Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
Over the past few years, reversible watermarking techniques for relational databases have been proposed to provide protection of ownership rights, data tempering, and data integrity. Mainly, these techniques ensure original data recovery from watermarked data, whereas irreversible watermarking schemes only protect ownership rights. This characteristic of reversible watermarking has emerged as a candidate solution for the protection of ownership rights of data, intolerable to modifications such as medical data, genetic data, credit card, and bank account data. The main objective of this paper is to make an extensive survey of the state-of-the-art in reversible watermarking techniques for relational databases to reflect recent research progress and to point out the key issues for future research. In order to analyze these techniques, a classification has been performed on the basis of (i) the extent of modifications introduced by the watermarking scheme in the underlying data and (ii) the robustness of the embedded watermark against malicious attacks.Reversible watermarking techniques [10,11,26] provide security for trial versions of database applications. The original full version of the database application can be recovered from the decoded database subsequently, dependent on whether the user purchases the license of the database application. For example, database applications providing this facility are IBM DB2 [27] and Oracle [28]. High-capacity watermarkingReversible watermarking techniques provide a mechanism to utilize the available bandwidth for maximum water-Security Comm. Networks (2015) A survey on reversible watermarking techniques for RDB mark robustness by minimizing distortions in the data and increasing watermark capacity [29,30]. With high watermark capacity, less distortion is introduced in the underlying data. High-capacity watermarking is required in critical databases such as those pertaining to military and health care domains. Original data recoveryReversible watermarking techniques provide high-quality datasets (without any alterations) for data mining and other information extraction processes [10,11,30,31]. In some relational database applications such as electronic medical records systems, data mining is used to extract patient data for decision making. As increasing amount of medical data is made available by practitioners and health care providers for conversion into digital format, cases of fraud [32] and data privacy breach crop up at an alarming rate [33]. Thus, in such shared environments, ownership and digital rights are required to be protected from illegal use by malicious users.Security Comm. Networks (2015) Ã 1 - ( 13) where (b(i; n, p) = nkp i (1p) n-i ).Security Comm. Networks (2015) Distortion-based reversible watermarking techniques introduce less distortion in the underlying data and are highly robust against malicious attacks. Distortion-free fragile watermarking techniques introduce zero distortion in the underlying data and are not robust against malicious attacks. ...
Over the past few years, reversible watermarking techniques for relational databases have been proposed to provide protection of ownership rights, data tempering, and data integrity. Mainly, these techniques ensure original data recovery from watermarked data, whereas irreversible watermarking schemes only protect ownership rights. This characteristic of reversible watermarking has emerged as a candidate solution for the protection of ownership rights of data, intolerable to modifications such as medical data, genetic data, credit card, and bank account data. The main objective of this paper is to make an extensive survey of the state-of-the-art in reversible watermarking techniques for relational databases to reflect recent research progress and to point out the key issues for future research. In order to analyze these techniques, a classification has been performed on the basis of (i) the extent of modifications introduced by the watermarking scheme in the underlying data and (ii) the robustness of the embedded watermark against malicious attacks.Reversible watermarking techniques [10,11,26] provide security for trial versions of database applications. The original full version of the database application can be recovered from the decoded database subsequently, dependent on whether the user purchases the license of the database application. For example, database applications providing this facility are IBM DB2 [27] and Oracle [28]. High-capacity watermarkingReversible watermarking techniques provide a mechanism to utilize the available bandwidth for maximum water-Security Comm. Networks (2015) A survey on reversible watermarking techniques for RDB mark robustness by minimizing distortions in the data and increasing watermark capacity [29,30]. With high watermark capacity, less distortion is introduced in the underlying data. High-capacity watermarking is required in critical databases such as those pertaining to military and health care domains. Original data recoveryReversible watermarking techniques provide high-quality datasets (without any alterations) for data mining and other information extraction processes [10,11,30,31]. In some relational database applications such as electronic medical records systems, data mining is used to extract patient data for decision making. As increasing amount of medical data is made available by practitioners and health care providers for conversion into digital format, cases of fraud [32] and data privacy breach crop up at an alarming rate [33]. Thus, in such shared environments, ownership and digital rights are required to be protected from illegal use by malicious users.Security Comm. Networks (2015) Ã 1 - ( 13) where (b(i; n, p) = nkp i (1p) n-i ).Security Comm. Networks (2015) Distortion-based reversible watermarking techniques introduce less distortion in the underlying data and are highly robust against malicious attacks. Distortion-free fragile watermarking techniques introduce zero distortion in the underlying data and are not robust against malicious attacks. ...
Genetic data, in digital format, is used in different biological phenomena such as DNA translation, mRNA transcription and protein synthesis. The accuracy of these biological phenomena depend on genetic codes and all subsequent processes. To computerize the biological procedures, different domain experts are provided with the authorized access of the genetic codes; as a consequence, the ownership protection of such data is inevitable. For this purpose, watermarks serve as the proof of ownership of data. While protecting data, embedded hidden messages (watermarks) influence the genetic data; therefore, the accurate execution of the relevant processes and the overall result becomes questionable. Most of the DNA based watermarking techniques modify the genetic data and are therefore vulnerable to information loss. Distortion-free techniques make sure that no modifications occur during watermarking; however, they are fragile to malicious attacks and therefore cannot be used for ownership protection (particularly, in presence of a threat model). Therefore, there is a need for a technique that must be robust and should also prevent unwanted modifications. In this spirit, a watermarking technique with aforementioned characteristics has been proposed in this paper. The proposed technique makes sure that: (i) the ownership rights are protected by means of a robust watermark; and (ii) the integrity of genetic data is preserved. The proposed technique—GenInfoGuard—ensures its robustness through the “watermark encoding” in permuted values, and exhibits high decoding accuracy against various malicious attacks.
Databases play an important role today in every modern organization, verifying their integrity is needed. Watermarking can be used to protect the integrity of database. In this paper, we present a secure fragile embedding watermark technique to verify the authenticity of an outsourced numeric relational database. Our technique treats the watermark embedding as an optimization problem by securely inserting a single watermark bit in individual database partition and the optimal threshold is computed for watermark detection. The approach partitions the database in different groups of square matrix and modifies the database while preserving the field values usability constraints. The database group determinant value is used to compute the position of field to be marked. Furthermore, we evaluated our scheme on a real case study and results show its effectiveness. The proposed scheme can detect and localize the malicious modifications made to the database. The proposed technique is highly resilient to common attacks and it overcomes some limitations of previous approaches on fragile watermarking.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.