A Persistent Public Watermarking of Relational Databases
In this paper, we propose a novel fragile and robust persistent watermarking scheme for relational databases that embeds both private and public watermarks where the former allows the owner to prove his ownership, while the latter allows any end-user to verify the correctness and originality of the data in the database without loss of strength and security. The public watermarking is based on a part of the database state which remains invariant under processing of the queries associated with the database, whereas the private watermarking is based on an appropriate form of the original database state, called abstract database, and the semantics-based properties of the data which remain invariant under processing of the associated queries.
KeywordsWatermarking Databases Abstraction
Unable to display preview. Download preview PDF.
- 5.Halder, R., Cortesi, A.: Abstract interpretation for sound approximation of database query languages. In: Proceedings of the IEEE 7th International Conference on INFOrmatics and Systems (INFOS 2010), Advances in Data Engineering and Management Track, Cairo, Egypt, March 28-30, pp. 53–59. IEEE Catalog Number: IEEE CFP1006J-CDR (2010)Google Scholar
- 6.Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of the IEEE International Conference on Advances in Communication, Network, and Computing (CNC 2010), October 4-5. IEEE CS, Calicut (2010)Google Scholar
- 7.Halder, R., Dasgupta, P., Naskar, S., Sarma, S.S.: An internet-based ip protection scheme for circuit designs using linear feedback shift register (lfsr)-based locking. In: Proceedings of the 22nd ACM/IEEE Annual Symposium on Integrated Circuits and System Design (SBCCI 2009), August 31-September 3. ACM Press, Natal (2009)Google Scholar
- 8.Halder, R., Cortesi, A.: Observation-based fine grained access control for relational databases. In: Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT 2010), July 22-24, vol. 24, pp. 254–265. INSTICC, Athens (2010)Google Scholar
- 11.Lin, E., Delp, E.: A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop (ACM Multimedia 1999), Orlando, pp. 25–29 (1999)Google Scholar
- 14.Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–180. Academic Press, New York (1978)Google Scholar
- 15.Tsai, M.H., Tseng, H.Y., Lai, C.Y.: A database watermarking technique for temper detection. In: Proceedings of the 2006 Joint Conference on Information Sciences (JCIS 2006), October 8-11. Atlantis Press, Kaohsiung (2006)Google Scholar
- 16.Zhang, Y., Niu, X., Zhao, D., Li, J., Liu, S.: Relational databases watermark technique based on content characteristic. In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), October 16, pp. 677–680. IEEE CS, Beijing (2006)Google Scholar