Database relation watermarking resilient against secondary watermarking attacks
Data(s) |
2009
|
---|---|
Resumo |
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks. |
Identificador | |
Publicador |
Springer Verlag |
Relação |
DOI:10.1007/978-3-642-10772-6_17 Gupta, Gaurav & Pieprzyk, Josef (2009) Database relation watermarking resilient against secondary watermarking attacks. Lecture Notes in Computer Science : Information Systems Security, 5905, pp. 222-236. |
Direitos |
Copyright 2009 Springer Verlag |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Palavras-Chave | #080200 COMPUTATION THEORY AND MATHEMATICS #080300 COMPUTER SOFTWARE #080400 DATA FORMAT #Computer Communication Networks #Systems and Data Security #Information Storage and Retrieval #Management of Computing and Information Systems #Biometrics #Data Encryption |
Tipo |
Journal Article |