A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key

In recent years, many researchers have studied reversible watermarking techniques for relational databases. Most of the developed schemes have been based on a primary key attribute in order to determine the selected tuples and attributes to carry the watermark bits. What happens, however, when the primary key attribute does not exist for a relational database? In this paper, we propose a blind robust reversible watermarking scheme for a textual relational database. This scheme does not rely on the primary key attribute. To avoid the absolute dependence on the primary key attribute, as in existing schemes, in the proposed scheme the content of textual attributes are used to generate the virtual primary attribute that is applied in tuple and attribute selections. Moreover, the selection of attributes does not depend on the order of attributes in the relational database. Model and robustness analysis demonstrate that our proposed scheme achieves a high resilience against different types of tuple attacks, i.e., tuple attacks and attribute attacks. The experimental results also confirm that the proposed scheme is more secure and robust than other existing schemes.

[1]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.

[2]  Chin-Chen Chang,et al.  Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding , 2014, Smart Comput. Rev..

[3]  Chin-Chen Chang,et al.  A Blind Reversible Robust Watermarking Scheme for Relational Databases , 2013, TheScientificWorldJournal.

[4]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[5]  Shi-Jinn Horng,et al.  A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..

[6]  Elisa Bertino,et al.  Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.

[7]  Radu Sion,et al.  Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.

[8]  Chin-Chen Chang,et al.  A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..

[9]  Ali Al-Haj,et al.  Robust and Blind Watermarking of Relational Database Systems , 2008 .

[10]  Dhiren Patel,et al.  Relational Database Watermarking for Ownership Protection , 2012 .

[11]  Agostino Cortesi,et al.  A Generic Distortion Free Watermarking Technique for Relational Databases , 2009, ICISS.

[12]  Sushil Jajodia,et al.  Constructing a virtual primary key for fingerprinting relational data , 2003, DRM '03.

[13]  Azadeh Mansouri,et al.  A Low Complexity Video Watermarking in H.264 Compressed Domain , 2010, IEEE Transactions on Information Forensics and Security.

[14]  Rui Yang,et al.  Geometric Invariant Audio Watermarking Based on an LCM Feature , 2011, IEEE Transactions on Multimedia.

[15]  V. Prasannaku A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .

[16]  J. B. Patil,et al.  Implementation of Text Watermarking Technique Using Natural Language Watermarks , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[17]  Syed Afaq Husain,et al.  A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations , 2013, TheScientificWorldJournal.

[18]  Li-Yeh Chuang,et al.  Natural Products: Bioactivity, Biochemistry, and Biological Effects in Cancer and Disease Therapy , 2013, The Scientific World Journal.

[19]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.