Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Models and issues in data stream systems
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Maintaining stream statistics over sliding windows: (extended abstract)
SODA '02 Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Experience with software watermarking
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Streaming queries over streaming data
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Monitoring streams: a new class of data management applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Reverse nearest neighbor aggregates over data streams
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Spread-spectrum watermarking of audio signals
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Practical algorithm for data security (PADS) in wireless sensor networks
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
A recurrent decentralized key management architecture for wireless sensor network
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
An authentication method for self nodes based on watermarking in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A fractal watermark solution for product data
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
A clustered routing protocol with distributed intrusion detection for wireless sensor networks
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
Semi-fragile watermark for sensor data
International Journal of Internet Protocol Technology
Rights protection for data cubes
ISC'06 Proceedings of the 9th international conference on Information Security
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Solvability of a system of bivariate polynomial equations over a finite field
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
Today's world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis, environmental sensing, web clicks and intrusion detection are just a few of the examples where valuable data is streamed. Often, streaming information is offered on the basis of a non-exclusive, single-use customer license. One major concern, especially given the digital nature of the valuable stream, is the ability to easily record and potentially "re-play" parts of it in the future. If there is value associated with such future re-plays, it could constitute enough incentive for a malicious customer (Mallory) to duplicate segments of such recorded data, subsequently re-selling them for profit. Being able to protect against such infringements becomes a necessity. In this paper we introduce the issue of rights protection for discrete streaming data through watermarking. This is a novel problem with many associated challenges including: operating in a finite window, single-pass, (possibly) high-speed streaming model, surviving natural domain specific transforms and attacks (e.g.extreme sparse sampling and summarizations), while at the same time keeping data alterations within allowable bounds. We propose a solution and analyze its resilience to various types of attacks as well as some of the important expected domain-specific transforms, such as sampling and summarization. We implement a proof of concept software (wms.*) and perform experiments on real sensor data from the NASA Infrared Telescope Facility at the University of Hawaii, to assess encoding resilience levels in practice. Our solution proves to be well suited for this new domain. For example, we can recover an over 97% confidence watermark from a highly down-sampled (e.g. less than 8%) stream or survive stream summarization (e.g. 20%) and random alteration attacks with very high confidence levels, often above 99%.