Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Experience with software watermarking
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Power: A Metric for Evaluating Watermarking Algorithms
ITCC '02 Proceedings of the International Conference on Information Technology: Coding and Computing
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A robust watermarking system based on SVD compression
Proceedings of the 2006 ACM symposium on Applied computing
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A fractal watermark solution for product data
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
Reliable provenance information for multimedia data using invertible fragile watermarks
BNCOD'11 Proceedings of the 28th British national conference on Advances in databases
Solvability of a system of bivariate polynomial equations over a finite field
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Watermarking geographical data on spatial topological relations
Multimedia Tools and Applications
Watermarking non-numerical databases
MDAI'06 Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence
A new scheme to fingerprint XML data
KDXD'06 Proceedings of the First international conference on Knowledge Discovery from XML Documents
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Leakage detection and tracing for databases
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
This paper introduces a novel method of rightsprotection for categorical data through watermarking.We discover new watermark embedding channelsfor relational data with categorical types. Wedesign novel watermark encoding algorithms andanalyze important theoretical bounds including markvulnerability. While fully preserving data qualityrequirements, our solution survives important attacks,such as subset selection and random alterations. Markdetection is fully "blind" in that it doesn't require theoriginal data, an important characteristic especiallyin the case of massive data. We propose variousimprovements and alternative encoding methods. Weperform validation experiments by watermarking theoutsourced Wal-Mart sales data available at ourinstitute. We prove (experimentally and by analysis)our solution to be extremely resilient to both alterationand data loss attacks, for example tolerating up to 80%data loss with a watermark alteration of only 25%.