Protection of Relational Databases by Means of Watermarking: Recent Advances and Challenges

Databases represent today great economical and strategic concerns for both enterprises and public institutions. In that context, where data leaks, robbery as well as innocent or even hostile data degradation represent a real danger, and watermarking appears as an interesting tool. Watermarking is based on the imperceptible embedding of a message or watermark into a database in order, for instance, to determine its origin as well as to detect if it has been modified. A major advantage of watermarking in relation to other digital content protection mechanisms is that it leaves access to the data while keeping them pro‐ tected by means of a watermark, independent of the data format storage. Nevertheless, it is necessary to ensure that the introduced distortion does not perturb the exploitation of the database. In this chapter, we give a general overview of the latest database watermark‐ ing methods, focusing on those dealing with distortion control. In particular, we present a recent technique based on an ontological modeling of the database semantics that rep‐ resent the relationships in between attributes—relationships that should be preserved in order to avoid the appearance of incoherent and unlikely records.

[1]  Nora Cuppens-Boulahia,et al.  Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[3]  Camélia Constantin,et al.  Watermill: An Optimized Fingerprinting System for Databases under Constraints , 2008, IEEE Transactions on Knowledge and Data Engineering.

[4]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[5]  Gaurav Gupta,et al.  Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.

[6]  Bian Yang,et al.  Reversible Watermarking for Relational Database Authentication , 2006 .

[7]  Haiqing Wang,et al.  A Speech Based Algorithm for Watermarking Relational Databases , 2008, 2008 International Symposiums on Information Processing.

[8]  David Gross-Amblard,et al.  Query-preserving watermarking of relational databases and XML documents , 2003, PODS '03.

[9]  Radu Sion,et al.  Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.

[10]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.

[11]  Radu Sion,et al.  Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.

[12]  Agostino Cortesi,et al.  A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.

[13]  Ali Al-Haj,et al.  Robust and Blind Watermarking of Relational Database Systems , 2008 .

[14]  Hsien-Chu Wu,et al.  Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction , 2012, 2012 International Symposium on Computer, Consumer and Control.

[15]  M. Atallah,et al.  Watermarking Relational Databases , 2002 .

[16]  Christian Roux,et al.  Lossless watermarking of categorical attributes for verifying medical data base integrity , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[17]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[18]  Junmin Liu,et al.  A Novel Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion , 2013 .

[19]  Christian Roux,et al.  Watermarking Medical Images with Anonymous Patient Identification to Verify Authenticity , 2008, MIE.

[20]  Nora Cuppens-Boulahia,et al.  Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.

[21]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[22]  David Gross-Amblard,et al.  Query-preserving watermarking of relational databases and Xml documents , 2011, TODS.

[23]  Shi-Jinn Horng,et al.  A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..

[24]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[25]  Elisa Bertino,et al.  Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.

[26]  Muddassar Farooq,et al.  A Formal Usability Constraints Model for Watermarking of Outsourced Datasets , 2013, IEEE Transactions on Information Forensics and Security.

[27]  Huiping Guo,et al.  Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.

[28]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[29]  Zhijie Liu,et al.  Text format based relational database watermarking for non-numeric data , 2010, 2010 International Conference On Computer Design and Applications.

[30]  Gouenou Coatrieux,et al.  Robust Watermarking of Relational Databases With Ontology-Guided Distortion Control , 2015, IEEE Transactions on Information Forensics and Security.

[31]  Muddassar Farooq,et al.  A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.

[32]  Chin-Chen Chang,et al.  A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key , 2014, IWDW.

[33]  V. Prasannaku A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .

[34]  Ming Zhou,et al.  ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[35]  Ibrahim Kamel,et al.  Toward protecting the integrity of relational databases , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).

[36]  Fabian M. Suchanek,et al.  Adding fake facts to ontologies , 2012, WWW.

[37]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[38]  Vahab Pournaghshband A new watermarking approach for relational data , 2008, ACM-SE 46.

[39]  Xingming Sun,et al.  Query Preserving Relational Database Watermarking , 2011, Informatica.

[40]  Ton Kalker,et al.  Chapter 12 – Steganography , 2008 .

[41]  Asunción Gómez-Pérez,et al.  Applications of Ontologies and Problem-Solving Methods , 1999, AI Mag..

[42]  Jie Guo,et al.  Fragile Watermarking Scheme for Tamper Detection of Relational Database , 2011, 2011 International Conference on Computer and Management (CAMAN).