Skip to main content

Watermarking Non-numerical Databases

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3885))

Abstract

This paper presents a new watermarking method for protecting non-numerical databases. The proposed watermarking system allows the data owner to define a similarity function in order to reduce the distortion caused by watermark embedding while, at the same time, reducing the number of element modifications needed by the embedding process. A mathematical analysis is provided to justify the robustness of the mark against different types of malicious attacks. The usefulness of this extensible and robust method is illustrated by describing some application domains and examples.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jordan, F., Vynne, T.: Motion vector watermarking. Patent, Laboratoire de Traitement des Signaux École Polytechnique Fédérale de Lausanne (1997)

    Google Scholar 

  2. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)

    Article  MATH  Google Scholar 

  3. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding: techniques for steganography and digital watermarking. Computer security series. Artech House (2000)

    Google Scholar 

  4. Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic reidentification of redistributors. Electronics Letters 34, 1303–1304 (1998)

    Article  Google Scholar 

  5. Pitas, I., Kaskalis, T.H.: Applying signatures on digital images. In: IEEE Workshop on Nonlinear Signal and Image Processing, Thessaloniki, Greece, pp. 460–463 (1995)

    Google Scholar 

  6. Ruanaidth, J.O., Downling, W., Boland, F.: Phase watermarking of digital images. In: Proceedings of the IEEE international Conference on Image Processing, vol. 3, pp. 239–242 (1996)

    Google Scholar 

  7. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical report, NEC Research Institute, Technical Report 95-10 (1995)

    Google Scholar 

  8. Sebé, F., Domingo-Ferrer, J., Solanas, A.: Noise-robust watermarking for numerical datasets. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI 2005. LNCS (LNAI), vol. 3558, pp. 134–143. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Delaigle, J.F., Vleeschuwer, C.D., Macq, B.: Watermarking using a matching model based on the human visual system, Marly le Roi (1997)

    Google Scholar 

  10. Ko, B.S., Nishimura, R., Suzuki, Y.: Time-spread echo method for digital audio watermarking. IEEE Transactions on Multimedia 7, 212–221 (2005)

    Article  Google Scholar 

  11. Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing and obfuscation: tools for software protection. IEEE Transactions on Software Engineering 28, 735–746 (2002), http://dx.doi.org/10.1109/TSE.2002.1027797

    Article  Google Scholar 

  12. Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB journal 12, 157–169 (2003)

    Article  Google Scholar 

  13. Sion, R.: Proving ownership over categorical data. In: Proceedings of the 20th International Conference on Data Engineering (ICDE 2004), Boston, pp. 584–595 (2004)

    Google Scholar 

  14. NIST: Proposed federal information processing standard for secure hash standard. Federal Register 57, 41727 (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Solanas, A., Domingo-Ferrer, J. (2006). Watermarking Non-numerical Databases. In: Torra, V., Narukawa, Y., Valls, A., Domingo-Ferrer, J. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2006. Lecture Notes in Computer Science(), vol 3885. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11681960_24

Download citation

  • DOI: https://doi.org/10.1007/11681960_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-32780-6

  • Online ISBN: 978-3-540-32781-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics