Abstract
The protection of database watermarking techniques based on primary key (PK) is weakened by potential PK attacks and their huge impact. Using virtual primary key (VPK) schemes is an effective solution to enhance the robustness of these techniques. Pérez Gort et al. proposed the HQR-Scheme, which first considers balancing the participation rate of each attribute to improve the ability of scheme to cope with deletion attacks. However, the HQR-Scheme has limited control ability and cannot adapt to changes in relevant information in databases. Facing these challenges, we innovatively propose the FRBBM-Scheme, which allows users to fully analyze data table information and formulate flexible ratio adjustment strategies to enhance their ability to cope with deletion attacks. We verify our proposed scheme through multiple experiments, which show that it has excellent ratio control ability, can generate high-quality VPK sets, and can resist different levels of attribute deletion attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sardroudi, H.M., Ibrahim, S.: A new approach for relational database watermarking using image. In: 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 606–610. IEEE (2010)
Wang, W., Liu, C., Wang, Z., Liang, T.: FBIPT: a new robust reversible database watermarking technique based on position tuples. In: 2022 4th International Conference on Data Intelligence and Security (ICDIS), pp. 67–74. IEEE (2022)
Gort, M.L., Pérez, O., Martina, C., Agostino, U., Claudia, F.: Semantic-driven watermarking of relational textual databases. Expert Syst. Appl. 167, 114013 (2021)
Li, W., Li, N., Yan, J., Zhang, Z., Yu, P., Long, G.: Secure and high-quality watermarking algorithms for relational database based on semantic. IEEE Trans. Knowl. Data Eng. (2022)
Siledar, S.B., Tamane, S.: Quadratic difference expansion based reversible watermarking for relational database. J. Integr. Sci. Technol. 9(2), 107–112 (2021)
Hou, R., Xian, H.: A graded reversible watermarking scheme for relational data. Mob. Netw. Appl. 26, 1552–1563 (2021)
Zhang, Y., Yang, B.. Niu, X.-M.: Reversible watermarking for relational database authentication (2008)
Hu, D., Zhao, D., Zheng, S.: A new robust approach for reversible database watermarking with distortion control. IEEE Trans. Knowl. Data Eng. 31(6), 1024–1037 (2018)
Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 73–82 (2004)
Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: ICSOFT (2), pp. 229–234 (2009)
Li, M., Zhao, W., Guo, J.: An asymmetric watermarking scheme for relational database. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, pp. 180–184. IEEE (2011)
Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 78–89 (2006)
Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: ICISS, pp. 252–264 (2009)
Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of IEEE International Conference on Advances in Communication, Network, and Computing (CNC), pp. 4–5 (2010)
Hamadou, A., Sun, X., Gao, L., Shah, S.A.: A fragile zero-watermarking technique for authentication of relational databases. Int. J. Digit. Content Technol. Appl. 5(5) (2011)
Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Math. Probl. Eng. 2014 (2014)
Agrawal, R., Kiernan, J.: Watermarking relational databases. In: VLDB’02: Proceedings of the 28th International Conference on Very Large Databases, pp. 155–166 (2002)
Li, Y., Swarup, V., Jajodia, S.: Constructing a virtual primary key for fingerprinting relational data. In: Proceedings of the 3rd ACM Workshop on Digital Rights Management, pp. 133–141 (2003)
Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 222–236. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10772-6_17
Xiao, X., Sun, X., Chen, M.: Second-LSB-dependent robust watermarking for relational database. In: Third International Symposium on Information Assurance and Security, pp. 292–300. IEEE (2007)
Halder, R., Dasgupta, P., Naskar, S., Sarma, S.S.: An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. In: Proceedings of the 22nd Annual Symposium on Integrated Circuits and System Design: Chip on the Dunes, pp. 1–6 (2009)
Gort, M.L.P., Díaz, E.A., Uribe, C.F.: A highly-reliable virtual primary key scheme for relational database watermarking techniques. In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 55–60 (2017)
Gort, M.L.P., Feregrino-Uribe, C., Cortesi, A., Fernández-Peña, F.: HQR-scheme: a high quality and resilient virtual primary key generation approach for watermarking relational data. Expert Syst. Appl. 138, 112770 (2019)
Cox, I.J., Doërr, G., Furon, T.: Watermarking is not cryptography. In: International Workshop on Digital Watermarking, pp. 1–15 (2006)
Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: survey, classification and comparison. J. Univ. Comput. Sci. 16(21), 3164–3190 (2010)
Iftikhar, S., Kamran, M., Anwar, Z.: RRW–a robust and reversible watermarking technique for relational data. IEEE Trans. Knowl. Data Eng. 27(4), 1132–1145 (2014)
Iftikhar, S., Kamran, M., Anwar, Z.: A survey on reversible watermarking techniques for relational databases. Secur. Commun. Netw. 8(15), 2580–2603 (2015)
Agarwal, N., Singh, A.K., Singh, P.K.: Survey of robust and imperceptible watermarking. Multimedia Tools Appl. 78(7), 8603–8633 (2019)
Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B.: Watermarking Security: Fundamentals, Secure Designs and Attacks. Springer, Heidelberg (2016). https://doi.org/10.1007/978-981-10-0506-0
Rani, S., Koshley, D.K., Halder, R.: A watermarking framework for outsourced and distributed relational databases. In: International Conference on Future Data and Security Engineering, pp. 175–188 (2016)
Khanna, S., Zane, F.: Watermarking maps: hiding information in structured data. In: Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 596–605 (2000)
Agrawal, R., Haas, P.J, Kiernan, J.: A system for watermarking relational databases. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, p. 674 (2003)
Qin, Z., Ying, Y., LE, J., Lup, Y.: Watermark based copyright protection of outsourced database. In: 2006 10th International Database Engineering and Applications Symposium (IDEAS’06), pp. 301–308 (2006)
Xiang, Y., Li, J.Y., Pan, J.F.: Database watermarking algorithm based on virtual primary key. J. Comput. Res. Dev. 46, 66–70 (2009)
Acknowledgment
This work is supported by Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Liang, T. et al. (2024). FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching. In: Shi, Z., Torresen, J., Yang, S. (eds) Intelligent Information Processing XII. IIP 2024. IFIP Advances in Information and Communication Technology, vol 703. Springer, Cham. https://doi.org/10.1007/978-3-031-57808-3_32
Download citation
DOI: https://doi.org/10.1007/978-3-031-57808-3_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-57807-6
Online ISBN: 978-3-031-57808-3
eBook Packages: Computer ScienceComputer Science (R0)