Database Watermarking Algorithm Based on Difference Expansion

  • HaoYang Gao
  • De LiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1084)


Database watermarking technology is an important means to protect database information security. Firstly, the key components of the database are divided into several sub-groups by using the key hash function. Then, the size of the Pearson correlation coefficient is used in the sub-group to be selected the attribute column to be embedded in the watermark, and then the threshold is set by the differential expansion algorithm to determine the final embedded watermark. The pair of attributes, embedding in the virtual watermark repeatedly in the position that satisfies the condition. By setting the threshold, the embedding amount of the watermark is reduced, and the robustness of the watermark is improved. The loss of the original data of the database is guaranteed, and the watermark and the watermark extraction rate are better when attacked. When the attack ratio is low, the data recovery effect is better.


Database watermark Correlation coefficient Hash function Difference expansion algorithm 



This research project was supported by the National Natural Science Foundation of China (Grant No. 61262090).


  1. 1.
    Tsai, P., Hu, Y., Yeh, H.: Reversible image hiding scheme using predictive coding and histogram shifting. Sig. Process. 89(6), 1129–1143 (2009)CrossRefGoogle Scholar
  2. 2.
    Voyatzis, G., Piatas, I.: The use of watermarks in the protection of digital multimedia products. Proc. IEEE 87(7), 1197–1207 (1999)CrossRefGoogle Scholar
  3. 3.
    Zhang, M.: Current status and prospects of database security research. Proc. Chin. Acad. Sci. 26(3), 303–309 (2011)Google Scholar
  4. 4.
    Feng, D.G., Zhang, M., Li, W.: Big data security and privacy protection. Chin. J. Comput. 37(1), 246–258 (2014)Google Scholar
  5. 5.
    Mehta, B.B., Aswar, H.D.: Watermarking for security in database: a review. In: IT in Business, Industry and Government, Indore, India, pp. 1–6. IEEE (2014)Google Scholar
  6. 6.
    Jawad, K., Khan, A.: Genetic algorithm and difference expansion based reversible watermarking for relational databases. J. Syst. Softw. 86(11), 2742–2753 (2013)CrossRefGoogle Scholar
  7. 7.
    Iftikhar, S., Kamran, M., Anwar, Z.: A robust and reversible watermarking technique for relational data. IEEE Trans. Knowl. Data Eng. 27(4), 1132–1145 (2015)CrossRefGoogle Scholar
  8. 8.
    Jun, T.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13, 890–896 (2003)CrossRefGoogle Scholar
  9. 9.
    Zhang, Y., Yang, B., Niu, X.M.: Reversible watermarking for relational database authentication. J. Comput. 17(2), 59–66 (2006)Google Scholar
  10. 10.
    Zhou, X., Huang, M., Peng, Z.: An additive-attack-proof watermarking mechanism for databases copyrights protection using image. In: Proceedings of the ACM Symposium on Applied Computing (SAC 2007), pp. 254–258 (2007)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer ScienceYanbian UniversityYanjiChina

Personalised recommendations