Abstract
In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This paper is a revised and extended version of [17]
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 238–301 (1998)
Langelaar, G., Setyawan, I., Lagendijk, R.: Watermarking digital image and video data: A state-of-art overview. IEEE Signal Processing 17, 20–46 (2000)
Potdar, V., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: The Proceeding of the 3rd International IEEE Conference on Industrial Informatics, pp. 709–716 (2005)
Arnold, M., Schumucker, M., Wolthusen, S.: Techniques and Applications of Digital Watermarking and Content Protection. Artech House (2003) ISBN: 10: 1580531113
Bassia, P., Pitas, L., Nikolaidis, N.: Robust audio watermarking in the time-domain. IEEE Trans. Multimedia, 232–242 (2001), doi:10.1109/6046.923822
Lemma, A., Aprea, J., Kherkhof, L.: A temporal-domain audio watermarking technique. IEEE Trans. Signal Process (2003), doi:10.1109/TSP.2003.809372
O’ Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking digital images for copyright protection. IEEE Proc. Vision Signal, Image Procesing 143, 250–256 (1996)
Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12, 157–169 (2003)
Bhattacharya, S., Cortesi, A.: A Generic Distortion Free Watermarking Technique for Relational Databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252–264. Springer, Heidelberg (2009)
Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Proceedings of the 6th ACM Symp. on Principles of Programming Languages, pp. 269–282 (1979)
Cousot, P., Cousot, R.: Abstract interpretation frameworks. Logic and Comp., 511–547 (1992)
Cousot, P.: Abstract Interpretation Based Formal Methods and Future Challenges. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 138–156. Springer, Heidelberg (2001)
Ng, W., Lau, H.-L.: Effective Approaches for Watermarking XML Data. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol. 3453, pp. 68–80. Springer, Heidelberg (2005)
Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. In: Proceedings of the Nineteenth ACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems, pp. 191–201 (2003)
Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Digital Rights Management Workshop, pp. 73–82 (2004)
Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations 176, 1350–1378 (2006)
Bhattacharya, S., Cortesi, A.: Distortion-Free Authentication Watermarking. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds.) ICSOFT 2010. CCIS, vol. 170, pp. 205–219. Springer, Heidelberg (2012)
The Keyed-Hash Message Authentication Code HMAC. Federal Information Process Standards Publication (2002)
Wu, Y.: Zero-Distortion Authentication Watermarking. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 325–337. Springer, Heidelberg (2003)
De Bra, P., Paredaens, J.: An algorithm for horizontal decompositions. Inf. Process. Lett. 17, 91–95 (1983)
Myrvold, W., Ruskey, F.: Ranking and unranking permutations in linear time. Information Processing Letters (2000)
Bhattacharya, S., Cortesi, A.: A distortion free watermarking framework for relational databases. In: The Proceeding of 4th International Conference on Software and Data Technology, ICSOFT 2009, Sofia, Bulgaria, 229–234 (2009)
Halder, R., Cortesi, A.: A Persistent Public Watermarking of Relational Databases. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 216–230. Springer, Heidelberg (2010)
Halder, R., Cortesi, A.: Watermarking Techniques for Relational Databases: Survey, Classification and Comparison. Journal of Universal Computer Science 16(21), 3164–3190 (2010)
Sion, R.: Proving ownership over categorical data. In: Proceedings of IEEE International Conference on Data Engineering, pp. 584–596 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhattacharya, S., Cortesi, A. (2013). Distortion-Free Authentication Watermarking.. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds) Software and Data Technologies. ICSOFT 2010. Communications in Computer and Information Science, vol 170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29578-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-29578-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29577-5
Online ISBN: 978-3-642-29578-2
eBook Packages: Computer ScienceComputer Science (R0)