A New Robust Approach for Reversible Database Watermarking with Distortion Control

Nowadays information is crucial in many fields such as medicine, science and business, where databases are used effectively for information sharing. However, the databases face the risk of being pirated, stolen or misused, which may result in a lot of security threats concerning ownership rights, data tampering and privacy protection. Watermarking is utilized to enforce ownership rights on shared relational databases. Many reversible watermarking methods are proposed recently to protect rights of owners along with recovering original data. Most state-of-the-art methods modify the original data to a large extent, result in data quality degradation, and cannot achieve good balance between robustness against malicious attacks and data recovery. In this paper, we propose a robust and reversible database watermarking technique, Genetic Algorithm and Histogram Shifting Watermarking (GAHSW), for numerical relational database. The genetic algorithm is used to select the best secret key for grouping database, where the watermarking can be embedded with balanced distortion and capacity. The histogram of the prediction error is shifted to embed the watermark with good robustness. Experimental results demonstrate the effectiveness of GAHSW and show that it outperforms state-of-the-art approaches in terms of robustness against malicious attacks and preservation of data quality.

[1]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Bian Yang,et al.  Reversible Watermarking for Relational Database Authentication , 2006 .

[3]  Xuelong Li,et al.  Lossless Data Embedding Using Generalized Statistical Quantity Histogram , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Agostino Cortesi,et al.  A Persistent Public Watermarking of Relational Databases , 2010, ICISS.

[5]  Chin-Chen Chang,et al.  Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..

[6]  M. Ulutas,et al.  A New Reversible Database Watermarking Approach with Firefly Optimization Algorithm , 2017 .

[7]  Yun Q. Shi,et al.  Optimum Histogram Pair Based Image Lossless Data Embedding , 2008, Trans. Data Hiding Multim. Secur..

[8]  Shi-Jinn Horng,et al.  A Novel Blind Reversible Method for Watermarking Relational Databases , 2010, International Symposium on Parallel and Distributed Processing with Applications.

[9]  Elisa Bertino,et al.  Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.

[10]  Muddassar Farooq,et al.  A Formal Usability Constraints Model for Watermarking of Outsourced Datasets , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Christoph Busch,et al.  Approaching optimal value expansion for reversible watermarking , 2005, MM&Sec '05.

[12]  Tae-Sun Choi,et al.  Machine learning based adaptive watermark decoding in view of anticipated attack , 2008, Pattern Recognit..

[13]  Vidhi Khanduja,et al.  Database watermarking, a technological protective measure: Perspective, security analysis and future directions , 2017, J. Inf. Secur. Appl..

[14]  Radu Sion,et al.  Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.

[15]  Hae-Yeoun Lee,et al.  High capacity reversible watermarking using differential histogram shifting and predicted error compensation , 2011, J. Electronic Imaging.

[16]  Frank Y. Shih,et al.  Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[17]  Weiming Zhang,et al.  A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification , 2013, IEEE Trans. Inf. Forensics Secur..

[18]  Gouenou Coatrieux,et al.  Robust Watermarking of Relational Databases With Ontology-Guided Distortion Control , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Muddassar Farooq,et al.  A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.

[20]  Zahid Anwar,et al.  RRW—A Robust and Reversible Watermarking Technique for Relational Data , 2015, IEEE Transactions on Knowledge and Data Engineering.

[21]  David Gross-Amblard,et al.  Query-preserving watermarking of relational databases and Xml documents , 2011, TODS.

[22]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[23]  Gui-Sheng Chen,et al.  A method for trust management in cloud computing: Data coloring by cloud watermarking , 2011, Int. J. Autom. Comput..

[24]  Gaurav Gupta,et al.  Reversible and blind database watermarking using difference expansion , 2008, e-Forensics '08.

[25]  Agostino Cortesi,et al.  A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.

[26]  Agostino Cortesi,et al.  Watermarking Techniques for Relational Databases: Survey, Classification and Comparison , 2010, J. Univers. Comput. Sci..

[27]  Jiwu Huang,et al.  Reversible image watermarking on prediction errors by efficient histogram modification , 2012, Signal Process..

[28]  Asifullah Khan,et al.  Genetic algorithm and difference expansion based reversible watermarking for relational databases , 2013, J. Syst. Softw..

[29]  Chengyun Yang,et al.  Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets , 2006, IWDW.

[30]  Xing Zhang,et al.  Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting , 2017, IEEE Transactions on Cybernetics.