Enabling information recovery with ownership using robust multiple watermarks

With the increasing use of databases, there is an abundant opportunity to investigate new watermarking techniques that cater to the requirements for emerging applications. A major challenge that needs to be tackled is to recover crucial information that may be lost accidentally or due to malicious attacks on a database that represents asset and needs protection. In this paper, we elucidate a scheme for robust watermarking with multiple watermarks that resolve the twin issues of ownership and recovery of information in case of data loss. To resolve ownership conflicts watermark is prepared securely and then embedded into the secretly selected positions of the database. Other watermark encapsulates granular information on user-specified crucial attributes in a manner such that the perturbed or lost data can be regenerated conveniently later. Theoretical analysis proves that the probability of identifying target locations, False hit rate and False miss rate is negligible. We have experimentally verified that the proposed technique is robust enough to extract the watermark accurately even after 100% tuple addition or alteration and after 98% tuple deletion. Experiments on information recovery reveal that successful regeneration of tampered/lost data improves with the increase in the number of candidate attributes for embedding the watermark.

[1]  Cui Xin-chun,et al.  A Weighted Algorithm for Watermarking Relational Databases , 2007 .

[2]  Yossra H. Ali,et al.  Watermarking for Relational Database by using Threshold Generator , 2011, Engineering and Technology Journal.

[3]  Huiping Guo,et al.  Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.

[4]  Elisa Bertino,et al.  Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.

[5]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[6]  Xinchun Cui,et al.  A weighted algorithm for watermarking relational databases , 2006, Wuhan University Journal of Natural Sciences.

[7]  Renfa Li,et al.  Distortion-Free Watermarking Approach for Relational Database Integrity Checking , 2014 .

[8]  Seymour Lipschutz,et al.  Schaum's outline of theory and problems of introduction to probability and statistics , 1998 .

[9]  Zahid Anwar,et al.  RRW—A Robust and Reversible Watermarking Technique for Relational Data , 2015, IEEE Transactions on Knowledge and Data Engineering.

[10]  Hassan Rashidi,et al.  A Novel Watermarking Scheme for Detecting and Recovering Distortions in Database Tables , 2010, ArXiv.

[11]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[12]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[13]  Shi-Jinn Horng,et al.  A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..

[14]  Shampa Chakraverty,et al.  Watermarking Categorical Data : Algorithm and Robustness Analysis , 2015 .

[15]  Syed Afaq Husain,et al.  A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations , 2013, TheScientificWorldJournal.

[16]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[17]  Shampa Chakraverty,et al.  Watermarking relational databases using bacterial foraging algorithm , 2013, Multimedia Tools and Applications.

[18]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[19]  Shampa Chakraverty,et al.  A robust multiple watermarking technique for information recovery , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[20]  Radu Sion,et al.  Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.

[21]  Jie Guo,et al.  Fragile Watermarking Scheme for Tamper Detection of Relational Database , 2011, 2011 International Conference on Computer and Management (CAMAN).