On Watermarking for Collaborative Model-Driven Engineering

Collaborative development scenarios often require models to be shared among the different stakeholders. These stakeholders are mostly remote with communication typically taking place over untrusted networks. This raises the need for effective intellectual property (IP) protection mechanisms for the shared models. Watermarking, an information hiding technique aimed at providing the means to verify the authenticity, integrity, and ownership of digital assets, has proved useful to provide IP protection in both media (images, audio, and video) and non-media domains (databases, XML documents, and graphs). In this paper, we explore the adaptation of the concept of watermarking to the modeling domain. We provide a novel and robust labeling mechanism based in the use of locality sensitive hashing and error correction codes. This labeling mechanism enables the integration of state-of-the-art watermarking algorithms in model-driven development approaches. Additionally, we leverage on the labeling mechanism to contribute a zero-watermarking algorithm to watermark models without introducing distortions to the data. We demonstrate the feasibility of our approach by providing a prototype implementation of our contribution.

[1]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[2]  Jordi Cabot,et al.  Model-Driven Software Engineering in Practice , 2017, Synthesis Lectures on Software Engineering.

[3]  Nils Reimers,et al.  Robust Hash Algorithms for Text , 2013, Communications and Multimedia Security.

[4]  Mark Rouncefield,et al.  The State of Practice in Model-Driven Engineering , 2014, IEEE Software.

[5]  Elisa Bertino,et al.  On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques , 2016, IEEE Access.

[6]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[7]  F. Fleurey,et al.  Model Composition-A Signature-Based Approach , 2005 .

[8]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[9]  Andrei Z. Broder,et al.  On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).

[10]  Peng Li,et al.  Two Zero-Watermark methods for XML documents , 2016, Journal of Real-Time Image Processing.

[11]  Chen Gang,et al.  A zero-watermarking algorithm for relational database copyright protection , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering.

[12]  Jordi Cabot,et al.  NeoEMF: a Multi-database Model Persistence Framework for Very Large Models , 2016, D&P@MoDELS.

[13]  Anwar M. Mirza,et al.  A zero-watermarking algorithm for text documents based on structural components , 2010, 2010 International Conference on Information and Emerging Technologies.

[14]  Peng Zhiping A robust zero-watermarking algorithm for audio , 2011 .

[15]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[16]  David Gross-Amblard,et al.  Query-preserving watermarking of relational databases and XML documents , 2003, PODS '03.

[17]  Alberto Rodrigues da Silva,et al.  Model-driven engineering: A survey supported by the unified conceptual model , 2015, Comput. Lang. Syst. Struct..

[18]  Ki-Ryong Kwon,et al.  Robust 3D mesh model hashing based on feature object , 2012, Digit. Signal Process..

[19]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[20]  Kian-Lee Tan,et al.  Query-based watermarking for XML data , 2007, ASIACCS '07.

[21]  Atilla Baskurt,et al.  A Comprehensive Survey on Three-Dimensional Mesh Watermarking , 2008, IEEE Transactions on Multimedia.

[22]  Syed Afaq Husain,et al.  A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations , 2013, TheScientificWorldJournal.

[23]  Gang Chen,et al.  Watermarking Abstract Tree-Structured Data , 2005, WAIM.

[24]  Agostino Cortesi,et al.  A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.

[25]  Radu Sion,et al.  Resilient Information Hiding for Abstract Semi-structures , 2003, IWDW.

[26]  Dániel Varró,et al.  Query-based access control for secure collaborative modeling using bidirectional transformations* , 2016, MoDELS.

[27]  Radu Sion,et al.  Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.