Abstract
This paper presents a new watermarking method for protecting non-numerical databases. The proposed watermarking system allows the data owner to define a similarity function in order to reduce the distortion caused by watermark embedding while, at the same time, reducing the number of element modifications needed by the embedding process. A mathematical analysis is provided to justify the robustness of the mark against different types of malicious attacks. The usefulness of this extensible and robust method is illustrated by describing some application domains and examples.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jordan, F., Vynne, T.: Motion vector watermarking. Patent, Laboratoire de Traitement des Signaux École Polytechnique Fédérale de Lausanne (1997)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding: techniques for steganography and digital watermarking. Computer security series. Artech House (2000)
Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic reidentification of redistributors. Electronics Letters 34, 1303–1304 (1998)
Pitas, I., Kaskalis, T.H.: Applying signatures on digital images. In: IEEE Workshop on Nonlinear Signal and Image Processing, Thessaloniki, Greece, pp. 460–463 (1995)
Ruanaidth, J.O., Downling, W., Boland, F.: Phase watermarking of digital images. In: Proceedings of the IEEE international Conference on Image Processing, vol. 3, pp. 239–242 (1996)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical report, NEC Research Institute, Technical Report 95-10 (1995)
Sebé, F., Domingo-Ferrer, J., Solanas, A.: Noise-robust watermarking for numerical datasets. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI 2005. LNCS (LNAI), vol. 3558, pp. 134–143. Springer, Heidelberg (2005)
Delaigle, J.F., Vleeschuwer, C.D., Macq, B.: Watermarking using a matching model based on the human visual system, Marly le Roi (1997)
Ko, B.S., Nishimura, R., Suzuki, Y.: Time-spread echo method for digital audio watermarking. IEEE Transactions on Multimedia 7, 212–221 (2005)
Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing and obfuscation: tools for software protection. IEEE Transactions on Software Engineering 28, 735–746 (2002), http://dx.doi.org/10.1109/TSE.2002.1027797
Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB journal 12, 157–169 (2003)
Sion, R.: Proving ownership over categorical data. In: Proceedings of the 20th International Conference on Data Engineering (ICDE 2004), Boston, pp. 584–595 (2004)
NIST: Proposed federal information processing standard for secure hash standard. Federal Register 57, 41727 (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Solanas, A., Domingo-Ferrer, J. (2006). Watermarking Non-numerical Databases. In: Torra, V., Narukawa, Y., Valls, A., Domingo-Ferrer, J. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2006. Lecture Notes in Computer Science(), vol 3885. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11681960_24
Download citation
DOI: https://doi.org/10.1007/11681960_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-32780-6
Online ISBN: 978-3-540-32781-3
eBook Packages: Computer ScienceComputer Science (R0)