Skip to main content

Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15057))

Included in the following conference series:

  • 138 Accesses

Abstract

A relational database is an infrastructure that manages and shares structured data. To safeguard the copyrights of data within such databases, database watermarking is an effective technique. Most watermarking schemes rely on the primary key (PK) to locate and embed watermarks, which preserves high watermark synchronization during detection. However, these schemes become invalid once PK is erased or changed. To avoid this vulnerability, virtual primary key (VPK) schemes are proposed to replace PK. Nevertheless, duplicate values in virtual primary keys compromise synchronization. Besides, current VPK schemes fail to utilize the primary key, even when it remains unchanged. This strategy decreases detection accuracy in many cases. In addition, we find an attribute name attack. It is a common challenge of existing watermarking schemes, which distort the link between detected attributes and watermarked attributes. In this paper, we propose a high-synchronization and robust VPK scheme. It introduces a classifier to maintain the original order and number of attributes to resist attribute name attacks. To resist primary key erasure or change and mitigate synchronization problems, it generates distinct virtual primary keys. Moreover, to improve detection accuracy, our watermarking scheme integrates the primary key when it remains unchanged. Experiments demonstrate that our scheme achieves high watermark synchronization. It is robust against various attacks, even when 98% of tuples or over half of the attributes are distorted. It is also practical in terms of data distortion and overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Forest CoverType: http://kdd.ics.uci.edu/databases/covertype/covertype.html.

References

  1. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: VLDB’02: Proceedings of the 28th International Conference on Very Large Databases, pp. 155–166. Elsevier (2002)

    Google Scholar 

  2. Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001)

    Article  Google Scholar 

  3. Chai, H., Yang, S., Jiang, Z.L., Wang, X.: A robust and reversible watermarking technique for relational dataset based on clustering. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 411–418. IEEE (2019)

    Google Scholar 

  4. Chang, C.-C., Nguyen, T.-S., Lin, C.-C.: A blind robust reversible watermark scheme for textual relational databases with virtual primary key. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Yang, C.-N. (eds.) Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers, pp. 75–89. Springer International Publishing, Cham (2015). https://doi.org/10.1007/978-3-319-19321-2_6

    Chapter  Google Scholar 

  5. Franco-Contreras, J., Coatrieux, G.: Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans. Inf. Forensics Secur. 10(9), 1939–1952 (2015)

    Article  Google Scholar 

  6. Franco-Contreras, J., Coatrieux, G., Cuppens, F., Cuppens-Boulahia, N., Roux, C.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397–410 (2013)

    Article  Google Scholar 

  7. Gort, M.L.P., Díaz, E.A., Uribe, C.F.: A highly-reliable virtual primary key scheme for relational database watermarking techniques. In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 55–60. IEEE (2017)

    Google Scholar 

  8. Gort, M.L.P., Feregrino-Uribe, C., Cortesi, A., Fernández-Peña, F.: Hqr-scheme: a high quality and resilient virtual primary key generation approach for watermarking relational data. Expert Syst. Appl. 138, 112770 (2019)

    Article  Google Scholar 

  9. Gort, M.L.P., Feregrino-Uribe, C., Cortesi, A., Fernández-Peña, F.: A double fragmentation approach for improving virtual primary key-based watermark synchronization. IEEE Access 8, 61504–61516 (2020)

    Article  Google Scholar 

  10. Hou, R., Xian, H.: A graded reversible watermarking scheme for relational data. Mobile Netw. Appl. 26, 1552–1563 (2021)

    Article  Google Scholar 

  11. Hu, D., Zhao, D., Zheng, S.: A new robust approach for reversible database watermarking with distortion control. IEEE Trans. Knowl. Data Eng. 31(6), 1024–1037 (2019)

    Article  Google Scholar 

  12. Iftikhar, S., Kamran, M., Anwar, Z.: Rrw-a robust and reversible watermarking technique for relational data. IEEE Trans. Knowl. Data Eng. 27(4), 1132–1145 (2014)

    Article  Google Scholar 

  13. Jawad, K., Khan, A.: Genetic algorithm and difference expansion based reversible watermarking for relational databases. J. Syst. Softw. 86(11), 2742–2753 (2013)

    Article  Google Scholar 

  14. Kamran, M., Farooq, M.: An information-preserving watermarking scheme for right protection of emr systems. IEEE Trans. Knowl. Data Eng. 24(11), 1950–1962 (2011)

    Article  Google Scholar 

  15. Kamran, M., Farooq, M.: A comprehensive survey of watermarking relational databases research. arXiv preprint arXiv:1801.08271 (2018)

  16. Kamran, M., Suhail, S., Farooq, M.: A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 25(12), 2694–2707 (2013)

    Article  Google Scholar 

  17. Kumar, S., Singh, B.K., Yadav, M.: A recent survey on multimedia and database watermarking. Multimedia Tools Appl. 79(27), 20149–20197 (2020)

    Article  Google Scholar 

  18. Li, W., Li, N., Yan, J., Zhang, Z., Yu, P., Long, G.: Secure and high-quality watermarking algorithms for relational database based on semantic. IEEE Transactions on Knowledge and Data Engineering (2023)

    Google Scholar 

  19. Li, Y., Swarup, V., Jajodia, S.: Constructing a virtual primary key for fingerprinting relational data. In: Proceedings of the 3rd ACM Workshop on Digital Rights Management, pp. 133–141 (2003)

    Google Scholar 

  20. Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: schemes and specialties. IEEE Trans. Dependable Secure Comput. 2(1), 34–45 (2005)

    Article  Google Scholar 

  21. Odeh, A., Al-Haj, A.: Watermarking relational database systems. In: 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). pp. 270–274. IEEE (2008)

    Google Scholar 

  22. Sebé, F., Domingo-Ferrer, J., Solanas, A.: Noise-Robust Watermarking for Numerical Datasets. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI 2005. LNCS (LNAI), vol. 3558, pp. 134–143. Springer, Heidelberg (2005). https://doi.org/10.1007/11526018_14

    Chapter  Google Scholar 

  23. Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. 20(1), 116–129 (2007)

    Article  Google Scholar 

  24. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of data, pp. 98–109 (2003)

    Google Scholar 

  25. Wang, H., Cui, X., Cao, Z.: A speech based algorithm for watermarking relational databases. In: 2008 International Symposiums on Information Processing, pp. 603–606. IEEE (2008)

    Google Scholar 

  26. Yuan, S., Chen, C., Yang, K., Yang, T., Yu, J.: An attribute-attack-proof watermarking technique for relational database. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1136–1143. IEEE (2022)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Strategic Priority Research Program of the Chinese Academy of Sciences, Grant No. XDB0690303.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, K., Yuan, S., Yu, J., Wang, Y., Yang, T., Chen, C. (2025). Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases. In: Katsikas, S., Xenakis, C., Kalloniatis, C., Lambrinoudakis, C. (eds) Information and Communications Security. ICICS 2024. Lecture Notes in Computer Science, vol 15057. Springer, Singapore. https://doi.org/10.1007/978-981-97-8801-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-8801-9_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-8800-2

  • Online ISBN: 978-981-97-8801-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics