Robust optimal position detection scheme for relational database watermarking through HOLPSOFA algorithm

Abstract Nowadays, relational database watermarking is a challenging problem in many content distribution applications and internet-based application environments. The watermarking scheme for relational databases based on a hybrid algorithm, named as HOLPSOFA is proposed. In HOLPSOFA, the combination of Orthogonal Learning Particle Swarm Optimization and Firefly Algorithm is used. This new approach combines the advantages of Orthogonal Learning particle swarm optimization (OLPSO) and Firefly algorithm (FA), which can find the time-optimal solutions simultaneously. The overall relational database watermarking scheme consists of three stages, (1) Optimal location identification through HOLPSOFA algorithm, (2) Watermark embedding and (3) watermark extraction. The proposed HOLPSOFA algorithm is also compared with OLPSO and Firefly algorithm. The performance of the proposed watermarking method is analyzed through Mean Square Error (MSE) and normalized correlation (NC). Our extensive analysis illustrates that the proposed method is robust against various forms of database attacks, including insertion, deletion and alteration. Computer simulations show that the hybrid algorithm is very effective in diminishing different kind of attacks in terms of MSE and NC than existing algorithms.

[1]  Elisa Bertino,et al.  Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.

[2]  Christian Roux,et al.  Lossless watermarking of categorical attributes for verifying medical data base integrity , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[3]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[4]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[5]  Hsien-Chu Wu,et al.  Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction , 2012, 2012 International Symposium on Computer, Consumer and Control.

[6]  Richard T. Snodgrass,et al.  Forensic analysis of database tampering , 2008 .

[7]  David B. Fogel,et al.  Evolutionary Computation: Towards a New Philosophy of Machine Intelligence , 1995 .

[8]  Muddassar Farooq,et al.  An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems , 2012, IEEE Transactions on Knowledge and Data Engineering.

[9]  Jacek M. Zurada,et al.  An approach to multimodal biomedical image registration utilizing particle swarm optimization , 2004, IEEE Transactions on Evolutionary Computation.

[10]  Shi-Jinn Horng,et al.  A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..

[11]  Andries Petrus Engelbrecht,et al.  Particle swarm optimization approaches to coevolve strategies for the iterated prisoner's dilemma , 2005, IEEE Transactions on Evolutionary Computation.

[12]  Yuhui Shi,et al.  Particle swarm optimization: developments, applications and resources , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[13]  A.P. Engelbrecht,et al.  Learning to play games using a PSO-based competitive learning approach , 2004, IEEE Transactions on Evolutionary Computation.

[14]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[15]  Ling Yang,et al.  An intelligent watermarking method based on particle swarm optimization , 2011, Expert Syst. Appl..

[16]  Bian Yang,et al.  Reversible Watermarking for Relational Database Authentication , 2006 .

[17]  Martin S. Olivier,et al.  On metadata context in Database Forensics , 2009, Digit. Investig..

[18]  Salman Mohagheghi,et al.  Particle Swarm Optimization: Basic Concepts, Variants and Applications in Power Systems , 2008, IEEE Transactions on Evolutionary Computation.

[19]  Min-Shiang Hwang,et al.  A Survey of Data Distortion Watermarking Relational Databases , 2016, Int. J. Netw. Secur..

[20]  Andries Petrus Engelbrecht,et al.  Particle swarm optimization: an introduction and its recent developments , 2007, Annual Conference on Genetic and Evolutionary Computation.

[21]  Dhiren Patel,et al.  Relational Database Watermarking for Ownership Protection , 2012 .

[22]  Michael A. Saunders,et al.  SNOPT: An SQP Algorithm for Large-Scale Constrained Optimization , 2002, SIAM J. Optim..

[23]  Jun Zhang,et al.  Orthogonal Learning Particle Swarm Optimization , 2011, IEEE Trans. Evol. Comput..

[24]  Asifullah Khan,et al.  Genetic algorithm and difference expansion based reversible watermarking for relational databases , 2013, J. Syst. Softw..

[25]  Adnan M. Alattar Reversible watermark using difference expansion of triplets , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[26]  Udai Pratap Rao,et al.  A Novel approach as Multi-place Watermarking for Security in Database , 2014, ArXiv.

[27]  Radu Sion,et al.  Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.

[28]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[29]  Richard T. Snodgrass,et al.  The Tiled Bitmap Forensic Analysis Algorithm , 2010, IEEE Transactions on Knowledge and Data Engineering.

[30]  Gaurav Gupta,et al.  Reversible and blind database watermarking using difference expansion , 2008, e-Forensics '08.

[31]  Gaurav Gupta,et al.  Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.

[32]  Michael N. Vrahatis,et al.  Particle Swarm Optimization Method for Constrained Optimization Problems , 2002 .

[33]  Russell C. Eberhart,et al.  Comparison between Genetic Algorithms and Particle Swarm Optimization , 1998, Evolutionary Programming.

[34]  Xin-She Yang,et al.  Nature-Inspired Metaheuristic Algorithms , 2008 .

[35]  Muddassar Farooq,et al.  A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.

[36]  Zahid Anwar,et al.  RRW—A Robust and Reversible Watermarking Technique for Relational Data , 2015, IEEE Transactions on Knowledge and Data Engineering.

[37]  Andries Petrus Engelbrecht,et al.  A Cooperative approach to particle swarm optimization , 2004, IEEE Transactions on Evolutionary Computation.

[38]  Russell C. Eberhart,et al.  A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.

[39]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[40]  K Unnikrishnan,et al.  Dynamic prediction based watermarking for temporal relational databases , 2016, 2016 International Conference on Data Science and Engineering (ICDSE).

[41]  Jun Zhang,et al.  Orthogonal Learning Particle Swarm Optimization , 2009, IEEE Transactions on Evolutionary Computation.

[42]  Russell C. Eberhart,et al.  Recent advances in particle swarm , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[43]  Thomas Bäck,et al.  Evolutionary computation: Toward a new philosophy of machine intelligence , 1997, Complex..

[44]  Carlos A. Coello Coello,et al.  Handling multiple objectives with particle swarm optimization , 2004, IEEE Transactions on Evolutionary Computation.