Watermarking of uncompressed and compressed video
Signal Processing
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Reversible and blind database watermarking using difference expansion
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Reversible watermark using the difference expansion of a generalized integer transform
IEEE Transactions on Image Processing
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Genetic algorithm and difference expansion based reversible watermarking for relational databases
Journal of Systems and Software
Reversible watermarking scheme for medical image based on differential evolution
Expert Systems with Applications: An International Journal
Hi-index | 12.05 |
Digital watermarking technology has been adopted lately as an effective solution to protecting the copyright of digital assets from illicit copying. Reversible watermark, which is also called invertible watermark, or erasable watermark, helps to recover back the original data after the content has been authenticated. Such reversibility is highly desired in some sensitive database applications, e.g. in military and medical data. Permanent distortion is one of the main drawbacks of the entire irreversible relational database watermarking schemes. In this paper, we design an authentication protocol based on an efficient time-stamp protocol, and we propose a blind reversible watermarking method that ensures ownership protection in the field of relational database watermarking. Whereas previous techniques have been mainly concerned with introducing permanent errors into the original data, our approach ensures one hundred percent recovery of the original database relation after the owner-specific watermark has been detected and authenticated. In the proposed watermarking method, we utilize a reversible data-embedding technique called prediction-error expansion on integers to achieve reversibility. The detection of the watermark can be completed successfully even when 95% of a watermarked relation tuples are deleted. Our extensive analysis shows that the proposed scheme is robust against various forms of database attacks, including adding, deleting, shuffling or modifying tuples or attributes.