Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression

This paper presents a digital watermarking technology for guaranteeing the database integrity. The proposed scheme based on the fragile watermarking technique, exploits trained support vector regression (SVR) predicting function to distribute the digital watermark over the particular numeric attributes to achieve embedding and detecting watermark by the same SVR predicting function. If the absolute value of the difference between predicted value and attribute value is more than the designed fixed value, like one, then the database content will be tampered with.

[1]  Hongtao Lu,et al.  A novel image watermarking scheme based on support vector regression , 2005, J. Syst. Softw..

[2]  Dongning Zhao,et al.  Relational Databases Watermark Technique Based on Content Characteristic , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[3]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[4]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[5]  Wei-Pang Yang,et al.  Multilevel Secure Database Encryption with Subkeys , 1997, Data Knowl. Eng..

[6]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[7]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[8]  Hung-Hsu Tsai,et al.  Color image watermark extraction based on support vector machines , 2007, Inf. Sci..

[9]  Radu Sion,et al.  Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..

[10]  Radu Sion,et al.  Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.

[11]  Huiping Guo,et al.  Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.

[12]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[13]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.