A Double Fragmentation Approach for Improving Virtual Primary Key-Based Watermark Synchronization

Relational data watermarking techniques using virtual primary key schemes try to avoid compromising watermark detection due to the deletion or replacement of the relation’s primary key. Nevertheless, these techniques face the limitations that bring high redundancy of the generated set of virtual primary keys, which often compromises the quality of the embedded watermark. As a solution to this problem, this paper proposes double fragmentation of the watermark by using the existing redundancy in the set of virtual primary keys. This way, we guarantee the right identification of the watermark despite the deletion of any of the attributes of the relation. The experiments carried out to validate our proposal show an increment between 81.04% and 99.05% of detected marks with respect to previous solutions found in the literature. Furthermore, we found out that our approach takes advantage of the redundancy present in the set of virtual primary keys. Concerning the computational complexity of the solution, we performed a set of scalability tests that show the linear behavior of our approach with respect to the processes runtime and the number of tuples involved, making it feasible to use no matter the amount of data to be protected.

[1]  Nadia N. Qadri,et al.  Fingerprinting non-numeric datasets using row association and pattern generation , 2017, 2017 International Conference on Communication Technologies (ComTech).

[2]  Shampa Chakraverty,et al.  Enabling information recovery with ownership using robust multiple watermarks , 2016, J. Inf. Secur. Appl..

[3]  M. Atallah,et al.  Watermarking Relational Databases , 2002 .

[4]  Abid Yahya,et al.  Steganography Techniques for Digital Images , 2018 .

[5]  Abdul Rauf Baig,et al.  Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[6]  Sushil Jajodia,et al.  Constructing a virtual primary key for fingerprinting relational data , 2003, DRM '03.

[7]  Agostino Cortesi,et al.  Persistent Watermarking of Relational Databases , 2010 .

[8]  Mudassar Raza,et al.  Prefix oriented N4WA coding scheme for improved tampering detection in relational data , 2016 .

[9]  Claudia Feregrino Uribe,et al.  HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data , 2019, Expert Syst. Appl..

[10]  Shaozhang Niu,et al.  Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matrices , 2018, IWDW.

[11]  V PramodK.,et al.  Robust optimal position detection scheme for relational database watermarking through HOLPSOFA algorithm , 2017, J. Inf. Secur. Appl..

[12]  Agostino Cortesi,et al.  Database Authentication by Distortion Free Watermarking , 2010, ICSOFT.

[13]  Chin-Chen Chang,et al.  A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key , 2014, IWDW.

[14]  Claudia Feregrino Uribe,et al.  A Highly-Reliable Virtual Primary Key Scheme for Relational Database Watermarking Techniques , 2017, 2017 International Conference on Computational Science and Computational Intelligence (CSCI).

[15]  Raju Halder,et al.  A Watermarking Framework for Outsourced and Distributed Relational Databases , 2016, FDSE.

[16]  Claudia Feregrino Uribe,et al.  Preventing Additive Attacks to Relational Database Watermarking , 2019, CONFENIS.

[17]  Amit Kumar Singh,et al.  Survey of robust and imperceptible watermarking , 2018, Multimedia Tools and Applications.

[18]  Stéphane Bressan,et al.  Introduction to Database Systems , 2005 .

[19]  Agostino Cortesi,et al.  Watermarking Techniques for Relational Databases: Survey, Classification and Comparison , 2010 .

[20]  Frank Y. Shih,et al.  Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .

[21]  Subariah Ibrahim,et al.  A new approach for relational database watermarking using image , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[22]  Jianhua Sun,et al.  Multiple Watermarking Relational Databases Using Image , 2008, 2008 International Conference on MultiMedia and Information Technology.

[23]  Azizah Abd Manaf,et al.  A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database , 2017 .