scispace - formally typeset
Open AccessProceedings Article

A distortion free watermark framework for relational databases

Reads0
Chats0
TLDR
A distortion free invisible watermarking technique for relational databases to build the watermark after partitioning tuples with actual attribute values and getting a watermark as a permutation of tuples in the original table.
Abstract
In this paper we introduce a distortion free invisible watermarking technique for relational databases. The main idea is to build the watermark after partitioning tuples with actual attribute values. Then, we build hash functions on top of this grouping and get a watermark as a permutation of tuples in the original table. As the ordering of tuples does not affect the original database, this technique is distortion free. Our contribution can be seen as an application to relational databases of software watermarking ideas developed within the Abstract Interpretation framework.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Watermarking Techniques for Relational Databases: Survey, Classification and Comparison

TL;DR: The current state-of-the- art watermarking techniques are surveyed and they are classified according to their intent, the way they express the watermark, the cover type, the granularity level, and their verifiability.
Journal ArticleDOI

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

TL;DR: A fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation, which characterizes the malicious data modifications to quantify the nature of tempering attacks and resolves the inherent conflict between security and imperceptibility.
Journal ArticleDOI

A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints

TL;DR: This paper proposes a robust and efficient watermarking scheme for relational databases that is able to meet all above-mentioned four challenges and does not require that a database owner defines usability constraints for each type of application and every recipient separately.
Journal ArticleDOI

A New Robust Approach for Reversible Database Watermarking with Distortion Control

TL;DR: Experimental results demonstrate the effectiveness of GAHSW and show that it outperforms state-of-the-art approaches in terms of robustness against malicious attacks and preservation of data quality.
Journal ArticleDOI

Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation

TL;DR: The robust reversible watermarking modulation originally proposed by Vleeschouwer for images to the protection of relational databases is adapted and compared with two recent and efficient schemes so as to prove its benefits.
References
More filters
Journal ArticleDOI

Watermarking, tamper-proofing, and obfuscation - tools for software protection

TL;DR: Three types of attack on the intellectual property contained in software and three corresponding technical defenses are identified, including obfuscation, watermarking, and tamper-proofing.

The Keyed-Hash Message Authentication Code (HMAC) | NIST

TL;DR: This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions, which can be used with any iterative FIPS-approved cryptographic hash function, in combination with a shared secret key.
Journal ArticleDOI

Watermarking relational data: framework, algorithms and analysis

TL;DR: This paper presents an effective watermarking technique geared for relational data that is robust against various forms of malicious attacks as well as benign updates to the data and performs well enough to be used in real-world applications.
Journal ArticleDOI

Ranking and unranking permutations in linear time

TL;DR: A ranking function for the permutations on n symbols assigns a unique integer in the range [0,n !− 1] to each of the n! permutations.
Proceedings ArticleDOI

An abstract interpretation-based framework for software watermarking

TL;DR: This work introduces the novel concept of abstract software watermarking, a static analysis-based approach that allows the watermark to be recovered even if only a small part of the program code is present and does not even need that code to be executed.
Related Papers (5)