Abstract
In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.
This paper is a revised and extended version of [17]
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 238–301 (1998)
Langelaar, G., Setyawan, I., Lagendijk, R.: Watermarking digital image and video data: A state-of-art overview. IEEE Signal Processing 17, 20–46 (2000)
Potdar, V., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: The Proceeding of the 3rd International IEEE Conference on Industrial Informatics, pp. 709–716 (2005)
Arnold, M., Schumucker, M., Wolthusen, S.: Techniques and Applications of Digital Watermarking and Content Protection. Artech House (2003) ISBN: 10: 1580531113
Bassia, P., Pitas, L., Nikolaidis, N.: Robust audio watermarking in the time-domain. IEEE Trans. Multimedia, 232–242 (2001), doi:10.1109/6046.923822
Lemma, A., Aprea, J., Kherkhof, L.: A temporal-domain audio watermarking technique. IEEE Trans. Signal Process (2003), doi:10.1109/TSP.2003.809372
O’ Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking digital images for copyright protection. IEEE Proc. Vision Signal, Image Procesing 143, 250–256 (1996)
Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12, 157–169 (2003)
Bhattacharya, S., Cortesi, A.: A Generic Distortion Free Watermarking Technique for Relational Databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252–264. Springer, Heidelberg (2009)
Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Proceedings of the 6th ACM Symp. on Principles of Programming Languages, pp. 269–282 (1979)
Cousot, P., Cousot, R.: Abstract interpretation frameworks. Logic and Comp., 511–547 (1992)
Cousot, P.: Abstract Interpretation Based Formal Methods and Future Challenges. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 138–156. Springer, Heidelberg (2001)
Ng, W., Lau, H.-L.: Effective Approaches for Watermarking XML Data. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol. 3453, pp. 68–80. Springer, Heidelberg (2005)
Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. In: Proceedings of the Nineteenth ACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems, pp. 191–201 (2003)
Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Digital Rights Management Workshop, pp. 73–82 (2004)
Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations 176, 1350–1378 (2006)
Bhattacharya, S., Cortesi, A.: Distortion-Free Authentication Watermarking. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds.) ICSOFT 2010. CCIS, vol. 170, pp. 205–219. Springer, Heidelberg (2012)
The Keyed-Hash Message Authentication Code HMAC. Federal Information Process Standards Publication (2002)
Wu, Y.: Zero-Distortion Authentication Watermarking. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 325–337. Springer, Heidelberg (2003)
De Bra, P., Paredaens, J.: An algorithm for horizontal decompositions. Inf. Process. Lett. 17, 91–95 (1983)
Myrvold, W., Ruskey, F.: Ranking and unranking permutations in linear time. Information Processing Letters (2000)
Bhattacharya, S., Cortesi, A.: A distortion free watermarking framework for relational databases. In: The Proceeding of 4th International Conference on Software and Data Technology, ICSOFT 2009, Sofia, Bulgaria, 229–234 (2009)
Halder, R., Cortesi, A.: A Persistent Public Watermarking of Relational Databases. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 216–230. Springer, Heidelberg (2010)
Halder, R., Cortesi, A.: Watermarking Techniques for Relational Databases: Survey, Classification and Comparison. Journal of Universal Computer Science 16(21), 3164–3190 (2010)
Sion, R.: Proving ownership over categorical data. In: Proceedings of IEEE International Conference on Data Engineering, pp. 584–596 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhattacharya, S., Cortesi, A. (2013). Distortion-Free Authentication Watermarking.. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds) Software and Data Technologies. ICSOFT 2010. Communications in Computer and Information Science, vol 170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29578-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-29578-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29577-5
Online ISBN: 978-3-642-29578-2
eBook Packages: Computer ScienceComputer Science (R0)