Abstract
A new copyright declaration method for leaked numeric data is proposed. The proposed method embeds an elaborate rights witness into the to-be-protected numeric data to generate the resulting protected numeric data. Once the protected numeric data are leaked or stealthily copied for illegitimate uses, our method is able to extract the embedded rights witness that can be derived from the values of copied numeric data to declare the copyright. The rights witness is derived based on polynomial interpolation which provides the trustworthy security in the proposed method. Experimental results and discussions are provided to prove the feasibility and effectiveness of the proposed method.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Xiao, X., Sun, X., Chen, M.: Second-LSB-dependent robust watermarking for relational database. In: Proceedings of IEEE 3rd International Symposium on Information Assurance and Security (IAS 2007), Manchester, United Kingdom, pp. 292–300 (2007)
Bertino, E., Ooi, B.C., Yang, Y., Deng, R.H.: Privacy and ownership preserving of outsourced medical data. In: Proceedings of IEEE International Conference on Data Engineering (ICDE), Tokyo, Japan, pp. 521–532, April 2005
Farfoura, M.E., Horng, S.J., Lai, J.L., Run, R.S., Chen, R.J., Khan, M.K.: A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst. Appl. 39(3), 3185–3196 (2012)
Farfoura, M.E., Horng, S.J.: A novel blind reversible method for watermarking relational databases. In: Proceedings of IEEE International Conference on Parallel and Distributed Processing with Applications (ISPA),Taipei, Taiwan, pp. 563–569, September 2010
Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. In: Proceedings of ACM SIGMOD, San Diego, USA, pp. 98–109, June 2003
Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Trans. Knowl. Data Eng. 16(12), 1509–1525 (2004)
Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization based techniques. IEEE Trans. Knowl. Data Eng. 20(1), 51–52 (2008)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Lee, C.W.: A secret transmission method via numeric data with a blind authentication capability. Multimed. Tools Appl. (2017). https://doi.org/10.1007/s11042-017-5231-7
Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 405–414 (2004)
Lee, C.W., Tsai, W.H.: A covert communication method via spreadsheets by secret sharing with a self-authentication capability. J. Syst. Softw. 86(2), 324–334 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Lee, CW. (2019). Copyright Declaration for Leaked Numeric Data. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-02683-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-02683-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02682-0
Online ISBN: 978-3-030-02683-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)