A Persistent Public Watermarking of Relational Databases

  • Raju Halder
  • Agostino Cortesi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6503)


In this paper, we propose a novel fragile and robust persistent watermarking scheme for relational databases that embeds both private and public watermarks where the former allows the owner to prove his ownership, while the latter allows any end-user to verify the correctness and originality of the data in the database without loss of strength and security. The public watermarking is based on a part of the database state which remains invariant under processing of the queries associated with the database, whereas the private watermarking is based on an appropriate form of the original database state, called abstract database, and the semantics-based properties of the data which remain invariant under processing of the associated queries.


Watermarking Databases Abstraction 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12(2), 157–169 (2003)CrossRefGoogle Scholar
  2. 2.
    Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252–264. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Chen, L., Miné, A., Cousot, P.: A sound floating-point polyhedra abstract domain. In: Ramalingam, G. (ed.) APLAS 2008. LNCS, vol. 5356, pp. 3–18. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  4. 4.
    Guo, H., Li, Y., Liua, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences 176, 1350–1378 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Halder, R., Cortesi, A.: Abstract interpretation for sound approximation of database query languages. In: Proceedings of the IEEE 7th International Conference on INFOrmatics and Systems (INFOS 2010), Advances in Data Engineering and Management Track, Cairo, Egypt, March 28-30, pp. 53–59. IEEE Catalog Number: IEEE CFP1006J-CDR (2010)Google Scholar
  6. 6.
    Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of the IEEE International Conference on Advances in Communication, Network, and Computing (CNC 2010), October 4-5. IEEE CS, Calicut (2010)Google Scholar
  7. 7.
    Halder, R., Dasgupta, P., Naskar, S., Sarma, S.S.: An internet-based ip protection scheme for circuit designs using linear feedback shift register (lfsr)-based locking. In: Proceedings of the 22nd ACM/IEEE Annual Symposium on Integrated Circuits and System Design (SBCCI 2009), August 31-September 3. ACM Press, Natal (2009)Google Scholar
  8. 8.
    Halder, R., Cortesi, A.: Observation-based fine grained access control for relational databases. In: Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT 2010), July 22-24, vol. 24, pp. 254–265. INSTICC, Athens (2010)Google Scholar
  9. 9.
    Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), pp. 78–89. ACM, Taiwan (2006)CrossRefGoogle Scholar
  10. 10.
    Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management (DRM 2004), pp. 73–82. ACM, Washington (2004)CrossRefGoogle Scholar
  11. 11.
    Lin, E., Delp, E.: A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop (ACM Multimedia 1999), Orlando, pp. 25–29 (1999)Google Scholar
  12. 12.
    Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)CrossRefzbMATHGoogle Scholar
  13. 13.
    Miné, A.: The octagon abstract domain. Higher Order Symbol. Comput. 19(1), 31–100 (2006)CrossRefzbMATHGoogle Scholar
  14. 14.
    Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–180. Academic Press, New York (1978)Google Scholar
  15. 15.
    Tsai, M.H., Tseng, H.Y., Lai, C.Y.: A database watermarking technique for temper detection. In: Proceedings of the 2006 Joint Conference on Information Sciences (JCIS 2006), October 8-11. Atlantis Press, Kaohsiung (2006)Google Scholar
  16. 16.
    Zhang, Y., Niu, X., Zhao, D., Li, J., Liu, S.: Relational databases watermark technique based on content characteristic. In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), October 16, pp. 677–680. IEEE CS, Beijing (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Raju Halder
    • 1
  • Agostino Cortesi
    • 1
  1. 1.Dipartimento di InformaticaUniversità Ca’ Foscari di VeneziaItaly

Personalised recommendations