Abstract
Today, digital watermarking technology has emerged as an effective tool for relational databases and eXtensible Mark-up Language (XML) data in order to protect the copyright, detect tamper, trace traitor, and maintain the integrity of the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Halder, R., S. Pal, and A. Cortesi. 2010. Watermarking techniques for relational databases: Survey, classification and comparison. Journal of UCS 16(21): 3164–3190.
Agrawal, R., P.J. Haas, and J. Kiernan. 2003. A system for watermarking relational databases. In Proceedings of the 2003 ACM SIGMOD international conference on management of data. ACM.
Agrawal, R., P.J. Haas, and J. Kiernan. 2003. Watermarking relational data: Framework, algorithms and analysis. The VLDB Journal 12(2): 157–169.
Agrawal, R., and J. Kiernan, 2002. Watermarking relational databases. In Proceedings of the 28th international conference on Very Large Data Bases (pp. 155–166). VLDB Endowment.
Li, Y., V. Swarup, and S. Jajodia. 2003. Constructing a virtual primary key for fingerprinting relational data, 133–141. Workshop: In Digital Rights Management.
Al-Haj, A., and A. Odeh. 2008. Robust and blind watermarking of relational database systems.
Prasannakumari, V. 2009. A robust tamperproof watermarking for data integrity in relational databases. Research Journal of Information Technology 1(3): 115–121.
Pournaghshband, V. 2008. A new watermarking approach for relational data. In Proceedings of the 46th annual southeast regional conference on XX. ACM.
Li, Y., H. Guo, and S. Jajodia. 2004. Tamper detection and localization for categorical data using fragile watermarks. In Proceedings of the 4th ACM workshop on digital rights management. ACM.
Bhattacharya, S., and A. Cortesi. 2009. A distortion free watermark framework for relational databases. In ICSOFT (2).
Li, Y. 2008. Database watermarking: A systematic view. In Handbook of database security, 329–355. Springer.
Tsai, M.-H., et al. 2007. Fragile database watermarking for malicious tamper detection using support vector regression. In Third international conference on intelligent information hiding and multimedia signal processing, 2007. IIHMSP 2007. IEEE.
Li, Y., and R.H. Deng. 2006. Publicly verifiable ownership protection for relational databases. In Proceedings of the 2006 ACM symposium on information, computer and communications security. ACM.
Kamel, I. 2009. A schema for protecting the integrity of databases. Computers & Security, 28(7): 698–709.
Qin, Z., et al. 2006. Watermark based copyright protection of outsourced database. In 10th International on database engineering and applications symposium, 2006. IDEAS’06. IEEE.
Wang, C., et al. 2008. Atbam: An arnold transform based method on watermarking relational data. In 2008 International conference on multimedia and ubiquitous engineering. IEEE.
Hu, Z., Z. Cao, and J. Sun. 2009. An image based algorithm for watermarking relational databases. In International conference on measuring technology and mechatronics automation, 2009. ICMTMA’09. IEEE.
Zhang, Y., et al. 2006. Relational databases watermark technique based on content characteristic. In First international conference on innovative computing, information and control, 2006. ICICIC’06. IEEE.
Zhang, Y., X. Niu, and D. Zhao. 2005. A method of protecting relational databases copyright with cloud watermark. International Journal of Information and Communication Engineering 1(7): 337–341.
Huang, M., et al. 2004. A new watermark mechanism for relational data. In Null. IEEE.
Zhou, X., et al. 2005. Wmxml: A system for watermarking xml data. In Proceedings of the 31st international conference on very large data bases. VLDB Endowment.
Rane, M.P.B., and B. Meshram. Xml-Based security for e-commerce application.
Gross-Amblard, D. 2011. Query-preserving watermarking of relational databases and xml documents. ACM Transactions on Database Systems (TODS) 36(1): 3.
Romaric, T., E. Damiani, and N. Bennani. 2012. Robust XML watermarking using fuzzy queries. In 2012 IEEE 36th annual on computer software and applications conference workshops (COMPSACW). IEEE.
Mat Kiah, M., et al. 2011. A review of audio based steganography and digital watermarking. International Journal of Physical Sciences. 6(16): 3837–3850.
Franco-Contreras, J., et al. 2014. Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records. In 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE.
Suchanek, F.M., D. Gross-Amblard, and S. Abiteboul. 2011. Watermarking for ontologies. In The semantic web–ISWC 2011, 697–713. Springer.
Pazienza, M.T., A. Stellato, and A. Turbati. 2008. Linguistic watermark 3.0: An RDF framework and a software library for bridging language and ontologies in the semantic web. In SWAP.
Kong, H., et al. 2009. Techniques for owl-based ontology watermarking. In WRI global congress on intelligent systems, 2009. GCIS’09. IEEE.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this chapter
Cite this chapter
Nematollahi, M.A., Vorakulpipat, C., Rosales, H.G. (2017). Relational Database, XML, and Ontology Watermarking. In: Digital Watermarking . Springer Topics in Signal Processing, vol 11. Springer, Singapore. https://doi.org/10.1007/978-981-10-2095-7_10
Download citation
DOI: https://doi.org/10.1007/978-981-10-2095-7_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2094-0
Online ISBN: 978-981-10-2095-7
eBook Packages: EngineeringEngineering (R0)