scispace - formally typeset
Open AccessPosted Content

Models and Algorithms for Graph Watermarking

Reads0
Chats0
TLDR
In this article, the feasibility of graph watermarking is investigated in terms of keygen, marking, and identification functions defined over graph families with known distributions. And the authors demonstrate the strength of this approach with exemplary water-marking schemes for two random graph models, the classic Erdős-Renyi model and a random power-law graph model, both of which are used to model real-world networks.
Abstract
We introduce models and algorithmic foundations for graph watermarking. Our frameworks include security definitions and proofs, as well as characterizations when graph watermarking is algorithmically feasible, in spite of the fact that the general problem is NP-complete by simple reductions from the subgraph isomorphism or graph edit distance problems. In the digital watermarking of many types of files, an implicit step in the recovery of a watermark is the mapping of individual pieces of data, such as image pixels or movie frames, from one object to another. In graphs, this step corresponds to approximately matching vertices of one graph to another based on graph invariants such as vertex degree. Our approach is based on characterizing the feasibility of graph watermarking in terms of keygen, marking, and identification functions defined over graph families with known distributions. We demonstrate the strength of this approach with exemplary watermarking schemes for two random graph models, the classic Erdős-Renyi model and a random power-law graph model, both of which are used to model real-world networks.

read more

Citations
More filters
Posted Content

Beyond the Hype: On Using Blockchains in Trust Management for Authentication

TL;DR: In this paper, the authors investigate the merits of using open distributed ledgers (ODLs) for securing trust management systems for authentication, and explore how blockchain can help mitigate attacks against them.
Journal ArticleDOI

Evaluating the topological quality of watermarked vector maps

TL;DR: A metric forasuring topological quality by measuring topological distortions is proposed based on topological properties of polygon-based vector maps, and experiments indicate that the metrics allow comparisons between watermarked maps of different sizes and of different watermark sizes, and, thus, can be used to assess the quality of watermarked vector maps.
Posted Content

Reconciling Graphs and Sets of Sets

TL;DR: Graph reconciliation is explored, providing protocols based on sets of sets reconciliation for random graphs from G(n,p) and for forests of rooted trees.
Dissertation

An Exploration of Two-Party Reconciliation Problems

TL;DR: This thesis explores various two-party reconciliation problems from a theoretical perspective, and introduces and study several new reconciliation problems, such as reconciling sets of sets, undirected graphs, and directories.
Posted Content

Two RPG Flow-graphs for Software Watermarking using Bitonic Sequences of Self-inverting Permutations.

TL;DR: It is shown that a self-inverting permutation can be efficiently encoded into either of the types of flow-graphs available for software watermarking or efficiently decoded from theses graph structures and enhance the resilience of the codec system to attacks.
References
More filters
Book

Computers and Intractability: A Guide to the Theory of NP-Completeness

TL;DR: The second edition of a quarterly column as discussed by the authors provides a continuing update to the list of problems (NP-complete and harder) presented by M. R. Garey and myself in our book "Computers and Intractability: A Guide to the Theory of NP-Completeness,” W. H. Freeman & Co., San Francisco, 1979.
Journal ArticleDOI

Power-Law Distributions in Empirical Data

TL;DR: This work proposes a principled statistical framework for discerning and quantifying power-law behavior in empirical data by combining maximum-likelihood fitting methods with goodness-of-fit tests based on the Kolmogorov-Smirnov (KS) statistic and likelihood ratios.
Proceedings ArticleDOI

Measurement and analysis of online social networks

TL;DR: This paper examines data gathered from four popular online social networks: Flickr, YouTube, LiveJournal, and Orkut, and reports that the indegree of user nodes tends to match the outdegree; the networks contain a densely connected core of high-degree nodes; and that this core links small groups of strongly clustered, low-degree node at the fringes of the network.
Proceedings ArticleDOI

Friendship and mobility: user movement in location-based social networks

TL;DR: A model of human mobility that combines periodic short range movements with travel due to the social network structure is developed and it is shown that this model reliably predicts the locations and dynamics of future human movement and gives an order of magnitude better performance.
BookDOI

The structure and dynamics of networks

TL;DR: The degree distribution, twopoint correlations, and clustering are the studied topological properties and an evolution of networks is studied to shed light on the influence the dynamics has on the network topology.
Related Papers (5)