Abstract
In this paper, we adapt the reversible watermarking modulation originally proposed by De Vleeschouwer et al. for images to the protection of relational databases. Message embedding is achieved by modulating the relative angular position of the circular histogram center of mass of one numerical attribute. It is fragile and can be used for database authentication. Beyond the application framework, we theoretically evaluate the performance of our scheme in terms of distortion and capacity. We further experimentally verify these theoretical limits within the framework of one medical database of more than one million of inpatient hospital stay records. We show that under the central limit theorem assumptions, experimental results fit theory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
McNickle, M.: Top 10 data security breaches in 2012 in Healthcare Finance News (accessed April 17, 2013)
Agrawal, R., Kiernan, J.: watermarking relational databases. In: VLDB 2002: Proceedings of the 28th International Conference on Very Large Database, ch.15, pp. 155–166. Morgan Kaufmann, San Francisco (2002)
Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Trans. on Knowledge and Data Engineering 16(12), 1509–1525 (2004)
Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. ACM Trans. Database Syst. 36, 3:1–3:24 (2011)
Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. on Knowledge and Data Engineering 20, 116–129 (2008)
Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: schemes and specialties. IEEE Trans. on Dependable and Secure Computing 2(1), 34–45 (2005)
Guo, F., Wang, J., Li, D.: Fingerprinting relational databases. In: Proceedings of the 2006 ACM Symposium on Applied Computing, SAC 2006. ACM, New York (2006)
Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM workshop on Digital Rights Management, DRM 2004, pp. 73–82. ACM, New York (2004)
Kamel, I., Kamel, K.: Toward protecting the integrity of relational databases. In: 2011 World Congress on Internet Security (WorldCIS), pp. 258–261. IEEE (February 2011)
Guo, J.: Fragile watermarking scheme for tamper detection of relational database. In: 2011 International Conference on Computer and Management (CAMAN), pp. 1–4 (May 2011)
Lafaye, J., Gross-Amblard, D., Constantin, C., Guerrouani, M.: Watermill: An optimized fingerprinting system for databases under constraints. IEEE Trans. on Knowledge and Data Engineering 20, 532–546 (2008)
Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: Shishkov, B., Cordeiro, J., Ranchordas, A. (eds.) ICSOFT (2), pp. 229–234. INSTICC Press (2009)
Coatrieux, G., Chazard, E., Beuscart, R., Roux, C.: Lossless watermarking of categorical attributes for verifying medical data base integrity. In: 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC, pp. 8195–8198. IEEE (2011)
Zhang, Y., Niu, X., Yang, B.: Reversible watermarking for relational database authentication. Journal of Computers 17(2) (July 2006)
Chang, J.N., Wu, H.C.: Reversible fragile database watermarking technology using difference expansion based on svr prediction. In: Proceedings of the 2012 International Symposium on Computer, Consumer and Control, IS3C 2012, pp. 690–693. IEEE Computer Society, Washington, DC (2012)
De Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. on Multimedia 5(1), 97–105 (2003)
Mardia, K.V., Jupp, P.E.: Directional statistics. Wiley Series in Probability and Statistics. Wiley, Chichester (1999)
Fisher, N.I.: Statistical Analysis of Circular Data. Cambridge University Press (1993)
Fisher, N.I., Lewis, T.: Estimating the common mean direction of several circular or spherical distributions with differing dispersions. Biometrika 70(2), 333–341 (1983)
McKilliam, R.G.: Lattice theory, circular statistics and polynomial phase signals. PhD thesis, University of Queensland, Australia (2010)
Berenson, M., Krehbiel, T., Levine, D.: Basic Business Statistics: Concepts and Applications. Prentice-Hall (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Franco-Contreras, J., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C. (2013). Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. In: Accorsi, R., Ranise, S. (eds) Security and Trust Management. STM 2013. Lecture Notes in Computer Science, vol 8203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41098-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-41098-7_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41097-0
Online ISBN: 978-3-642-41098-7
eBook Packages: Computer ScienceComputer Science (R0)