Skip to main content

Distortion-Free Authentication Watermarking.

  • Conference paper
Software and Data Technologies (ICSOFT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 170))

Included in the following conference series:

Abstract

In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.

This paper is a revised and extended version of [17]

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 238–301 (1998)

    Article  Google Scholar 

  2. Langelaar, G., Setyawan, I., Lagendijk, R.: Watermarking digital image and video data: A state-of-art overview. IEEE Signal Processing 17, 20–46 (2000)

    Article  Google Scholar 

  3. Potdar, V., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: The Proceeding of the 3rd International IEEE Conference on Industrial Informatics, pp. 709–716 (2005)

    Google Scholar 

  4. Arnold, M., Schumucker, M., Wolthusen, S.: Techniques and Applications of Digital Watermarking and Content Protection. Artech House (2003) ISBN: 10: 1580531113

    Google Scholar 

  5. Bassia, P., Pitas, L., Nikolaidis, N.: Robust audio watermarking in the time-domain. IEEE Trans. Multimedia, 232–242 (2001), doi:10.1109/6046.923822

    Google Scholar 

  6. Lemma, A., Aprea, J., Kherkhof, L.: A temporal-domain audio watermarking technique. IEEE Trans. Signal Process (2003), doi:10.1109/TSP.2003.809372

    Google Scholar 

  7. O’ Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking digital images for copyright protection. IEEE Proc. Vision Signal, Image Procesing 143, 250–256 (1996)

    Article  Google Scholar 

  8. Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12, 157–169 (2003)

    Article  Google Scholar 

  9. Bhattacharya, S., Cortesi, A.: A Generic Distortion Free Watermarking Technique for Relational Databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252–264. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Proceedings of the 6th ACM Symp. on Principles of Programming Languages, pp. 269–282 (1979)

    Google Scholar 

  11. Cousot, P., Cousot, R.: Abstract interpretation frameworks. Logic and Comp., 511–547 (1992)

    Google Scholar 

  12. Cousot, P.: Abstract Interpretation Based Formal Methods and Future Challenges. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 138–156. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Ng, W., Lau, H.-L.: Effective Approaches for Watermarking XML Data. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol. 3453, pp. 68–80. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. In: Proceedings of the Nineteenth ACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems, pp. 191–201 (2003)

    Google Scholar 

  15. Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Digital Rights Management Workshop, pp. 73–82 (2004)

    Google Scholar 

  16. Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations 176, 1350–1378 (2006)

    Google Scholar 

  17. Bhattacharya, S., Cortesi, A.: Distortion-Free Authentication Watermarking. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds.) ICSOFT 2010. CCIS, vol. 170, pp. 205–219. Springer, Heidelberg (2012)

    Google Scholar 

  18. The Keyed-Hash Message Authentication Code HMAC. Federal Information Process Standards Publication (2002)

    Google Scholar 

  19. Wu, Y.: Zero-Distortion Authentication Watermarking. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 325–337. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  20. De Bra, P., Paredaens, J.: An algorithm for horizontal decompositions. Inf. Process. Lett. 17, 91–95 (1983)

    Article  MATH  Google Scholar 

  21. Myrvold, W., Ruskey, F.: Ranking and unranking permutations in linear time. Information Processing Letters (2000)

    Google Scholar 

  22. Bhattacharya, S., Cortesi, A.: A distortion free watermarking framework for relational databases. In: The Proceeding of 4th International Conference on Software and Data Technology, ICSOFT 2009, Sofia, Bulgaria, 229–234 (2009)

    Google Scholar 

  23. Halder, R., Cortesi, A.: A Persistent Public Watermarking of Relational Databases. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 216–230. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  24. Halder, R., Cortesi, A.: Watermarking Techniques for Relational Databases: Survey, Classification and Comparison. Journal of Universal Computer Science 16(21), 3164–3190 (2010)

    Google Scholar 

  25. Sion, R.: Proving ownership over categorical data. In: Proceedings of IEEE International Conference on Data Engineering, pp. 584–596 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhattacharya, S., Cortesi, A. (2013). Distortion-Free Authentication Watermarking.. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds) Software and Data Technologies. ICSOFT 2010. Communications in Computer and Information Science, vol 170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29578-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29578-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29577-5

  • Online ISBN: 978-3-642-29578-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics