A robust technique for relational database watermarking and verification
TL;DR: This paper proposes a new watermarking technique, which will watermark both textual and numerical data and does watermark verification where, the watermark extracted from the database is compared with the original watermark that is known only to the owner of the database.
Abstract: Outsourcing of data is increasing with the rapid growth of internet. There is every possibility that data reaches illegal hands. As a result, there is increase in illegal copying of data, piracy, illegal redistribution, forgery and theft. Watermarking technology is a solution for these challenges. It addresses the ownership problem. It deters illegal copying and protects copyright of data. Watermarking technology mainly involves the process of watermark insertion and watermark extraction. Watermark insertion means embedding an imperceptible watermark in the relational database. In watermark extraction we extract the embedded watermark without the help of original database. In this paper we propose a new watermarking technique, which will watermark both textual and numerical data. Our proposed method also does watermark verification where, the watermark extracted from the database is compared with the original watermark that is known only to the owner of the database. This is accomplished through Levenshtein distance algorithm.
...read more
Citations
[...]
39 citations
Cites background or methods from "A robust technique for relational d..."
...[162] At rest A technique for watermarking textual data in relational database Melkundi & Chandandkhede [163] At rest A technique for watermarking both textual and numeric data in a relational database...
[...]
...Melkundi and Chandandkhede [163] proposes a watermarking technique for watermarking both textual and numeric data in a relational database to address the issue of data ownership and copyright....
[...]
...Our review reveals that a number of countermeasures ([39], [43], [45], [68], [86], [91], [99], [128], [163], [174], [177], [173] ) require manual efforts during deployment and operations such as (a) having a dedicated network administrator to promote a node from one security zone to another based on the sensitivity of the node [43]; (b) involvement of user for approval of each single data transfer out of user’s computer [68]; (c) manual addition of dummy records to the database for cyber deception [86]; (d) manually dividing a single table into several tables [91]; (e) involvement of expert investigators for manually gathering evidence of data leakage to identify the data leaker [174]; (f) manual writing of rules regarding sensitive data [173]; and (g) semi-automatic deployments [39]....
[...]
11 citations
Cites background or methods from "A robust technique for relational d..."
...Table 7: The requirement analysis of MelkundiChandankhede’s scheme [21]...
[...]
...[21], all belong to data distortion watermarking relational databases....
[...]
...The technique proposed by Swathi Melkundi and Chaitali Chandankhede [21]....
[...]
5 citations
4 citations
Cites background from "A robust technique for relational d..."
...That is why most of the following techniques, proposed since 2002, are also PK-dependent [4, 8, 11]....
[...]
4 citations
Cites background from "A robust technique for relational d..."
...Based on that assumption, the majority of watermarking techniques proposed to protect relational data are PK-dependent (e.g. Franco-Contreras et al., 2014; İmamoğlu et al., 2015; Kamran et al., 2013; Melkundi and Chandankhede, 2015; Pérez Gort et al., 2017b)....
[...]
...Since it was published, the AHK algorithm has become the main model followed for PK-dependent techniques, which constitute the majority of watermarking techniques for relational data....
[...]
...Based on that assumption, the majority of watermarking techniques proposed to protect relational data are PK-dependent (e.g. Franco-Contreras et al., 2014; İmamoğlu et al., 2015; Kamran et al., 2013; Melkundi and Chandankhede, 2015; Pérez Gort et al., 2017b)....
[...]
References
383 citations
372 citations
188 citations
121 citations
"A robust technique for relational d..." refers methods in this paper
...The method proposed in [8] uses a partitioning approach that does not require marker tuple....
[...]