

      [7] Mustafa Bilgehan Imamoglu, Mustafa Ulutas, and Guzin Ulutas, , A New Reversible Database Watermarking Approach Firefly Optimization Algorithm. Mathematical Problems in Engineering, Volume 2017, Article ID 1387375.

      [8] Pournaghshband, V. A New Watermarking Approach for Relational Data. In Proceedings of the 46th Annual Southeast Regional Conference on XX (ACM-SE ’08), (pp.127–131), Auburn, Alabama. ACM Press.

      [9] Sion, R., Atallah, M., and Prabhakar,S. On Watermarking Numeric Sets. InProceedings of the 1st international conference on Digital Watermarking (IWDW’02)(pp.130-146).ACM.

      [10] Unnikrishnan K., Pramod K. V., Dynamic Prediction Based Watermarking for Temporal Relational Databases. IEEE International Conference on Data Science and Engineering (ICDSE) 2016.

      [11] Wang,H., Cui,Z. &Cao,Z. A Speech Based Algorithm for Watermarking Relational Databases.In Proceedings of the 2008 International Symposiums on Information Processing (ISIP ’08), (pp.603–606), Moscow, Russia. IEEE Computer Society.

      [12] Xiang, Z., Huang,M., &Peng, Z. An Additive-attack-proof Watermarking Mechanism for Databases Copyrights Protection Using Image. In Proceedings of the 2007 ACM symposium on Applied computing (SAC ’07),(pp. 254–258), Seoul, Korea. ACM.




Article ID: 12694
DOI: 10.14419/ijet.v7i1.9.12694

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.