Advertisement

Robust Numeric Set Watermarking: Numbers Don’t Lie

  • Gaurav Gupta
  • Josef Pieprzyk
  • Mohan Kankanhalli
Part of the Communications in Computer and Information Science book series (CCIS, volume 130)

Abstract

Ever since Cox et. al published their paper, “A Secure, Robust Watermark for Multimedia” in 1996 [6], there has been tremendous progress in multimedia watermarking. The same pattern re-emerged with Agrawal and Kiernan publishing their work “Watermarking Relational Databases” in 2001 [1]. However, little attention has been given to primitive data collections with only a handful works of research known to the authors [11, 10]. This is primarily due to the absence of an attribute that differentiates marked items from unmarked item during insertion and detection process. This paper presents a distribution-independent, watermarking model that is secure against secondary-watermarking in addition to conventional attacks such as data addition, deletion and distortion. The low false positives and high capacity provide additional strength to the scheme. These claims are backed by experimental results provided in the paper.

Keywords

Watermark Scheme Watermark Detection False Positive Probability Watermark Insertion Watermark Capacity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proceedings of the 28th International Conference on Very Large Databases, VLDB (2002)Google Scholar
  2. 2.
    Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 185–199. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 180–191. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Bors, A., Pitas, I.: Image watermarking using dct domain constraints. In: Proceedings of IEEE International Conference on Image Processing (ICIP 1996), vol. III, pp. 231–234 (September 1996)Google Scholar
  5. 5.
    Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: Proceedings of Principles of Programming Languages 1999, POPL 1999, pp. 311–324 (1999)Google Scholar
  6. 6.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: A secure, robust watermark for multimedia. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 185–206. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  7. 7.
    Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio, and video. In: IEEE International Conference on Image Processing (ICIP 1996), vol. III, pp. 243–246 (1996)Google Scholar
  8. 8.
    Gupta, G., Pieprzyk, J.: Reversible and blind database watermarking using difference expansion. International Journal of Digital Crime and Forensics 1(2), 42Google Scholar
  9. 9.
    Qu, G., Potkonjak, M.: Analysis of watermarking techniques for graph coloring problem. In: Proceedings of International Conference on Computer Aided Design, pp. 190–193 (1998)Google Scholar
  10. 10.
    Sebe, F., Domingo-Ferrer, J., Solanas, A.: Noise-robust watermarking for numerical datasets. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI 2005. LNCS (LNAI), vol. 3558, pp. 134–143. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Sion, R., Atallah, M.J., Prabhakar, S.: On watermarking numeric sets. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 130–146. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Transactions on Knowledge and Data Engineering 16(12), 1509–1525 (2004)CrossRefGoogle Scholar
  13. 13.
    Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.
    Zhang, Y., Niu, X.-M., Zhao, D.: A method of protecting relational databases copyright with cloud watermark. Transactions of Engineering, Computing and Technology 3, 170–174 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Gaurav Gupta
    • 1
    • 2
  • Josef Pieprzyk
    • 1
  • Mohan Kankanhalli
    • 3
  1. 1.Centre for Advanced Computing, Algorithms and Cryptography Department of ComputingMacquarie UniversitySidneyAustralia
  2. 2.Centre for Policing, Intelligence and Counter TerrorismMacquarie UniversitySidneyAustralia
  3. 3.School of ComputingNational University of SingaporeSingapore

Personalised recommendations