Abstract
A relational database is an infrastructure that manages and shares structured data. To safeguard the copyrights of data within such databases, database watermarking is an effective technique. Most watermarking schemes rely on the primary key (PK) to locate and embed watermarks, which preserves high watermark synchronization during detection. However, these schemes become invalid once PK is erased or changed. To avoid this vulnerability, virtual primary key (VPK) schemes are proposed to replace PK. Nevertheless, duplicate values in virtual primary keys compromise synchronization. Besides, current VPK schemes fail to utilize the primary key, even when it remains unchanged. This strategy decreases detection accuracy in many cases. In addition, we find an attribute name attack. It is a common challenge of existing watermarking schemes, which distort the link between detected attributes and watermarked attributes. In this paper, we propose a high-synchronization and robust VPK scheme. It introduces a classifier to maintain the original order and number of attributes to resist attribute name attacks. To resist primary key erasure or change and mitigate synchronization problems, it generates distinct virtual primary keys. Moreover, to improve detection accuracy, our watermarking scheme integrates the primary key when it remains unchanged. Experiments demonstrate that our scheme achieves high watermark synchronization. It is robust against various attacks, even when 98% of tuples or over half of the attributes are distorted. It is also practical in terms of data distortion and overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Forest CoverType: http://kdd.ics.uci.edu/databases/covertype/covertype.html.
References
Agrawal, R., Kiernan, J.: Watermarking relational databases. In: VLDB’02: Proceedings of the 28th International Conference on Very Large Databases, pp. 155–166. Elsevier (2002)
Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001)
Chai, H., Yang, S., Jiang, Z.L., Wang, X.: A robust and reversible watermarking technique for relational dataset based on clustering. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 411–418. IEEE (2019)
Chang, C.-C., Nguyen, T.-S., Lin, C.-C.: A blind robust reversible watermark scheme for textual relational databases with virtual primary key. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Yang, C.-N. (eds.) Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers, pp. 75–89. Springer International Publishing, Cham (2015). https://doi.org/10.1007/978-3-319-19321-2_6
Franco-Contreras, J., Coatrieux, G.: Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans. Inf. Forensics Secur. 10(9), 1939–1952 (2015)
Franco-Contreras, J., Coatrieux, G., Cuppens, F., Cuppens-Boulahia, N., Roux, C.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397–410 (2013)
Gort, M.L.P., Díaz, E.A., Uribe, C.F.: A highly-reliable virtual primary key scheme for relational database watermarking techniques. In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 55–60. IEEE (2017)
Gort, M.L.P., Feregrino-Uribe, C., Cortesi, A., Fernández-Peña, F.: Hqr-scheme: a high quality and resilient virtual primary key generation approach for watermarking relational data. Expert Syst. Appl. 138, 112770 (2019)
Gort, M.L.P., Feregrino-Uribe, C., Cortesi, A., Fernández-Peña, F.: A double fragmentation approach for improving virtual primary key-based watermark synchronization. IEEE Access 8, 61504–61516 (2020)
Hou, R., Xian, H.: A graded reversible watermarking scheme for relational data. Mobile Netw. Appl. 26, 1552–1563 (2021)
Hu, D., Zhao, D., Zheng, S.: A new robust approach for reversible database watermarking with distortion control. IEEE Trans. Knowl. Data Eng. 31(6), 1024–1037 (2019)
Iftikhar, S., Kamran, M., Anwar, Z.: Rrw-a robust and reversible watermarking technique for relational data. IEEE Trans. Knowl. Data Eng. 27(4), 1132–1145 (2014)
Jawad, K., Khan, A.: Genetic algorithm and difference expansion based reversible watermarking for relational databases. J. Syst. Softw. 86(11), 2742–2753 (2013)
Kamran, M., Farooq, M.: An information-preserving watermarking scheme for right protection of emr systems. IEEE Trans. Knowl. Data Eng. 24(11), 1950–1962 (2011)
Kamran, M., Farooq, M.: A comprehensive survey of watermarking relational databases research. arXiv preprint arXiv:1801.08271 (2018)
Kamran, M., Suhail, S., Farooq, M.: A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 25(12), 2694–2707 (2013)
Kumar, S., Singh, B.K., Yadav, M.: A recent survey on multimedia and database watermarking. Multimedia Tools Appl. 79(27), 20149–20197 (2020)
Li, W., Li, N., Yan, J., Zhang, Z., Yu, P., Long, G.: Secure and high-quality watermarking algorithms for relational database based on semantic. IEEE Transactions on Knowledge and Data Engineering (2023)
Li, Y., Swarup, V., Jajodia, S.: Constructing a virtual primary key for fingerprinting relational data. In: Proceedings of the 3rd ACM Workshop on Digital Rights Management, pp. 133–141 (2003)
Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: schemes and specialties. IEEE Trans. Dependable Secure Comput. 2(1), 34–45 (2005)
Odeh, A., Al-Haj, A.: Watermarking relational database systems. In: 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). pp. 270–274. IEEE (2008)
Sebé, F., Domingo-Ferrer, J., Solanas, A.: Noise-Robust Watermarking for Numerical Datasets. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI 2005. LNCS (LNAI), vol. 3558, pp. 134–143. Springer, Heidelberg (2005). https://doi.org/10.1007/11526018_14
Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. 20(1), 116–129 (2007)
Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of data, pp. 98–109 (2003)
Wang, H., Cui, X., Cao, Z.: A speech based algorithm for watermarking relational databases. In: 2008 International Symposiums on Information Processing, pp. 603–606. IEEE (2008)
Yuan, S., Chen, C., Yang, K., Yang, T., Yu, J.: An attribute-attack-proof watermarking technique for relational database. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1136–1143. IEEE (2022)
Acknowledgments
This work was supported by the Strategic Priority Research Program of the Chinese Academy of Sciences, Grant No. XDB0690303.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yang, K., Yuan, S., Yu, J., Wang, Y., Yang, T., Chen, C. (2025). Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases. In: Katsikas, S., Xenakis, C., Kalloniatis, C., Lambrinoudakis, C. (eds) Information and Communications Security. ICICS 2024. Lecture Notes in Computer Science, vol 15057. Springer, Singapore. https://doi.org/10.1007/978-981-97-8801-9_15
Download citation
DOI: https://doi.org/10.1007/978-981-97-8801-9_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-8800-2
Online ISBN: 978-981-97-8801-9
eBook Packages: Computer ScienceComputer Science (R0)