A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully.

[1]  Radu Sion,et al.  Proving ownership over categorical data , 2004, Proceedings. 20th International Conference on Data Engineering.

[2]  Azhar Rauf,et al.  Self-Constructing Fragile Watermark Algorithm for Relational Database Integrity Proof , 2012 .

[3]  Xingming Sun,et al.  An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection , 2007, ICCSA.

[4]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Gang Chen,et al.  GARWM: Towards a Generalized and Adaptive Watermark Scheme for Relational Data , 2005, WAIM.

[6]  Bin Han,et al.  Fragile audio watermarking scheme based on sample mean sequence , 2011, 2011 International Conference on Multimedia Technology.

[7]  Hassan Rashidi,et al.  A Novel Watermarking Scheme for Detecting and Recovering Distortions in Database Tables , 2010, ArXiv.

[8]  Camélia Constantin,et al.  Watermill: An Optimized Fingerprinting System for Databases under Constraints , 2008, IEEE Transactions on Knowledge and Data Engineering.

[9]  V. Prasannaku A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .

[10]  Hongxia Wang,et al.  Centroid-based semi-fragile audio watermarking in hybrid domain , 2010, Science China Information Sciences.

[11]  Huiping Guo,et al.  Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.

[12]  Ming Zhou,et al.  ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[13]  Xiang Huazheng,et al.  A new fragile watermarking scheme for text documents authentication , 2006, Wuhan University Journal of Natural Sciences.

[14]  Jörg Schwenk,et al.  Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.

[15]  Alex ChiChung Kot,et al.  Semi-fragile watermarking for text document images authentication , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[16]  Dongning Zhao,et al.  A Method of Protecting Relational Databases Copyright with Cloud Watermark , 2007 .

[17]  Jianmin Wang,et al.  Fingerprinting relational databases , 2006, SAC '06.

[18]  Gaurav Gupta,et al.  Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.

[19]  Chang-Tsun Li,et al.  Oblivious fragile watermarking scheme for image authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[20]  Jiwu Huang,et al.  Image fragile watermarking based on fusion of multi-resolution tamper detection , 2002 .

[21]  Ibrahim Kamel A schema for protecting the integrity of databases , 2009, Comput. Secur..

[22]  Jianmin Wang,et al.  An Improved Algorithm to Watermark Numeric Relational Data , 2005, WISA.

[23]  Xingming Sun,et al.  A Fragile Zero-Watermarking Technique for Authentication of Relational Databases , 2011 .

[24]  Min Huang,et al.  A new watermark mechanism for relational data , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[25]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[26]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[27]  Luis E. Anido-Rifón,et al.  A Restful Approach for Managing Citizen profiles Using A Semantic Support , 2010, ArXiv.

[28]  Edward J. Delp,et al.  Temporal synchronization in video watermarking , 2004, IEEE Transactions on Signal Processing.

[29]  Radu Sion,et al.  Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.

[30]  Agostino Cortesi,et al.  A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.

[31]  Ali Al-Haj,et al.  Robust and Blind Watermarking of Relational Database Systems , 2008 .

[32]  Minghua Chen,et al.  A fragile watermark error detection scheme for wireless video communications , 2005, IEEE Transactions on Multimedia.

[33]  Robert H. Deng,et al.  A Block Oriented Fingerprinting Scheme in Relational Database , 2004, ICISC.

[34]  Peter Eisert,et al.  Digital watermarking of MPEG-4 facial animation parameters , 1998, Comput. Graph..

[35]  Haiqing Wang,et al.  A Speech Based Algorithm for Watermarking Relational Databases , 2008, 2008 International Symposiums on Information Processing.

[36]  Xiang Zhou,et al.  An additive-attack-proof watermarking mechanism for databases' copyrights protection using image , 2007, SAC '07.

[37]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.