scispace - formally typeset
Open AccessJournal ArticleDOI

HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data

Reads0
Chats0
TLDR
The metrics are introduced to allow precise measuring of the quality of the VPKs generated by any scheme without requiring to perform the watermark embedding, so that time waste can be avoided in case of low-quality detection.
Abstract
Most of the watermarking techniques designed to protect relational data often use the Primary Key (PK) of relations to perform the watermark synchronization. Despite offering high confidence to the watermark detection, these approaches become useless if the PK can be erased or updated. A typical example is when an attacker wishes to use a stolen relation, unlinked to the rest of the database. In that case, the original values of the PK lose relevance, since they are not employed to check the referential integrity. Then, it is possible to erase or replace the PK, compromising the watermark detection with no need to perform the slightest modification on the rest of the data. To avoid the problems caused by the PK-dependency some schemes have been proposed to generate Virtual Primary Keys (VPK) used instead. Nevertheless, the quality of the watermark synchronized using VPKs is compromised due to the presence of duplicate values in the set of VPKs and the fragility of the VPK schemes against the elimination of attributes. In this paper, we introduce the metrics to allow precise measuring of the quality of the VPKs generated by any scheme without requiring to perform the watermark embedding. This way, time waste can be avoided in case of low-quality detection. We also analyze the main aspects to design the ideal VPK scheme, seeking the generation of high-quality VPK sets adding robustness to the process. Finally, a new scheme is presented along with the experiments carried out to validate and compare the results with the rest of the schemes proposed in the literature.

read more

Citations
More filters
Journal ArticleDOI

Semantic-driven watermarking of relational textual databases

TL;DR: A semantic-driven watermarking approach of relational textual databases is proposed, which marks multi-word textual attributes, exploiting the synonym substitution technique for text water marking together with notions in semantic similarity analysis, and dealing with the semantic perturbations provoked by the watermark embedding.
Journal ArticleDOI

Fingerprinting of Relational Databases for Stopping the Data Theft

TL;DR: A novel fingerprinting framework has been proposed using a biometric feature as a digital mark (signature) to make this framework intelligent, particularly for preserving the data usability.
Journal ArticleDOI

Comparative Analysis of Relational Database Watermarking Techniques: An Empirical Study

TL;DR: An exhaustive empirical study and thorough comparative analysis of various relational database watermarking techniques in the literature along with a rigorous experimental analysis demonstrating a detailed comparison on robustness, data usability, and computational cost with considerable empirical evidence is provided.
Journal ArticleDOI

A Double Fragmentation Approach for Improving Virtual Primary Key-Based Watermark Synchronization

TL;DR: This paper proposes double fragmentation of the watermark by using the existing redundancy in the set of virtual primary keys to guarantee the right identification of theWatermark despite the deletion of any of the attributes of the relation.
Journal ArticleDOI

Relational Database Watermarking Techniques: A Survey

TL;DR: Watermarking is used for the protection of the possession rights of shared Relational Data and for providing the solution for manipulating and tampering of data.
References
More filters
Book

An Introduction to Database Systems

C. J. Date
TL;DR: Readers of this book will gain a strong working knowledge of the overall structure, concepts, and objectives of database systems and will become familiar with the theoretical principles underlying the construction of such systems.
Book ChapterDOI

Watermarking relational databases

TL;DR: The need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for water marking, and provide desirable properties of a watermarked system for relational data are enunciated.
BookDOI

Digital Watermarking and Steganography: Fundamentals and Techniques

TL;DR: It is shown how robust high-capacity watermarking techniques can be successfully used to enlarge the hiding capacity while maintaining the robustness of the watermark.
Journal ArticleDOI

Watermarking relational data: framework, algorithms and analysis

TL;DR: This paper presents an effective watermarking technique geared for relational data that is robust against various forms of malicious attacks as well as benign updates to the data and performs well enough to be used in real-world applications.
Journal ArticleDOI

Watermarking Techniques for Relational Databases: Survey, Classification and Comparison

TL;DR: The current state-of-the- art watermarking techniques are surveyed and they are classified according to their intent, the way they express the watermark, the cover type, the granularity level, and their verifiability.
Trending Questions (1)
What is primary key in database design?

In database design, a primary key uniquely identifies each record in a table. The paper focuses on generating virtual primary keys to enhance watermarking resilience.