The protection of computer software---its technology and applications
The protection of computer software---its technology and applications
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Information hiding: steganography and watermarking—attacks and countermeasures
Information hiding: steganography and watermarking—attacks and countermeasures
Digital watermarking
Improved Boneh-Shaw Content Fingerprinting
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Error- and Collusion-Secure Fingerprinting for Digital Data
IH '99 Proceedings of the Third International Workshop on Information Hiding
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Print signatures for document authentication
Proceedings of the 10th ACM conference on Computer and communications security
Watermarking relational data: framework, algorithms and analysis
The VLDB Journal — The International Journal on Very Large Data Bases
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A block oriented fingerprinting scheme in relational database
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Auditing disclosure by relevance ranking
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Watermarking Relational Databases Using Optimization-Based Techniques
IEEE Transactions on Knowledge and Data Engineering
Tamper proofing mechanisms for motion capture data
Proceedings of the 10th ACM workshop on Multimedia and security
Security deciding in publishing views based on entropy
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
A new watermark approach for protection of databases
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
A new cell counter based attack against tor
Proceedings of the 16th ACM conference on Computer and communications security
A method of deciding the security in publishing views
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A potential HTTP-based application-level attack against Tor
Future Generation Computer Systems
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
A novel watermark technique for relational databases
AICI'10 Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part II
Query-preserving watermarking of relational databases and Xml documents
ACM Transactions on Database Systems (TODS)
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part I
Rights protection for data cubes
ISC'06 Proceedings of the 9th international conference on Information Security
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Hi-index | 0.00 |
In this paper, we present a technique for fingerprinting relational data by extending Agrawal et al.'s watermarking scheme. The primary new capability provided by our scheme is that, under reasonable assumptions, it can embed and detect arbitrary bit-string marks in relations. This capability, which is not provided by prior techniques, permits our scheme to be used as a fingerprinting scheme. We then present quantitative models of the robustness properties of our scheme. These models demonstrate that fingerprints embedded by our scheme are detectable and robust against a wide variety of attacks including collusion attacks.