Watermarking for Ontologies

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

[1]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.

[2]  Tim Berners-Lee,et al.  Linked data on the web (LDOW2008) , 2008, WWW.

[3]  Jens Lehmann,et al.  DBpedia: A Nucleus for a Web of Open Data , 2007, ISWC/ASWC.

[4]  Radu Sion,et al.  Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..

[5]  Matthew J. B. Robshaw One-Way Function , 2005, Encyclopedia of Cryptography and Security.

[6]  Michael J. Witbrock,et al.  An Introduction to the Syntax and Content of Cyc , 2006, AAAI Spring Symposium: Formalizing and Compiling Background Knowledge and Its Applications to Knowledge Representation and Question Answering.

[7]  Fabian M. Suchanek,et al.  Yago: A Core of Semantic Knowledge Unifying WordNet and Wikipedia , 2007 .

[8]  Jens Wissmann,et al.  Elimination of Redundancy in Ontologies , 2011, ESWC.

[9]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[10]  Tim Berners-Lee,et al.  Linked Data on the Web , 2008, LDOW.

[11]  Camélia Constantin,et al.  Watermill: An Optimized Fingerprinting System for Databases under Constraints , 2008, IEEE Transactions on Knowledge and Data Engineering.

[12]  Shaowen Yao,et al.  Techniques for OWL-based Ontology Watermarking , 2009, 2009 WRI Global Congress on Intelligent Systems.

[13]  Jeff Z. Pan,et al.  The Semantic Web: Research and Applications - 8th Extended Semantic Web Conference, ESWC 2011, Heraklion, Crete, Greece, May 29-June 2, 2011, Proceedings, Part I , 2010, ESWC.

[14]  Lora Aroyo,et al.  The Semantic Web: Research and Applications , 2009, Lecture Notes in Computer Science.

[15]  Radu Sion,et al.  Resilient Information Hiding for Abstract Semi-structures , 2003, IWDW.

[16]  Elisa Bertino,et al.  Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.

[17]  Adam Pease,et al.  Towards a standard upper ontology , 2001, FOIS.

[18]  Gerhard Weikum,et al.  WWW 2007 / Track: Semantic Web Session: Ontologies ABSTRACT YAGO: A Core of Semantic Knowledge , 2022 .

[19]  Jeremy J. Carroll,et al.  Named graphs, provenance and trust , 2005, WWW '05.

[20]  Brian Davis,et al.  Knowledge Engineering and Knowledge Management , 2012, Lecture Notes in Computer Science.

[21]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[22]  Mark A. Musen,et al.  The Knowledge Model of Protégé-2000: Combining Interoperability and Flexibility , 2000, EKAW.