Abstract
With rapid increase in Internet usage, it has become quite easy to produce illegal digital contents. As a result, copyright protection and authentication problems have risen. Besides audio, video and image, protection of database integrity is now a very active research in digital watermarking. Watermarking for databases has been introduced, however, most of the existing schemes produce distortion in the original content during watermark insertion phase. As a result of distortion to underlying data, the quality of watermarked content reduces. Moreover, most of the existing schemes provide watermarking techniques to protect specific data types, such as categorical or numeric. Furthermore, anonymity is also a critical challenge in prior watermarking techniques. In the said perspective, we propose watermarking as a service with anonymity for database integrity using zero watermarking schemes. Our proposed technique does not add any extra information, and neither any physical change is made to the database content. We also performed the security and performance analysis of our proposed scheme. For security analysis, we have evaluated against tuple insertion, tuple deletion, and attribute value tempering attacks. We can extract watermark with high probability, which shows resilience against the said attacks. Experiments are conducted to yield the satisfactory performance.














Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Agrawal R, Haas PJ, Kiernan J (2003) Watermarking Relational Data: Framework, Algorithms and Analysis. The VLDB J 12(2):157–169
Agrawal R, Kiernan J (2002) Watermarking relational databases. Proceedings of the 28th international conference on Very Large Data Bases, pp. 155–166, Hong Kong
Aihab K, Hussain S (2013) A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Article ID 796726, pp. 16
Ashwani K, Vipin T (2011) A practical Buyer-Seller watermarking protocol based on discrete wavelet transform. Int J Comput Appl 21(8):0975–8887
Chang C-C, Tsai H-C, Hsieh Y-P (2010) An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput Secur 29(2):269–277
Choi JG, Sakurai K, Park JH (2003) Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. Proc ACNS 2846:265–279
Cox I, Bloom J, Miller M (2001) “Digital Watermarking,” Digital Watermarking, Morgan Kaufmann
Cox I, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE Transactions on Selected Areas of Communications 16:587–593
Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE Transactions on Selected Areas of Communications 16(2):587–593
Cox IJ, Miller ML, Bloom JA (2002) Digital Watermarking and fundamentals. Morgan Kaufmann, San Francisco
Eslami Z, Kazemnasabhaji M, Mirehi N (2013) Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content. Multimedia Tools and Applications
Fan C-I, Juang W-S, Chen M-T (2010) Efficient fair content exchange in cloud computing," Computer Symposium (ICS), 2010 International, 16–18, pp. 294–299
Guo J, Li Y, Deng RH, Chen K (2006) Rights protection for data cubes. Proceedings of Information Security Conference (ISC), pp. 359–372
Hang D, Liang S, Pan Z, Li H, Liu X (2010) An Image Authentication Scheme Based on Correlation. JDCTA 4(2):89–94
Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107
Jonathan KS, Girod B (2002) Power spectrum conditions for energy efficient watermarking. IEEE Trans. on Multimedia 4(4)
Kamel I (2009) A schema for protecting the integrity of databases. Computers and Security 28:698–709
Katariya SS (2012) Digital Watermarking: Review. International Journal of Engineering and Innovative Technology 1(2):143–153
Kerckhoffs A (1883) La cryptographie militaire. Journal des Sciences Militaires 9:5–38
Khan A, Jabeen F, Naz F, Suhail S, Ahmed M, Nawaz S (2016) Buyer Seller Watermarking Protocols Issues and Challenges - A Survey. J Netw Comput Appl 75:317–334 Elsevier
Lei C-L, Yu P-L, Tsai P-L, Chan M-H (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Transaction Image Process 13(12):1618–1626
Li Y, Guo H, Wang S (2008) A Multiple-Bits Watermark for relational Data. J Database Manag 19(3):1–21
Li Y, Swarup V, Jajodia S (2003) A robust watermarking scheme for relational data. In Proc. The 13th workshop on information technology and engineering, pp. 195–200
Li Y, Swarup V, Jajodia S (2005) Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans Dependable and Secure Computing 2(1):34–45
Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Transaction Image Process 10(4):643–649
Meng S, Cao W, Yan Y, Li S (2010) Bit Replacement Audio Watermarking Using Stereo Signals. AISS 2(3):18–24
Petitcolas FAP, Anderson R, Kuhn MG (1999) Information hiding A survey. Proc IEEE 87(7):1062–1077
Raju H, Shantanu P (2010) Watermarking techniques for relational databases: survey, classification and comparison. Journal of Universal Computer Science 16(21)
Rial A, Balasch J, Preneel B (2011) A privacy preserving buyer seller watermarking protocol based on priced oblivious transfer. Information forensics and security, IEEE Transactions 6(1)
Robert L, Shanmugapriya T (2009) A Study on Digital Watermarking Techniques. International Journal of Recent Trends in Engineering 1(2):223–225
Song C, Sang J, Sudirman S (2018) A buyer-seller watermarking protocol for digital secondary market. Multimedia Tools Appl 77:225. https://doi.org/10.1007/s11042-016-4247-8
Wolfgang RB, Podilchuk CI, Delp EJ (1999) Perceptual watermarks for digital images and video. Proc IEEE 87(7):1108–1126
Yu Z, Wang C, Thomborson C, Wang J, Lian S, Vasilakos AV (2011) A novel watermarking method for software protection in the cloud. Software. Practice and Experience
Zhang LY, Zheng Y, Weng J, Wang C, Shan Z, Ren K (2018) You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center. IEEE TraTDSC, in press
Zhu W, Thomborson C, Wang F-Y (2005) A survey of software watermarking, Proceedings of the 2005 IEEE international conference on intelligence and security informatics
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Naz, F., Khan, A., Ahmed, M. et al. Watermarking as a service (WaaS) with anonymity. Multimed Tools Appl 79, 16051–16075 (2020). https://doi.org/10.1007/s11042-018-7074-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-7074-2
Keywords
Profiles
- Mansoor Ahmed View author profile