Databases Traceability by Means of Watermarking with Optimized Detection

In this paper, we propose a robust lossless database watermarking scheme the detection of which is optimized for the traceability of databases merged into, for example, shared data warehouses. We basically aim at identifying a database merged with different other watermarked databases. Based on the modulation of attribute circular histogram’s center of mass, we theoretically prove that the impact of the database mixture on the embedded identifier is equivalent to the addition of a Gaussian noise, the parameters of which can be estimated. From these theoretical results, an optimized watermark detector is proposed. This one offers higher discriminative performance than the classic correlation-based detector. Depending on the modulated attribute, it allows us to detect a database representing at least \(4\%\) of the databases mixture with a detection rate close to \(100\%\). These results have been experimentally verified within the framework of a set of medical databases containing inpatient hospital stay records.

[1]  Minoru Kuribayashi,et al.  A simple tracing algorithm for binary fingerprinting code under averaging attack , 2013, IH&MMSec '13.

[2]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.

[3]  Huiping Guo,et al.  Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.

[4]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[5]  Mauro Barni,et al.  Optimum decoding and detection of multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[6]  Elisa Bertino,et al.  Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.

[7]  Radu Sion,et al.  Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..

[8]  Christian Roux,et al.  Lossless watermarking of categorical attributes for verifying medical data base integrity , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[9]  Hans Georg Schaathun,et al.  On error-correcting fingerprinting codes for use with watermarking , 2008, Multimedia Systems.

[10]  Camélia Constantin,et al.  Watermill: An Optimized Fingerprinting System for Databases under Constraints , 2008, IEEE Transactions on Knowledge and Data Engineering.

[11]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[12]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[13]  Gábor Tardos,et al.  Optimal probabilistic fingerprint codes , 2003, STOC '03.

[14]  H. K. Garg,et al.  Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling , 2005, IEEE Signal Processing Letters.

[15]  Nora Cuppens-Boulahia,et al.  Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.

[16]  Gouenou Coatrieux,et al.  Robust Watermarking of Relational Databases With Ontology-Guided Distortion Control , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Muddassar Farooq,et al.  A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.

[18]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[19]  Barry Quinn Phase-only information loss , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.