Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Watermarking applications and their properties
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Multipurpose Audio Watermarking
ICPR '00 Proceedings of the International Conference on Pattern Recognition - Volume 3
Providing Database as a Service
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A fragile watermark error detection scheme for wireless video communications
IEEE Transactions on Multimedia
Fingerprinting relational databases
Proceedings of the 2006 ACM symposium on Applied computing
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Watermarking Relational Databases Using Optimization-Based Techniques
IEEE Transactions on Knowledge and Data Engineering
Reversible and blind database watermarking using difference expansion
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Psycho-acoustic model-based message authentication coding for audio data
Proceedings of the 10th ACM workshop on Multimedia and security
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences: an International Journal
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
A persistent public watermarking of relational databases
ICISS'10 Proceedings of the 6th international conference on Information systems security
Logistic map-based fragile watermarking for pixel level tamper detection and resistance
EURASIP Journal on Information Security
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
A new scheme to fingerprint XML data
KDXD'06 Proceedings of the First international conference on Knowledge Discovery from XML Documents
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Generalizing database forensics
ACM Transactions on Database Systems (TODS)
Hi-index | 0.00 |
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In this paper, we propose to make use of fragile watermarks to detect and localize malicious alterations made to a database relation with categorical attributes. Unlike other watermarking schemes which inevitably introduce distortions to the cover data, the proposed scheme is distortion free. In our algorithm, all tuples in a database relation are first securely divided into groups according to some secure parameters. Watermarks are embedded and verified in each group independently. Thus, any modifications can be localized to some specific groups. Theoretical analysis shows that the probability of missing detection is very low.