Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Digital watermarking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Efficient Certificate Revocation
Efficient Certificate Revocation
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Key Independent Watermark Detection
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Reversible and blind database watermarking using difference expansion
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Digital watermarking for relational databases using traceability parameter
International Journal of Computer Applications in Technology
A new watermarking approach for relational data
Proceedings of the 46th Annual Southeast Regional Conference on XX
Database Relation Watermarking Resilient against Secondary Watermarking Attacks
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
A persistent public watermarking of relational databases
ICISS'10 Proceedings of the 6th international conference on Information systems security
Leakage detection and tracing for databases
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
Today, watermarking techniques have been extended from the multimedia context to relational databases so as to protect the ownership of data even after the data are published or distributed. However, all existing watermarking schemes for relational databases are secret key based, thus require a secret key to be presented in proof of ownership. This means that the ownership can only be proven once to the public (e.g., to the court). After that, the secret key is known to the public and the embedded watermark can be easily destroyed by malicious users. Moreover, most of the existing techniques introduce distortions to the underlying data in the watermarking process, either by modifying least significant bits or exchanging categorical values. The distortions inevitably reduce the value of the data. In this paper, we propose a watermarking scheme by which the ownership of data can be publicly proven by anyone, as many times as necessary. The proposed scheme is distortion-free, thus suitable for watermarking any type of data without fear of error constraints. The proposed scheme is robust against typical database attacks including tuple/attribute insertion/deletion, random/selective value modification, data frame-up, and additive attacks.