Abstract
Protection of digital assets from piracy has received increasing interests where sensitive, valuable data need to be released. This paper addresses the problem of watermarking spatial trajectory database. The formal definition of the problem is given and the potential attacks are analyzed. Then a novel watermarking method is proposed, which embed the watermark information by introducing a small error to the trajectory shape rather than certain data values. Experimental results justify the usefulness of the proposed method, and give some empirical conclusions on the parameter settings.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Priyantha, N., Miu, A., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: Proc. of MOBICOM 2001, pp. 1–14 (2001)
Chen, G., Kotz, D.: Categorizing binary topological relations between regions, lines, and points in geographic databases. Technical Report TR2000-381, A Survey of Context-Aware Mobile Computing Research, Dept. of Computer Science, Dartmouth College (2000)
Vlachos, M., Kollios, G., Gunopulos, D.: Discovering Similar Multidimensional Trajectories. In: Proc. of the 18th International Conference on Data Engineering (ICDE 2002), San Jose, California (2002)
Patel, J.M., Chen, Y., Chakka, V.P.: STRIPES: An Efficient Index for Predicted Trajectories. In: Proceedings of ACM SIGMOD 2004, pp. 635–646 (2004)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proceedings of ACM SIGMOD 2004, pp. 563–574 (2004)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding - A Survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)
Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal of Selected Areas in Communications 16(4), 573–586 (1998)
Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of the IEEE 87(7), 1079–1107 (1999)
Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking Digital Images for Copyright Protection. IEEE Proceedings on Vision, Signal and Image Processing 143(4), 250–256 (1996)
Cox, I.J., Linnartz, J.P.M.G.: Some General Methods for Tampering with Watermarks. IEEE Journal of Selected Areas in Communication 16(4), 573–586 (1998)
Collberg, C., Thomborson, C.: On the Limits of Software Watermarking. Technique Reports, Department of Computer Sciences, The University of Auckland (1998)
Chang, H., Atallah, M.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 160–175. Springer, Heidelberg (2002)
Collberg, C., Carter, E., Debray, S., Huntwork, A., Linn, C., Stepp, M.: Dynamic path-based software watermarking. In: SIGPLAN 2004 Conference on Programming Language Design and Implementation (2004)
Agrawal, R., Kiernan, J.: Watermarking Relational Databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)
Sion, R., Atallah, M., Prabhakar, S.: Rights Protection for Relational Data. In: Proceedings of ACM SIGMOD, pp. 98–109 (2003)
Ohbuchi, R., Masuda, H., Aono, M.: A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces. In: Computer Graphics International 1999 (CGI 1999), Canmore, Canada (1999)
Ohbuchi, R., Ueda, H., Endoh, S.: Robust Watermarking of Vector Digital Maps. In: Proceedings of the IEEE International Conference on Multimedia and Expo 2002 (ICME 2002), Lausanne, Switzerland (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jin, X., Zhang, Z., Wang, J., Li, D. (2005). Watermarking Spatial Trajectory Database. In: Zhou, L., Ooi, B.C., Meng, X. (eds) Database Systems for Advanced Applications. DASFAA 2005. Lecture Notes in Computer Science, vol 3453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11408079_8
Download citation
DOI: https://doi.org/10.1007/11408079_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25334-1
Online ISBN: 978-3-540-32005-0
eBook Packages: Computer ScienceComputer Science (R0)