Watermarking relational data: framework, algorithms and analysis

Abstract.We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and delineate desirable properties of a watermarking system for relational data. We then present an effective watermarking technique geared for relational data. This technique ensures that some bit positions of some of the attributes of some of the tuples contain specific values. The specific bit locations and values are algorithmically determined under the control of a secret key known only to the owner of the data. This bit pattern constitutes the watermark. Only if one has access to the secret key can the watermark be detected with high probability. Detecting the watermark requires access neither to the original data nor the watermark, and the watermark can be easily and efficiently maintained in the presence of insertions, updates, and deletions. Our analysis shows that the proposed technique is robust against various forms of malicious attacks as well as benign updates to the data. Using an implementation running on DB2, we also show that the algorithms perform well enough to be used in real-world applications.

[1]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[2]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[3]  Laurence Boney,et al.  Tewfik and Khaled N. Hamdy, Digital Watermarks for Audio Signals , 1996 .

[4]  Ramesh Jain,et al.  Storage and Retrieval for Image and Video Databases III , 1995 .

[5]  Stéphane Roche,et al.  A survey of current watermarking techniques , 1999 .

[6]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[7]  H. Cramér Mathematical methods of statistics , 1947 .

[8]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[9]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[10]  Mikhail J. Atallah,et al.  Watermarking with quadratic residues , 1999, Electronic Imaging.

[11]  Nicholas F. Maxemchuk,et al.  Electronic document distribution , 1994, AT&T Technical Journal.

[12]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[13]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[14]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[15]  Christian S. Collberg,et al.  Watermarking, Tamper-proong, and Obfuscation { Tools for Software Protection Watermarking, Tamper-prooong, and Obfuscation { Tools for Software Protection Module Reuse Sell Copy Buy One , 2000 .

[16]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[17]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[18]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.