Watermarking of uncompressed and compressed video
Signal Processing
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Digital Watermarks for Audio Signals
ICMCS '96 Proceedings of the 1996 International Conference on Multimedia Computing and Systems
IEEE Journal on Selected Areas in Communications
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
A system for watermarking relational databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
A fuzzy reasoning scheme for context sharing decision making
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A novel method of watermarking relational databases using character string
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image
Proceedings of the 2007 ACM symposium on Applied computing
A blind, fast and robust method for geographical data watermarking
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Watermarking Relational Databases Using Optimization-Based Techniques
IEEE Transactions on Knowledge and Data Engineering
Ownership protection of shape datasets with geodesic distance preservation
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Reversible and blind database watermarking using difference expansion
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
A Novel Framework for Watermarking: The Data-Abstracted Approach
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Digital watermarking for relational databases using traceability parameter
International Journal of Computer Applications in Technology
Embedding and Retrieving Private Metadata in Electrocardiograms
Journal of Medical Systems
A new watermark approach for protection of databases
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Database Relation Watermarking Resilient against Secondary Watermarking Attacks
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
A Generic Distortion Free Watermarking Technique for Relational Databases
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences: an International Journal
An authentication method for self nodes based on watermarking in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A novel relational database watermarking algorithm
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Geo-WDBMS: an improved DBMS with the function of watermarking geographical data
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
A novel watermark technique for relational databases
AICI'10 Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part II
A method for trust management in cloud computing: Data coloring by cloud watermarking
International Journal of Automation and Computing
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
Reliable provenance information for multimedia data using invertible fragile watermarks
BNCOD'11 Proceedings of the 28th British national conference on Advances in databases
Rights protection for data cubes
ISC'06 Proceedings of the 9th international conference on Information Security
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Watermarking spatial trajectory database
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
Effective approaches for watermarking XML data
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
A block oriented fingerprinting scheme in relational database
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Watermarking geographical data on spatial topological relations
Multimedia Tools and Applications
An improved algorithm to watermark numeric relational data
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Right-protected data publishing with hierarchical clustering preservation
Proceedings of the 21st ACM international conference on Information and knowledge management
Watermarking road maps against crop and merge attacks
Proceedings of the first ACM workshop on Information hiding and multimedia security
Leakage detection and tracing for databases
Proceedings of the first ACM workshop on Information hiding and multimedia security
Generalizing database forensics
ACM Transactions on Database Systems (TODS)
Hi-index | 0.00 |
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking, and provide desirable properties of a watermarking system for relational data. A watermark can be applied to any database relation having attributes which are such that changes in a few of their values do not affect the applications. We then present an effective watermarking technique geared for relational data. This technique ensures that some bit positions of some of the attributes of some of the tuples contain specific values. The tuples, attributes within a tuple, bit positions in an attribute, and specific bit values are all algorithmically determined under the control of a private key known only to the owner of the data. This bit pattern constitutes the watermark. Only if one has access to the private key can the watermark be detected with high probability. Detecting the watermark neither requires access to the original data nor the watermark. The watermark can be detected even in a small subset of a watermarked relation as long as the sample contains some of the marks. Our extensive analysis shows that the proposed technique is robust against various forms of malicious attacks and updates to the data. Using an implementation running on DB2, we also show that the performance of the algorithms allows for their use in real world applications.