Abstract
Recently, several database watermarking techniques have been developed to fight against database piracy. In watermarking, a database owner’s identification information is embedded into a database such that proof of ownership can be established by detecting the information in pirated data. However, most watermarking systems are vulnerable to the severe threat of additive attacks and this threat has not been studied formally. In an additive attack, a pirate inserts an additional watermark such that the proof of ownership becomes ambiguous. In this paper, we present an effective approach to defending against additive attacks. Our strategy is to raise the errors introduced during watermark insertion to a predetermined threshold such that any additive attack would introduce more errors than the threshold. Exceeding the error threshold means that the pirated data is less useful or less competitive; thus, the owner does not need to claim ownership for such pirated data.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. Agrawal, P. J. Haas, and J. Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): 157–169, 2003.
R. Agrawal and J. Kiernan. Watermarking relational databases. In Proceedings of VLDB, pages 155–166, 2002.
Harald Cramer. Mathematical Methods of Statistics. Princeton University Press, 1946.
S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, 16(4):573–586, 1998.
D. Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of ACM Symposium on Principles of Database Systems (PODS), pages 191–201, 2003.
Y. Li, V. Swarup, and S. Jajodia. Constructing a virtual primary key for fingerprinting relational data. In Proceedings of ACM Workshop on Digital Rights Management (DRM), October 2003.
Y. Li, V. Swarup, and S. Jajodia. A robust watermarking scheme for relational data. In the Thirteenth Annual Workshop on Information Technologies and Systems (WITS), pages 195–200, December, 2003.
SIIA. Database protection: Making the case for a new federal database protection law. http://www.siia.net/sharecontent/govt/issues/ip/dbbrief.html.
R. Sion. Proving ownership over categorical data. In Proc. IEEE International Conference on Data Engineering, pages 584–596, 2004.
R. Sion, M. Atallah, and S. Prabhakar. Rights protection for relational data. In Proceedings of ACM SIGMOD International Conference on Management of Data, pages 98–108, 2003.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this paper
Cite this paper
Li, Y., Swarup, V., Jajodia, S. (2004). Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. In: Farkas, C., Samarati, P. (eds) Research Directions in Data and Applications Security XVIII. IFIP International Federation for Information Processing, vol 144. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8128-6_6
Download citation
DOI: https://doi.org/10.1007/1-4020-8128-6_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8127-9
Online ISBN: 978-1-4020-8128-6
eBook Packages: Springer Book Archive