Skip to main content

Context-Based Zero Database Watermarking Scheme Based on Evolutionary Mechanism

  • Conference paper
  • First Online:
Advanced Machine Learning Technologies and Applications (AMLTA 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1339))

Abstract

Because of the increasingly dispersed existence of universal access to databases, it is important to establish security measures that allow the delicate properties of privacy and copyright rights of outsourcing databases. Researchers started studying how watermarking software would allow pervasive datasets accessing more secure work environments. Initially, most analyses in this area relied on distortion-based watermark, whilst the few remaining studies centered on distortion-free. But there are also drawbacks in previous studies; most importantly some depend on inserting watermark as additional attributes or tuples, raising the sample capacity. Other approaches like permutation and abstract representation system need significant effort to validate the watermark. The aim of this research is to implement an advanced distortion-free watermarking focused on fake tuples embedded in a non-domain separate file to verify material quality for pervasive database entry. The proposed scheme uses the GA, which reduces its function to establish the values of false tuples as a watermark nearest to actual values. But an intruder can hardly infer the watermark. The latest technique provides imperceptibility and stability. Experimental findings suggest that the proposed algorithm is feasible, reliable, and resilient against several attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: ACM workshop on Digital Rights Management, pp. 73–82 (2004)

    Google Scholar 

  2. Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. Very Large Data Bases J. 12(2), 157–169 (2003)

    Article  Google Scholar 

  3. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Very Large Database Conference, pp. 155–166 (2002)

    Google Scholar 

  4. Mehta, B., Rao, U.: A novel approach as multi-place watermarking for security in database. In: International Conference on Security and Management, pp. 703–707 (2011)

    Google Scholar 

  5. Lei, Z., Li, R.: Research of applications in relational database on digital watermarking technology. Int. J. Eng. Sci. Invent. 2(9), 84–89 (2013)

    Google Scholar 

  6. Bilapatte, S., Bhattacharya, S., Sawarkar, S.: A Review on watermarking relational databases. Int. J. Appl. Eng. 4(2), 89–96 (2014)

    Google Scholar 

  7. Rathva, M., Sahani, G.: Watermarking relational databases. Int. J. Comput. Sci. Eng. Appl. 3(1), 71–79 (2013)

    Google Scholar 

  8. Singh, P., Chadha, R.: A survey of digital watermarking techniques applications and attacks. Int. J. Eng. Innov. Technol. 2(9), 165–175 (2013)

    Google Scholar 

  9. Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: International Conference on Software and Data Technologies, pp. 229–234 (2009)

    Google Scholar 

  10. Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: International Conference on Information Systems Security, pp. 252–264 (209)

    Google Scholar 

  11. Bhattacharya, S., Cortesi, A.: Distortion-free authentication watermarking. In: International Conference of Software and Data Technologies, pp. 205–219 (2010)

    Google Scholar 

  12. Li, M., Zhao, W.: An asymmetric watermarking scheme for relational database. In: International Conference on Communication Software and Networks, pp. 180–184 (2011)

    Google Scholar 

  13. Arun, R., Praveen, K., Bose, D., Nath, H.: A distortion free relational database watermarking using patch work method. In: International Conference on Information Systems Design and Intelligent Applications, pp. 531–538 (2012)

    Google Scholar 

  14. Pournaghshband, V.: A new watermarking approach for relational data. In: Annual Southeast Regional Conference, pp. 127–131 (2008)

    Google Scholar 

  15. Zawawi, N., El-Gohary, R., Hamdy, M., Tolba, M.: A novel watermarking approach for data integrity and non-repudiation in rational databases. In: International Conference on Advanced Machine Learning Technologies and Applications, pp. 532–542 (2012)

    Google Scholar 

  16. El-Bakry, H., Mastorakis, N.: A new watermark approach for protection of databases. In: International Conference on Applied Informatics and Communications, pp. 243–248 (2009)

    Google Scholar 

  17. El-Bakry, H., Hamada, M.: A novel watermark technique for relational databases. In: International Conference on Artificial Intelligence and Computational Intelligence, pp. 226–232 (2010)

    Google Scholar 

  18. El-Bakry, H., Hamada, M.: A developed watermark technique for distributed database security. In: International Conference on Computational Intelligence in Security for Information Systems, pp. 173–180 (2010)

    Google Scholar 

  19. Gamal, G., Rashad, M., Mohamed, M.: A simple watermark technique for relational database. Int. J. Intell. Comput. Inf. Sci. 8(1), 92–101 (2008)

    Google Scholar 

  20. Bhattacharya, S., Cortesi, A.: Database authentication by distortion free watermarking. In: International Conference on Software and Data Technologies, pp. 219–226 (2010)

    Google Scholar 

  21. Kamel, I.: A schema for protecting the integrity of databases. Comput. Secur. 28(7), 698–709 (2009)

    Article  Google Scholar 

  22. Wu, H., Hsu, F., Chen, H.: Tamper detection of relational database based on SVR predictive difference. In: International Conference on Intelligent Systems Design and Applications, pp. 403–408 (2008)

    Google Scholar 

  23. Hamadou, A., Sun, X., Gao, L., Shah, S.A.: A fragile zero-watermarking technique for authentication of relational databases. Int. J. Digital Content Technol. Appl. 5(5), 189–200 (2011)

    Article  Google Scholar 

  24. Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Math. Prob. Eng. 2014(1), 1–10 (2014)

    Article  Google Scholar 

  25. Iqbal, S., Rauf, A., Javed, H., Ahmad, S.: Distortion free algorithm to handle secondary watermark attack in relational databases. In: European Conference on Information Management, pp. 214–221 (2011)

    Google Scholar 

  26. Mayekar, A., Jha, M., Mule, S., Shridattopasak, C.: Relational database watermarking. Int. J. Eng. Res. Technol. 2(7), 248–252 (2014)

    Google Scholar 

  27. Kamran, M., Suhail, S., Farooq, M.: A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 25(12), 2694–2707 (2013)

    Article  Google Scholar 

  28. Radha, R., Sankari, K., Devi, S.: Implementation of invisible watermarking technique in relational database. Int. J. Recent Sci. Res. 7(4), 10034–10037 (2016)

    Google Scholar 

  29. Sonupriya, S., Rani, R.: The digital watermarking technique for numerical relational databases. Int. J. Innov. Adv. Comput. Sci. 3(9), 14–21 (2014)

    Google Scholar 

  30. Panimalar, S., Srinath, D.: reversible watermarking technique based on time stamping in relational data. Int. J. Innov. Adv. Comput. Sci. 2(1), 961–967 (2015)

    Google Scholar 

  31. Waichal, S., Bhandure, M., Waghmare, U., Meshram, B.: Watermarking databases. J. Eng. Comput. Appl. Sci. 2(6), 81–88 (2013)

    Google Scholar 

  32. Khanduja, V., Verma, O., Chakraverty, S.: Watermarking relational databases using bacterial foraging algorithm. Int. J. Multimedia Tools Appl. 74(3), 813–839 (2015)

    Article  Google Scholar 

  33. Melkundi, S., Chandankhede, C.: A robust technique for relational database watermarking and verification. In: International Conference on Communication, Information & Computing Technology, pp. 1–7 (2015)

    Google Scholar 

  34. Camara, L., Li, J., Li, R., Kagorora, F., Hanyurwimfura, D.: Block-based scheme for database integrity verification. Int. J. Secur. Appl. 8(6), 25–40 (2014)

    Google Scholar 

  35. Khanduja, V., Chakraverty, S., Verma, O.: Watermarking categorical data: algorithm and robustness analysis. Defense Sci. J. 65(3), 226–232 (2015)

    Article  Google Scholar 

  36. Cui, X., X., G. Sheng, and J. Zheng, : A robust algorithm for watermark numeric relational databases. Lect. Notes Control Inf. Sci. 344(1), 810–815 (2006)

    MATH  Google Scholar 

  37. Jawad, K., Khan, A.: Genetic algorithm and difference expansion based reversible watermarking for relational databases. J. Syst. Softw. 86(11), 2742–2753 (2013)

    Article  Google Scholar 

  38. Soliman, M.M., Hassanien, A.E., Ghali, N., Onsi, H.M.: An adaptive watermarking approach for medical imaging using swarm intelligent. Int. J. Smart Home 6(1), 37–50 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saad M. Darwish .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ismail, A.A., Darwish, S.M. (2021). Context-Based Zero Database Watermarking Scheme Based on Evolutionary Mechanism. In: Hassanien, AE., Chang, KC., Mincong, T. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2021. Advances in Intelligent Systems and Computing, vol 1339. Springer, Cham. https://doi.org/10.1007/978-3-030-69717-4_94

Download citation

Publish with us

Policies and ethics