Robust image watermarking in the spatial domain
Signal Processing
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Authentic Third-party Data Publication
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
A checksum-based corruption detection technique
Journal of Computer Security - IFIP 2000
Multipurpose Audio Watermarking
ICPR '00 Proceedings of the International Conference on Pattern Recognition - Volume 3
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Authenticating Query Results in Edge Computing
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A fragile watermark error detection scheme for wireless video communications
IEEE Transactions on Multimedia
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Dual domain watermarking for authentication and compression of cultural heritage images
IEEE Transactions on Image Processing
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
Feature based robust watermarking using image normalization
Computers and Electrical Engineering
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
Fine-grained cloud DB damage examination based on bloom filters
WAIM'10 Proceedings of the 11th international conference on Web-age information management
A persistent public watermarking of relational databases
ICISS'10 Proceedings of the 6th international conference on Information systems security
An SVD-based image watermarking in wavelet domain using SVR and PSO
Applied Soft Computing
Generalizing database forensics
ACM Transactions on Database Systems (TODS)
Information Sciences: an International Journal
Hi-index | 0.07 |
Nowadays, with more and more data publicly available on the Internet, it is increasingly important to ensure the integrity of these data. The traditional solution is to use a digital signature scheme. However, a digital signature can only detect whether the entire data set has been modified; it cannot localize and characterize the modifications. In this paper, a novel fragile watermarking scheme is proposed to detect malicious modifications of database relations. In the proposed scheme, all tuples in a database relation are first securely divided into groups; watermarks are embedded and verified group by group independently. The embedded watermarks cannot only detect but also localize, and even characterize, the modifications made to the database. In the worst case, the modifications can be narrowed down to tuples in a group. Rigorous analysis shows that the modifications can be detected and localized with high probability, which is also demonstrated by our experimental results.