Distortion-free Watermarking Scheme for Compressed Data in Columnar Database

Digital watermarking is an effective technique for protecting various databases against data copyright infringement, piracy, and data tampering in the columnar database. Increasing deployments of various database systems and their versatile applications have raised the need for better watermarking schemes that are tailored to the target database systems’ specific architecture. Most of the existing digital watermarking schemes do not take into consideration the side effects that watermarking might have on the database’s important characteristics such as data compression and overall performance. In this research, we propose a distortion-free fragile watermarking scheme for columnar database architecture without interfering its underlying data compression scheme and its overall performance. The proposed scheme is flexible and can be adapted to various distributions of data. We tested our proposed scheme on both synthetic and real-world data, and proved its

[1]  Sanjeev Khanna,et al.  Watermarking maps: hiding information in structured data , 2000, SODA '00.

[2]  Daniel J. Abadi,et al.  Column oriented Database Systems , 2009, Proc. VLDB Endow..

[3]  Ibrahim Kamel,et al.  Toward protecting the integrity of relational databases , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).

[4]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[5]  Sung-Hwan Jung,et al.  A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).

[6]  Munaga V. N. K. Prasad,et al.  Subset Selection Approach for Watermarking Relational Databases , 2010, ICDEM.

[7]  I. Kamel,et al.  An empirical study on the robustness of a fragile watermark for relational databases , 2013, 2013 9th International Conference on Innovations in Information Technology (IIT).

[8]  Huiping Guo,et al.  Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.

[9]  Arashdeep Kaur,et al.  A literature survey - various audio watermarking techniques and their challenges , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).

[10]  Dongning Zhao,et al.  Relational Databases Watermark Technique Based on Content Characteristic , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[11]  Ibrahim Kamel A schema for protecting the integrity of databases , 2009, Comput. Secur..

[12]  Mark R. Pickering,et al.  An Overview of Digital Video Watermarking , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[14]  Robert H. Deng,et al.  Publicly verifiable ownership protection for relational databases , 2006, ASIACCS '06.

[15]  Ming Zhou,et al.  ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[16]  Ibrahim Kamel,et al.  Distortion-free fragile watermark for relational databases , 2016, Int. J. Big Data Intell..

[17]  Syed Afaq Husain,et al.  A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations , 2013, TheScientificWorldJournal.

[18]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[19]  Claudia Feregrino Uribe,et al.  A Minimum Distortion: High Capacity Watermarking Technique for Relational Data , 2017, IH&MMSec.

[20]  Marcin Zukowski,et al.  MonetDB/X100: Hyper-Pipelining Query Execution , 2005, CIDR.

[21]  Raju Halder,et al.  Partitioning-Insensitive Watermarking Approach for Distributed Relational Databases , 2017, Trans. Large Scale Data Knowl. Centered Syst..

[22]  Nora Cuppens-Boulahia,et al.  Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.

[23]  Daniel J. Abadi,et al.  Column-stores vs. row-stores: how different are they really? , 2008, SIGMOD Conference.

[24]  Renfa Li,et al.  Distortion-Free Watermarking Approach for Relational Database Integrity Checking , 2014 .

[25]  Jianhua Sun,et al.  An Image Based Algorithm for Watermarking Relational Databases , 2009, 2009 International Conference on Measuring Technology and Mechatronics Automation.