[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A Graded Reversible Watermarking Scheme for Relational Data

Published: 01 August 2021 Publication History

Abstract

Reversible watermarking is an important method of information hiding, which has been widely used in copyright protection of relational data. Reversible watermarking is more advanced than its predecessors in many ways. It can be used not only to claim copyright but also to recover the original data. However, existing schemes do not allow control of the extent of data recovery. Watermarked data are either completely restored to the original version or kept unchanged. After analyzing the current problems, a graded reversible watermarking scheme for relational data is proposed here. By removing the arbitrary portion of the watermark, data quality can be enhanced incrementally. The notion of data quality grade is defined to describe the impact of watermark embedding on the usability of data. Four fundamental algorithms are designed to facilitate the processes of watermark embedding, data quality grade detection, watermark detection, and data quality grade enhancement. Before data distribution, numbers of data quality grades can be predefined. Graded reversibility can be achieved by upgrading watermarked data from low to higher data quality grades. A watermark with any data quality grade is enough to claim copyright. With watermarks embedded into different data partitions, flexible watermark reversion can be achieved via partitioned auxiliary data design. A more practical mechanism is devised to efficiently handle hash table collisions and reduce both computational and storage overheads. Tests of the computational performance of the algorithms and their response to various attacks showed that the proposed scheme is feasible and robust.

References

[1]
Riad K, Ke LS (2018) Secure storage and retrieval of IoT data based on private information retrieval. Wirel Commun Mob Comput 2018.
[2]
Gao CZ, Lv SY, Wei Y, Wang Z, Liu ZL, and Cheng XC M-SSE: An effective searchable symmetric encryption with enhanced security for mobile devices IEEE Access 2018 6 38860-38869
[3]
Katzenbeisser S and Petitcolas FA Information hiding techniques for steganography and digital watermarking 2000 Norwood Artech House
[4]
Yu NH (2004) The research of the theories and methods of digital media information hiding. Doctor, University of Science and Technology of China
[5]
Cox IJ, Kilian J, Leighton FT, and Shamoon T Secure spread spectrum watermarking for multimedia IEEE Trans Image Process 1997 6 12 1673-1687
[6]
An L, Gao X, Li X, Tao D, Deng C, and Li J Robust reversible watermarking via clustering and enhanced pixel-wise masking IEEE Trans Image Process 2012 21 8 3598-3611
[7]
Alattar AM Reversible watermark using the difference expansion of a generalized integer transform IEEE Trans Image Process 2004 13 8 1147-1156
[8]
Hollaar LA Legal protection of digital information 2002 New York BNA Books
[9]
Agrawal R, Kiernan J (2002) Watermarking relational databases. In: Proceedings of the 28th international conference on very large data bases. Margan Kaufmann, San Francisco, pp 155–166
[10]
Sion R, Atallah M, and Prabhakar S Rights protection for categorical data IEEE Trans Knowl Data Eng 2005 17 7 912-926
[11]
Niu XM, Zhao L, Huang WJ, and Zhang H Watermarking relational databases for ownership protection Acta Electron Sin 2003 31 s1 2050-2053
[12]
Zhang ZH, Jin XM, Wang JM, and Li DY Watermarking relational database using image Int Conf Mach Learn Cybern 2004 3 1739-1744
[13]
Meng YJ, Zhang W, Wu C, et al. A relational database watermarking algorithm based on information entropy J Comput Res Dev 2006 43 s3 262-266
[14]
Xiang Y, Li JY, and Pan JF Database watermarking algorithm based on virtual primary key J Comput Res Dev 2009 46 s1 66-70
[15]
Zhou G and Wu KM Research on zero-watermarking model of relational databases based on improved C4.5 algorithm Comput Appl Softw 2015 32 1 64-67
[16]
Melkundi S, Chandankhede C (2015) A robust technique for relational database watermarking and verification. In: International conference on communication, information & computing technology, IEEE, pp 1–7
[17]
Liu K, Liu J, and Liu SL A RS error correcting coding based watermarking algorithm for relational database Commun Technol 2016 49 6 764-768
[18]
Rani S, Koshley DK, Halder R (2017) Adapting mapreduce for efficient watermarking of large relational dataset. In: 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, pp 729–736
[19]
Zhang Y, Yang B, and Niu XM Reversible watermarking for relational database authentication J Comput 2006 2 17 59-65
[20]
Gupta G, Pieprzyk J (2008) Reversible and blind database watermarking using difference expansion. In: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, ICST, pp 24–29
[21]
Chang JN, Wu HC (2012) Reversible fragile database watermarking technology using difference expansion based on svr prediction. In: International symposium on computer, consumer and control. IEEE, Washington, DC, pp 690–693
[22]
Jawad K and Khan A Genetic algorithm and difference expansion based reversible watermarking for relational databases J Syst Softw 2013 11 86 2742-2753
[23]
Franco-Contreras J, Coatrieux G, Cuppens F, et al. Robust lossless watermarking of relational databases based on circular histogram modulation IEEE Trans Inf Forensics Secur 2014 9 3 397-410
[24]
Iftikhar S, Kamran M, and Anwar Z RRW – a robust and reversible watermarking technique for relational data IEEE Trans Knowl Data Eng 2015 4 27 1132-1145
[25]
Zhang Y and Niu XM Reversible watermarking technique for relational data Acta Electron Sin 2006 12A 34 2425-2428
[26]
Farfoura ME and Horng SJ A novel blind reversible method for watermarking relational databases J Chin Inst Eng 2013 1 36 87-97
[27]
Imamoglu MB, Ulutas M, and Ulutas G A new reversible database watermarking approach with firefly optimization algorithm Math Probl Eng 2017 2017 2 1-14
[28]
Jiang CX, Cheng XH, Xu XL, et al. Reversible database watermark based on integer wavelet transform J Guilin Univ Technol 2017 37 1 191-195
[29]
Feng DG Security protocols: theory and practice 2011 Beijing Tsinghua University Press
[30]
Hu Y (2010) Research and implementation of RSA algorithm. Master, Beijing University of Posts and Telecommunications
[31]
Huang ZG, Lai JZ, Chen WB, Raees-ul-Haq M, and Jiang LL Practical public key encryption with selective opening security for receivers Inf Sci 2019 478 15-27
[32]
Huang ZG, Lai JZ, Chen WB, Li T, and Xiang Y Data security against receiver corruptions: SOA security for receivers from simulatable DEMs Inf Sci 2019 471 201-215
[33]
Rong HG, Mo JX, Chang BG, et al. Key distribution and recovery algorithm based on Shamir’s secret sharing J Commun 2015 2015 3 60-69
[34]
TPC-H. http://www.tpc.org/tpch/default.asp. Last accessed 28 Aug 2017

Cited By

View all
  • (2024)Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational DatabasesInformation and Communications Security10.1007/978-981-97-8801-9_15(289-309)Online publication date: 27-Aug-2024
  • (2022)Challenging Channels: Encrypted Covert Channels within Challenge-Response AuthenticationProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544455(1-10)Online publication date: 23-Aug-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Mobile Networks and Applications
Mobile Networks and Applications  Volume 26, Issue 4
Aug 2021
414 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 August 2021

Author Tags

  1. Watermark
  2. Graded reversible
  3. Copyright
  4. Relational data

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational DatabasesInformation and Communications Security10.1007/978-981-97-8801-9_15(289-309)Online publication date: 27-Aug-2024
  • (2022)Challenging Channels: Encrypted Covert Channels within Challenge-Response AuthenticationProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544455(1-10)Online publication date: 23-Aug-2022

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media