Over the past few years, reversible watermarking techniques for relational databases have been proposed to provide protection of ownership rights, data tempering, and data integrity. Mainly, these techniques ensure original data recovery from watermarked data, whereas irreversible watermarking schemes only protect ownership rights. This characteristic of reversible watermarking has emerged as a candidate solution for the protection of ownership rights of data, intolerable to modifications such as medical data, genetic data, credit card, and bank account data. The main objective of this paper is to make an extensive survey of the state-of-the-art in reversible watermarking techniques for relational databases to reflect recent research progress and to point out the key issues for future research. In order to analyze these techniques, a classification has been performed on the basis of (i) the extent of modifications introduced by the watermarking scheme in the underlying data and (ii) the robustness of the embedded watermark against malicious attacks.Reversible watermarking techniques [10,11,26] provide security for trial versions of database applications. The original full version of the database application can be recovered from the decoded database subsequently, dependent on whether the user purchases the license of the database application. For example, database applications providing this facility are IBM DB2 [27] and Oracle [28].
High-capacity watermarkingReversible watermarking techniques provide a mechanism to utilize the available bandwidth for maximum water-Security Comm. Networks (2015) A survey on reversible watermarking techniques for RDB mark robustness by minimizing distortions in the data and increasing watermark capacity [29,30]. With high watermark capacity, less distortion is introduced in the underlying data. High-capacity watermarking is required in critical databases such as those pertaining to military and health care domains.
Original data recoveryReversible watermarking techniques provide high-quality datasets (without any alterations) for data mining and other information extraction processes [10,11,30,31]. In some relational database applications such as electronic medical records systems, data mining is used to extract patient data for decision making. As increasing amount of medical data is made available by practitioners and health care providers for conversion into digital format, cases of fraud [32] and data privacy breach crop up at an alarming rate [33]. Thus, in such shared environments, ownership and digital rights are required to be protected from illegal use by malicious users.Security Comm. Networks (2015) Ã 1 - ( 13) where (b(i; n, p) = nkp i (1p) n-i ).Security Comm. Networks (2015) Distortion-based reversible watermarking techniques introduce less distortion in the underlying data and are highly robust against malicious attacks. Distortion-free fragile watermarking techniques introduce zero distortion in the underlying data and are not robust against malicious attacks. ...