Elliptic Curve Cryptography (ECC) based Relational Database Watermarking

Database Watermarking methods are used for copyright protection of relational database. Many techniques have been developed for watermarking multimedia digital assets like audio, video, text, images etc. But these methods are usually not applicable with numerical database, because to insert a watermark into a data, small error is created in data, called mark. An error in relational data is usually not acceptable, so a different approach need to be develop to create a mark into the numerical database. Many different approaches have been discussed in previous researches for relational database watermarking. In this paper a new approach has been introduced for relational database watermarking using Elliptic Curve Cryptography (ECC). It has been proofed that ECC provides more security with smaller key size in comparison with other encryption techniques. Proposed approach gives better results in subset deletion and selection attacks which have been compared with other methods.

[1]  Vahab Pournaghshband A new watermarking approach for relational data , 2008, ACM-SE 46.

[2]  Theodoros Tzouramanis A robust watermarking scheme for relational databases , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[3]  Pengfei Chen,et al.  A Cluster-Based Watermarking Technique for Relational Database , 2009, 2009 First International Workshop on Database Technology and Applications.

[4]  Yixian Yang,et al.  A Novel Relational Database Watermarking Algorithm for Joint Ownership , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[5]  Shampa Chakraverty,et al.  A robust multiple watermarking technique for information recovery , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[6]  Nan Jiang,et al.  Relational databases watermarking for textual and numerical data , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).

[7]  Nora Cuppens-Boulahia,et al.  Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Jianhua Sun,et al.  Multiple Watermarking Relational Databases Using Image , 2008, 2008 International Conference on MultiMedia and Information Technology.

[9]  Ming Zhou,et al.  ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[10]  Shaowen Yao,et al.  Combine Elliptic Curve Cryptography with Digital Watermark for OWL-Based Ontology Encryption , 2009, 2009 International Conference on Computational Intelligence and Security.

[11]  M. Atallah,et al.  Watermarking Relational Databases , 2002 .

[12]  Jianhua Sun,et al.  An Image Based Algorithm for Watermarking Relational Databases , 2009, 2009 International Conference on Measuring Technology and Mechatronics Automation.

[13]  Dhiren Patel,et al.  Relational Database Watermarking for Ownership Protection , 2012 .

[14]  Zhijie Liu,et al.  Text format based relational database watermarking for non-numeric data , 2010, 2010 International Conference On Computer Design and Applications.

[15]  Jian-Min Wang,et al.  Watermarking relational database using image , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[16]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[17]  Wang Yanmin,et al.  The digital watermarking algorithm of the relational database based on the effective bits of numerical field , 2012, World Automation Congress 2012.