A robust technique for relational database watermarking and verification
Citations
[...]
76 citations
Cites background or methods from "A robust technique for relational d..."
...[162] At rest A technique for watermarking textual data in relational database Melkundi & Chandandkhede [163] At rest A technique for watermarking both textual and numeric data in a relational database...
[...]
...Melkundi and Chandandkhede [163] proposes a watermarking technique for watermarking both textual and numeric data in a relational database to address the issue of data ownership and copyright....
[...]
...Our review reveals that a number of countermeasures ([39], [43], [45], [68], [86], [91], [99], [128], [163], [174], [177], [173] ) require manual efforts during deployment and operations such as (a) having a dedicated network administrator to promote a node from one security zone to another based on the sensitivity of the node [43]; (b) involvement of user for approval of each single data transfer out of user’s computer [68]; (c) manual addition of dummy records to the database for cyber deception [86]; (d) manually dividing a single table into several tables [91]; (e) involvement of expert investigators for manually gathering evidence of data leakage to identify the data leaker [174]; (f) manual writing of rules regarding sensitive data [173]; and (g) semi-automatic deployments [39]....
[...]
18 citations
14 citations
Cites background or methods from "A robust technique for relational d..."
...Table 7: The requirement analysis of MelkundiChandankhede’s scheme [21]...
[...]
...[21], all belong to data distortion watermarking relational databases....
[...]
...The technique proposed by Swathi Melkundi and Chaitali Chandankhede [21]....
[...]
12 citations
Cites background from "A robust technique for relational d..."
...Based on that assumption, the majority of watermarking techniques proposed to protect relational data are PK-dependent (e.g. Franco-Contreras et al., 2014; İmamoğlu et al., 2015; Kamran et al., 2013; Melkundi and Chandankhede, 2015; Pérez Gort et al., 2017b)....
[...]
...Since it was published, the AHK algorithm has become the main model followed for PK-dependent techniques, which constitute the majority of watermarking techniques for relational data....
[...]
...Based on that assumption, the majority of watermarking techniques proposed to protect relational data are PK-dependent (e.g. Franco-Contreras et al., 2014; İmamoğlu et al., 2015; Kamran et al., 2013; Melkundi and Chandankhede, 2015; Pérez Gort et al., 2017b)....
[...]
11 citations
References
388 citations
382 citations
188 citations
135 citations
"A robust technique for relational d..." refers methods in this paper
...The method proposed in [8] uses a partitioning approach that does not require marker tuple....
[...]