Preventing Additive Attacks to Relational Database Watermarking

False ownership claims are carried on through additive and invertibility attacks and, as far as we know, current relational watermarking techniques are not always able to solve the ownership doubts raising from the latter attacks. In this paper, we focus on additive attacks. We extend a conventional image-based relational data watermarking scheme by creating a non-colluded backup of the data owner marks, the so-called secondary marks positions. The technique we propose is able to identify the data owner beyond any doubt.

[1]  Xiang Zhou,et al.  An additive-attack-proof watermarking mechanism for databases' copyrights protection using image , 2007, SAC '07.

[2]  Nasir D. Memon,et al.  Watermarking and ownership problem: a revisit , 2005, DRM '05.

[3]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[4]  Agostino Cortesi,et al.  Watermarking Techniques for Relational Databases: Survey, Classification and Comparison , 2010 .

[5]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[6]  Gaurav Gupta,et al.  Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.

[7]  Xingming Sun,et al.  A Fragile Zero-Watermarking Technique for Authentication of Relational Databases , 2011 .

[8]  Subariah Ibrahim,et al.  A new approach for relational database watermarking using image , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[9]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[10]  Radu Sion,et al.  Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..

[11]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[12]  Sushil Jajodia,et al.  Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases , 2004, DBSec.

[13]  Claudia Feregrino Uribe,et al.  A Minimum Distortion: High Capacity Watermarking Technique for Relational Data , 2017, IH&MMSec.

[14]  R. Manjula,et al.  A new Relational Watermarking Scheme Resilient to Additive Attacks , 2010 .

[15]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[16]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.