Watermarking Techniques for Relational Databases: Survey, Classification and Comparison

Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, we survey the current state-of-theart and we classify them according to their intent, the way they express the watermark, the cover type, the granularity level, and their verifiability.

[1]  Vahab Pournaghshband A new watermarking approach for relational data , 2008, ACM-SE 46.

[2]  Haiqing Wang,et al.  A Speech Based Algorithm for Watermarking Relational Databases , 2008, 2008 International Symposiums on Information Processing.

[3]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[4]  Beng Chin Ooi,et al.  Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).

[5]  Xiang Zhou,et al.  An additive-attack-proof watermarking mechanism for databases' copyrights protection using image , 2007, SAC '07.

[6]  Radu Sion,et al.  Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.

[7]  Jianmin Wang,et al.  An Improved Algorithm to Watermark Numeric Relational Data , 2005, WISA.

[8]  Agostino Cortesi,et al.  A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.

[9]  Ali Al-Haj,et al.  Robust and Blind Watermarking of Relational Database Systems , 2008 .

[10]  Peter J. Haas,et al.  A system for watermarking relational databases , 2003, SIGMOD '03.

[11]  Pengfei Chen,et al.  A Cluster-Based Watermarking Technique for Relational Database , 2009, 2009 First International Workshop on Database Technology and Applications.

[12]  Sung-Hwan Jung,et al.  A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).

[13]  Min Huang,et al.  A new watermark mechanism for relational data , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[14]  Agostino Cortesi,et al.  A Generic Distortion Free Watermarking Technique for Relational Databases , 2009, ICISS.

[15]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[16]  Jianmin Wang,et al.  Fingerprinting relational databases , 2006, SAC '06.

[17]  V. Prasannaku A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .

[18]  Ming Zhou,et al.  ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[19]  Jun-Dong Chang,et al.  Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[20]  Amr T. Abdel-Hamid,et al.  A Survey on IP Watermarking Techniques , 2004, Des. Autom. Embed. Syst..

[21]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[22]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[23]  Jiping Zheng,et al.  A robust algorithm for watermark numeric relational databases , 2006 .

[24]  Agostino Cortesi,et al.  A Persistent Public Watermarking of Relational Databases , 2010, ICISS.

[25]  Ibrahim Kamel A schema for protecting the integrity of databases , 2009, Comput. Secur..

[26]  Paul W. P. J. Grefen,et al.  Component based system framework for dynamic B2B interaction , 2002, Proceedings 26th Annual International Computer Software and Applications.

[27]  Xinchun Cui,et al.  The Approach for Optimization in Watermark Signal of Relational Databases by using Genetic Algorithms , 2008, 2008 International Conference on Computer Science and Information Technology.

[28]  Meng-Hsiun Tsai,et al.  A Database Watermarking Technique for Temper Detection , 2006, JCIS.

[29]  Jiajin Le,et al.  Watermark Based Copyright Protection of Outsourced Database , 2006, 2006 10th International Database Engineering and Applications Symposium (IDEAS'06).

[30]  Gang Chen,et al.  GARWM: Towards a Generalized and Adaptive Watermark Scheme for Relational Data , 2005, WAIM.

[31]  Julien Lafaye An Analysis of Database Watermarking Security , 2007, Third International Symposium on Information Assurance and Security.

[32]  Xiangrong Xiao,et al.  Second-LSB-Dependent Robust Watermarking for Relational Database , 2007 .

[33]  Agostino Cortesi,et al.  Database Authentication by Distortion Free Watermarking , 2010, ICSOFT.

[34]  Gaurav Gupta,et al.  Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.

[35]  Parthasarathi Dasgupta,et al.  An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking , 2009, SBCCI.

[36]  Dongning Zhao,et al.  A Method of Protecting Relational Databases Copyright with Cloud Watermark , 2007 .

[37]  Robert H. Deng,et al.  Publicly verifiable ownership protection for relational databases , 2006, ASIACCS '06.

[38]  Xinchun Cui,et al.  A weighted algorithm for watermarking relational databases , 2006, Wuhan University Journal of Natural Sciences.

[39]  Jianhua Sun,et al.  An Image Based Algorithm for Watermarking Relational Databases , 2009, 2009 International Conference on Measuring Technology and Mechatronics Automation.

[40]  Dongning Zhao,et al.  Relational Databases Watermark Technique Based on Content Characteristic , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[41]  Huiping Guo,et al.  Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.

[42]  Sushil Jajodia,et al.  Constructing a virtual primary key for fingerprinting relational data , 2003, DRM '03.

[43]  Agostino Cortesi,et al.  Persistent Watermarking of Relational Databases , 2010 .

[44]  Sanjeev Khanna,et al.  Watermarking maps: hiding information in structured data , 2000, SODA '00.

[45]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.

[46]  Robert H. Deng,et al.  A Block Oriented Fingerprinting Scheme in Relational Database , 2004, ICISC.

[47]  Radu Sion,et al.  Proving ownership over categorical data , 2004, Proceedings. 20th International Conference on Data Engineering.

[48]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.