RRW—A Robust and Reversible Watermarking Technique for Relational Data

Advancement in information technology is playing an increasing role in the use of information systems comprising relational databases. These databases are used effectively in collaborative environments for information extraction; consequently, they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data tampering. When ownership rights are enforced using watermarking, the underlying data undergoes certain modifications; as a result of which, the data quality gets compromised. Reversible watermarking is employed to ensure data quality along-with data recovery. However, such techniques are usually not robust against malicious attacks and do not provide any mechanism to selectively watermark a particular attribute by taking into account its role in knowledge discovery. Therefore, reversible watermarking is required that ensures; (i) watermark encoding and decoding by accounting for the role of all the features in knowledge discovery; and, (ii) original data recovery in the presence of active malicious attacks. In this paper, a robust and semi-blind reversible watermarking (RRW) technique for numerical relational data has been proposed that addresses the above objectives. Experimental studies prove the effectiveness of RRW against malicious attacks and show that the proposed technique outperforms existing ones.

[1]  Jeffrey J. Rodríguez,et al.  Prediction-error based reversible watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[2]  J.J. Rodriguez,et al.  Reversible watermarking by prediction-error expansion , 2004, 6th IEEE Southwest Symposium on Image Analysis and Interpretation, 2004..

[3]  Muddassar Farooq,et al.  An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems , 2012, IEEE Transactions on Knowledge and Data Engineering.

[4]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[5]  Shi-Jinn Horng,et al.  A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..

[6]  Gui-Sheng Chen,et al.  A method for trust management in cloud computing: Data coloring by cloud watermarking , 2011, Int. J. Autom. Comput..

[7]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[8]  Ling Yang,et al.  An intelligent watermarking method based on particle swarm optimization , 2011, Expert Syst. Appl..

[9]  Bian Yang,et al.  Reversible Watermarking for Relational Database Authentication , 2006 .

[10]  Lai-Wan Chan,et al.  Biased Minimax Probability Machine for Medical Diagnosis , 2004, ISAIM.

[11]  Michael A. Saunders,et al.  SNOPT: An SQP Algorithm for Large-Scale Constrained Optimization , 2002, SIAM J. Optim..

[12]  Gaurav Gupta,et al.  Reversible and blind database watermarking using difference expansion , 2008, e-Forensics '08.

[13]  Setsuo Ohsuga,et al.  INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES , 1977 .

[14]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[15]  Shi-Jinn Horng,et al.  A Novel Blind Reversible Method for Watermarking Relational Databases , 2010, International Symposium on Parallel and Distributed Processing with Applications.

[16]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[17]  Didier Stricker,et al.  Introducing a New Benchmarked Dataset for Activity Monitoring , 2012, 2012 16th International Symposium on Wearable Computers.

[18]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[19]  Asifullah Khan,et al.  Genetic algorithm and difference expansion based reversible watermarking for relational databases , 2013, J. Syst. Softw..

[20]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[21]  Dorothea Heiss-Czedik,et al.  An Introduction to Genetic Algorithms. , 1997, Artificial Life.

[22]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[23]  Hsien-Chu Wu,et al.  Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction , 2012, 2012 International Symposium on Computer, Consumer and Control.

[24]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[25]  O. Weck,et al.  A COMPARISON OF PARTICLE SWARM OPTIMIZATION AND THE GENETIC ALGORITHM , 2005 .

[26]  Dirk Günnewig,et al.  Digital Rights Management , 2005, Wirtsch..

[27]  Radu Sion,et al.  Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.

[28]  G. Pillai,et al.  SVM Based Decision Support System for Heart Disease Classification with Integer-Coded Genetic Algorithm to Select Critical Features , 2009 .

[29]  Rynson W. H. Lau,et al.  Knowledge and Data Engineering for e-Learning Special Issue of IEEE Transactions on Knowledge and Data Engineering , 2008 .

[30]  M. Atallah,et al.  Watermarking Relational Databases , 2002 .

[31]  Adnan M. Alattar Reversible watermark using difference expansion of triplets , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[32]  E. Sonnleitner,et al.  A robust watermarking approach for large databases , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).

[33]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[34]  John Kieffer,et al.  Elements of Information Theory (Thomas M. Cover and Joy A. Thomas) , 1994, SIAM Rev..

[35]  Gaurav Gupta,et al.  Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.

[36]  Michael N. Vrahatis,et al.  Particle Swarm Optimization Method for Constrained Optimization Problems , 2002 .