Abstract
In this paper, we adapt the robust Quantization Index Modulation (QIM) originally proposed by Chen and Wornell for images to the protection of relational databases. In order to embed a bit of the watermark, we modulate the relative angular position of the circular histogram center of mass of one numerical attribute. We experimentally verify the suitability of our scheme in terms of distortion, robustness and complexity within the framework of one medical database of more than one half million of inpatient hospital stay records. Our solution is very robust against most common database attacks (tuple deletion and insertion and attribute value modifications), and the embedded message can be error free retrieved even after a suppression or addition of \(80\,\%\) of the database tuples, making it suitable for database copyright protection, owner identification and traitor tracing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Allen, H., Gearan, P., Rexer, K.: 5th annual rexer analytics data miner survey. In: Predictive Analytics World (2011)
Harvard Business Review Analytic Services: The evolution of decision making: How leading organizations are adopting a data-driven culture (2012)
McNickle, M.: Top 10 data security breaches in 2012. In: Healthcare Finance News. Accessed 21 March 2014
Rogers, S.: Wikileaks embassy cables: download the key data and see how it breaks down. In: The Gurdian. Accessed 21 March 2014
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2008)
Agrawal, R., Kiernan, J.: Chapter 15 - watermarking relational databases. In: International Conference on Very Large Databases VLDB 2002, pp. 155–166. Morgan Kaufmann (2002)
Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Trans. Knowl. Data Eng. 16(12), 1509–1525 (2004)
Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. ACM Trans. Database Syst. 36, 3:1–3:24 (2011)
Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. 20, 116–129 (2008)
Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: schemes and specialties. IEEE Trans. Dependable Secure Comput. 2(1), 34–45 (2005)
Franco-Contreras, J., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397–410 (2014)
Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: ACM Workshop on DRM, pp. 73–82 (2004)
Kamel, I., Kamel, K.: Toward protecting the integrity of relational databases. In: 2011 World Congress on Internet Security (WorldCIS), pp. 258–261. IEEE (2011)
Coatrieux, G., Chazard, E., Beuscart, R., Roux, C.: Lossless watermarking of categorical attributes for verifying medical data base integrity. In: 2011 IEEE EMBC, pp. 8195–8198. IEEE (2011)
Franco-Contreras, J., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C.: Authenticity control of relational databases by means of lossless watermarking based on circular histogram modulation. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol. 8203, pp. 207–222. Springer, Heidelberg (2013)
Zhang, Y., Niu, X., Yang, B.: Reversible watermarking for relational database authentication. J. Comput. 17(2), 59–65 (2006)
Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 222–236. Springer, Heidelberg (2009)
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (1999)
Acknowledgments
This work was supported by the French Armaments Procurement Agency (DGA) - Project DGA RAPID FRAG&TAG - and by the Brittany Region Council. The authors are very grateful to the Department of Medical Information and Archives, CHU Lille; UDSL EA 2694; Univ Lille Nord de France; F-59000 Lille, France, for the experimental data used in this study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Franco-Contreras, J., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C. (2015). Adapted Quantization Index Modulation for Database Watermarking. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)