Summary
In this chapter, a systematic review of database watermarking is provided. The existing database watermarking approaches are classified along six dimensions: data type, distortion to underlying data, sensitivity to database attacks, watermark information, verifiability, and data structure. At the end of this chapter, some open issues are discussed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
R. Agrawal and J. Kiernan. Watermarking relational databases. In Proceedings of VLDB, pages 155–166, 2002.
E. Bertino, B. C. Ooi, Y. Yang, and R. Deng. Privacy and ownership preserving of outsourced medical data. In Proceedings of IEEE International Conference on Data Engineering, pages 521–532, 2005.
D. Boneh and J. Shaw. Collusion secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897–1905, 1998.
I.J. Cox, M.L. Miller, and J.A. Bloom. Digital Watermarking: Principles and Practice. Morgan Kaufmann, 2001.
B. Gray and J. Gorelick. Database piracy plague. The Washington Times, March 1, 2004. http://www.washingtontimes.com.
D. Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of ACM Symposium on Principles of Database Systems (PODS), pages 191–201, 2003.
H. Guo, Y. Li, and S. Jajodia. Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci., 177(1):281–298, 2007.
H. Guo, Y. Li, A. Liu, and S. Jajodia. A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci., 176(10):1350–1378, 2006.
J. Guo, Y. Li, R. H. Deng, and K. Chen. Rights protection for data cubes. In ISC, pages 359–372, 2006.
N.F. Johnson, Z. Duric, and S. Jajodia. Information Hiding: Steganography and Watermarking–Attacks and Countermeasures. Kluwer Publishers, 2000.
S. Katzenbeisser and F.A. Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000.
Y. Li and R. H. Deng.Publicly verifiable ownership protection for relational databases. In ASIACCS, pages 78–89, 2006.
Y. Li, H. Guo, and S. Jajodia. Tamper detection and localization for categorical data using fragile watermarks. In Digital Rights Management Workshop, pages 73–82, 2004.
Y. Li, V. Swarup, and S. Jajodia. Constructing a virtual primary key for fingerprinting relational data. In Digital Rights Management Workshop, pages 133–141, 2003.
Y. Li, V. Swarup, and S. Jajodia. A robust watermarking scheme for relational data. In Proceedings of the 13th Workshop on Information Technology and Systems (WITS), pages 195–200, December 2003.
Y. Li, V. Swarup, and S. Jajodia. Defending against additive attacks with maximal errors in watermarking relational databases. In Proc. the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 81–94, 2004.
Y. Li, V. Swarup, and S. Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2:34–45, 2005.
S. Micali. Efficient certificate revocation. In Technical Report: TM-542b. Massachusetts Institute of Technology. Cambridge, MA, USA, 1996.
W. J. Myrvold and F. Ruskey. Ranking and unranking permutations in linear time. Inf. Process. Lett., 79(6):281–284, 2001.
W. Ng and H. L. Lau. Effective approaches for watermarking xml data. In DASFAA, pages 68–80, 2005.
R. Sion. Proving ownership over categorical data. In Proceedings of IEEE International Conference on Data Engineering, pages 584–596, 2004.
R. Sion, M. Atallah, and S. Prabhakar. Rights protection for relational data. In Proceedings of ACM SIGMOD International Conference on Management of Data, pages 98–108, 2003.
R. Sion, M. Atallah, and S. Prabhakar. Resilient rights protection for sensor streams. In Proceedings of the Very Large Databases Conference, pages 732–743, 2004.
L. Vaas. Putting a stop to database piracy. eWEEK, enterprise news and reviews, September 24, 2003. http://www.eweek.com/print_article/0,3048,a=107965,00.asp.
X. Zhou, Pang H. H., and K. L. Tan. Query-based watermarking for xml data. In ASIACCS, pages 253–264, 2007.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC.
About this chapter
Cite this chapter
Li, Y. (2008). Database Watermarking: A Systematic View. In: Gertz, M., Jajodia, S. (eds) Handbook of Database Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48533-1_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-48533-1_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-48532-4
Online ISBN: 978-0-387-48533-1
eBook Packages: Computer ScienceComputer Science (R0)