Skip to main content

Database Watermarking: A Systematic View

  • Chapter

Summary

In this chapter, a systematic review of database watermarking is provided. The existing database watermarking approaches are classified along six dimensions: data type, distortion to underlying data, sensitivity to database attacks, watermark information, verifiability, and data structure. At the end of this chapter, some open issues are discussed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Agrawal and J. Kiernan. Watermarking relational databases. In Proceedings of VLDB, pages 155–166, 2002.

    Google Scholar 

  2. E. Bertino, B. C. Ooi, Y. Yang, and R. Deng. Privacy and ownership preserving of outsourced medical data. In Proceedings of IEEE International Conference on Data Engineering, pages 521–532, 2005.

    Google Scholar 

  3. D. Boneh and J. Shaw. Collusion secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897–1905, 1998.

    Article  MATH  MathSciNet  Google Scholar 

  4. I.J. Cox, M.L. Miller, and J.A. Bloom. Digital Watermarking: Principles and Practice. Morgan Kaufmann, 2001.

    Google Scholar 

  5. B. Gray and J. Gorelick. Database piracy plague. The Washington Times, March 1, 2004. http://www.washingtontimes.com.

    Google Scholar 

  6. D. Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of ACM Symposium on Principles of Database Systems (PODS), pages 191–201, 2003.

    Google Scholar 

  7. H. Guo, Y. Li, and S. Jajodia. Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci., 177(1):281–298, 2007.

    Article  Google Scholar 

  8. H. Guo, Y. Li, A. Liu, and S. Jajodia. A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci., 176(10):1350–1378, 2006.

    Article  MATH  MathSciNet  Google Scholar 

  9. J. Guo, Y. Li, R. H. Deng, and K. Chen. Rights protection for data cubes. In ISC, pages 359–372, 2006.

    Google Scholar 

  10. N.F. Johnson, Z. Duric, and S. Jajodia. Information Hiding: Steganography and Watermarking–Attacks and Countermeasures. Kluwer Publishers, 2000.

    Google Scholar 

  11. S. Katzenbeisser and F.A. Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000.

    Google Scholar 

  12. Y. Li and R. H. Deng.Publicly verifiable ownership protection for relational databases. In ASIACCS, pages 78–89, 2006.

    Google Scholar 

  13. Y. Li, H. Guo, and S. Jajodia. Tamper detection and localization for categorical data using fragile watermarks. In Digital Rights Management Workshop, pages 73–82, 2004.

    Google Scholar 

  14. Y. Li, V. Swarup, and S. Jajodia. Constructing a virtual primary key for fingerprinting relational data. In Digital Rights Management Workshop, pages 133–141, 2003.

    Google Scholar 

  15. Y. Li, V. Swarup, and S. Jajodia. A robust watermarking scheme for relational data. In Proceedings of the 13th Workshop on Information Technology and Systems (WITS), pages 195–200, December 2003.

    Google Scholar 

  16. Y. Li, V. Swarup, and S. Jajodia. Defending against additive attacks with maximal errors in watermarking relational databases. In Proc. the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 81–94, 2004.

    Google Scholar 

  17. Y. Li, V. Swarup, and S. Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2:34–45, 2005.

    Article  Google Scholar 

  18. S. Micali. Efficient certificate revocation. In Technical Report: TM-542b. Massachusetts Institute of Technology. Cambridge, MA, USA, 1996.

    Google Scholar 

  19. W. J. Myrvold and F. Ruskey. Ranking and unranking permutations in linear time. Inf. Process. Lett., 79(6):281–284, 2001.

    Article  MATH  MathSciNet  Google Scholar 

  20. W. Ng and H. L. Lau. Effective approaches for watermarking xml data. In DASFAA, pages 68–80, 2005.

    Google Scholar 

  21. R. Sion. Proving ownership over categorical data. In Proceedings of IEEE International Conference on Data Engineering, pages 584–596, 2004.

    Google Scholar 

  22. R. Sion, M. Atallah, and S. Prabhakar. Rights protection for relational data. In Proceedings of ACM SIGMOD International Conference on Management of Data, pages 98–108, 2003.

    Google Scholar 

  23. R. Sion, M. Atallah, and S. Prabhakar. Resilient rights protection for sensor streams. In Proceedings of the Very Large Databases Conference, pages 732–743, 2004.

    Google Scholar 

  24. L. Vaas. Putting a stop to database piracy. eWEEK, enterprise news and reviews, September 24, 2003. http://www.eweek.com/print_article/0,3048,a=107965,00.asp.

    Google Scholar 

  25. X. Zhou, Pang H. H., and K. L. Tan. Query-based watermarking for xml data. In ASIACCS, pages 253–264, 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC.

About this chapter

Cite this chapter

Li, Y. (2008). Database Watermarking: A Systematic View. In: Gertz, M., Jajodia, S. (eds) Handbook of Database Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48533-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-48533-1_14

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-48532-4

  • Online ISBN: 978-0-387-48533-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics