Open AccessProceedings Article
A distortion free watermark framework for relational databases
Sukriti Bhattacharya,Agostino Cortesi +1 more
- Vol. 2, pp 229-234
Reads0
Chats0
TLDR
A distortion free invisible watermarking technique for relational databases to build the watermark after partitioning tuples with actual attribute values and getting a watermark as a permutation of tuples in the original table.Abstract:
In this paper we introduce a distortion free invisible watermarking technique for relational databases. The main idea is to build the watermark after partitioning tuples with actual attribute values. Then, we build hash functions on top of this grouping and get a watermark as a permutation of tuples in the original table. As the ordering of tuples does not affect the original database, this technique is distortion free. Our contribution can be seen as an application to relational databases of software watermarking ideas developed within the Abstract Interpretation framework.read more
Citations
More filters
Journal ArticleDOI
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
TL;DR: The current state-of-the- art watermarking techniques are surveyed and they are classified according to their intent, the way they express the watermark, the cover type, the granularity level, and their verifiability.
Journal ArticleDOI
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Aihab Khan,Syed Afaq Husain +1 more
TL;DR: A fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation, which characterizes the malicious data modifications to quantify the nature of tempering attacks and resolves the inherent conflict between security and imperceptibility.
Journal ArticleDOI
A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints
TL;DR: This paper proposes a robust and efficient watermarking scheme for relational databases that is able to meet all above-mentioned four challenges and does not require that a database owner defines usability constraints for each type of application and every recipient separately.
Journal ArticleDOI
A New Robust Approach for Reversible Database Watermarking with Distortion Control
Donghui Hu,Dan Zhao,Shuli Zheng +2 more
TL;DR: Experimental results demonstrate the effectiveness of GAHSW and show that it outperforms state-of-the-art approaches in terms of robustness against malicious attacks and preservation of data quality.
Journal ArticleDOI
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation
Javier Franco-Contreras,Gouenou Coatrieux,Frédéric Cuppens,Nora Cuppens-Boulahia,Christian Roux +4 more
TL;DR: The robust reversible watermarking modulation originally proposed by Vleeschouwer for images to the protection of relational databases is adapted and compared with two recent and efficient schemes so as to prove its benefits.
References
More filters
Journal ArticleDOI
Watermarking, tamper-proofing, and obfuscation - tools for software protection
TL;DR: Three types of attack on the intellectual property contained in software and three corresponding technical defenses are identified, including obfuscation, watermarking, and tamper-proofing.
The Keyed-Hash Message Authentication Code (HMAC) | NIST
Elaine B. Barker,Quynh H. Dang +1 more
TL;DR: This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions, which can be used with any iterative FIPS-approved cryptographic hash function, in combination with a shared secret key.
Journal ArticleDOI
Watermarking relational data: framework, algorithms and analysis
TL;DR: This paper presents an effective watermarking technique geared for relational data that is robust against various forms of malicious attacks as well as benign updates to the data and performs well enough to be used in real-world applications.
Journal ArticleDOI
Ranking and unranking permutations in linear time
Wendy Myrvold,Frank Ruskey +1 more
TL;DR: A ranking function for the permutations on n symbols assigns a unique integer in the range [0,n !− 1] to each of the n! permutations.
Proceedings ArticleDOI
An abstract interpretation-based framework for software watermarking
Patrick Cousot,Radhia Cousot +1 more
TL;DR: This work introduces the novel concept of abstract software watermarking, a static analysis-based approach that allows the watermark to be recovered even if only a small part of the program code is present and does not even need that code to be executed.