Skip to main content

Adapted Quantization Index Modulation for Database Watermarking

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Included in the following conference series:

  • 1264 Accesses

Abstract

In this paper, we adapt the robust Quantization Index Modulation (QIM) originally proposed by Chen and Wornell for images to the protection of relational databases. In order to embed a bit of the watermark, we modulate the relative angular position of the circular histogram center of mass of one numerical attribute. We experimentally verify the suitability of our scheme in terms of distortion, robustness and complexity within the framework of one medical database of more than one half million of inpatient hospital stay records. Our solution is very robust against most common database attacks (tuple deletion and insertion and attribute value modifications), and the embedded message can be error free retrieved even after a suppression or addition of \(80\,\%\) of the database tuples, making it suitable for database copyright protection, owner identification and traitor tracing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Allen, H., Gearan, P., Rexer, K.: 5th annual rexer analytics data miner survey. In: Predictive Analytics World (2011)

    Google Scholar 

  2. Harvard Business Review Analytic Services: The evolution of decision making: How leading organizations are adopting a data-driven culture (2012)

    Google Scholar 

  3. McNickle, M.: Top 10 data security breaches in 2012. In: Healthcare Finance News. Accessed 21 March 2014

    Google Scholar 

  4. Rogers, S.: Wikileaks embassy cables: download the key data and see how it breaks down. In: The Gurdian. Accessed 21 March 2014

    Google Scholar 

  5. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2008)

    Google Scholar 

  6. Agrawal, R., Kiernan, J.: Chapter 15 - watermarking relational databases. In: International Conference on Very Large Databases VLDB 2002, pp. 155–166. Morgan Kaufmann (2002)

    Google Scholar 

  7. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Trans. Knowl. Data Eng. 16(12), 1509–1525 (2004)

    Article  Google Scholar 

  8. Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. ACM Trans. Database Syst. 36, 3:1–3:24 (2011)

    Article  Google Scholar 

  9. Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. 20, 116–129 (2008)

    Article  Google Scholar 

  10. Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: schemes and specialties. IEEE Trans. Dependable Secure Comput. 2(1), 34–45 (2005)

    Article  Google Scholar 

  11. Franco-Contreras, J., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397–410 (2014)

    Article  Google Scholar 

  12. Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: ACM Workshop on DRM, pp. 73–82 (2004)

    Google Scholar 

  13. Kamel, I., Kamel, K.: Toward protecting the integrity of relational databases. In: 2011 World Congress on Internet Security (WorldCIS), pp. 258–261. IEEE (2011)

    Google Scholar 

  14. Coatrieux, G., Chazard, E., Beuscart, R., Roux, C.: Lossless watermarking of categorical attributes for verifying medical data base integrity. In: 2011 IEEE EMBC, pp. 8195–8198. IEEE (2011)

    Google Scholar 

  15. Franco-Contreras, J., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C.: Authenticity control of relational databases by means of lossless watermarking based on circular histogram modulation. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol. 8203, pp. 207–222. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. Zhang, Y., Niu, X., Yang, B.: Reversible watermarking for relational database authentication. J. Comput. 17(2), 59–65 (2006)

    Google Scholar 

  17. Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 222–236. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  18. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (1999)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by the French Armaments Procurement Agency (DGA) - Project DGA RAPID FRAG&TAG - and by the Brittany Region Council. The authors are very grateful to the Department of Medical Information and Archives, CHU Lille; UDSL EA 2694; Univ Lille Nord de France; F-59000 Lille, France, for the experimental data used in this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gouenou Coatrieux .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Franco-Contreras, J., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C. (2015). Adapted Quantization Index Modulation for Database Watermarking. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics