Skip to main content
Log in

Watermarking as a service (WaaS) with anonymity

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With rapid increase in Internet usage, it has become quite easy to produce illegal digital contents. As a result, copyright protection and authentication problems have risen. Besides audio, video and image, protection of database integrity is now a very active research in digital watermarking. Watermarking for databases has been introduced, however, most of the existing schemes produce distortion in the original content during watermark insertion phase. As a result of distortion to underlying data, the quality of watermarked content reduces. Moreover, most of the existing schemes provide watermarking techniques to protect specific data types, such as categorical or numeric. Furthermore, anonymity is also a critical challenge in prior watermarking techniques. In the said perspective, we propose watermarking as a service with anonymity for database integrity using zero watermarking schemes. Our proposed technique does not add any extra information, and neither any physical change is made to the database content. We also performed the security and performance analysis of our proposed scheme. For security analysis, we have evaluated against tuple insertion, tuple deletion, and attribute value tempering attacks. We can extract watermark with high probability, which shows resilience against the said attacks. Experiments are conducted to yield the satisfactory performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Agrawal R, Haas PJ, Kiernan J (2003) Watermarking Relational Data: Framework, Algorithms and Analysis. The VLDB J 12(2):157–169

    Article  Google Scholar 

  2. Agrawal R, Kiernan J (2002) Watermarking relational databases. Proceedings of the 28th international conference on Very Large Data Bases, pp. 155–166, Hong Kong

  3. Aihab K, Hussain S (2013) A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Article ID 796726, pp. 16

  4. Ashwani K, Vipin T (2011) A practical Buyer-Seller watermarking protocol based on discrete wavelet transform. Int J Comput Appl 21(8):0975–8887

    Google Scholar 

  5. Chang C-C, Tsai H-C, Hsieh Y-P (2010) An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput Secur 29(2):269–277

    Article  Google Scholar 

  6. Choi JG, Sakurai K, Park JH (2003) Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. Proc ACNS 2846:265–279

    MATH  Google Scholar 

  7. Cox I, Bloom J, Miller M (2001) “Digital Watermarking,” Digital Watermarking, Morgan Kaufmann

  8. Cox I, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  9. Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE Transactions on Selected Areas of Communications 16:587–593

    Article  Google Scholar 

  10. Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE Transactions on Selected Areas of Communications 16(2):587–593

    Article  Google Scholar 

  11. Cox IJ, Miller ML, Bloom JA (2002) Digital Watermarking and fundamentals. Morgan Kaufmann, San Francisco

    Google Scholar 

  12. Eslami Z, Kazemnasabhaji M, Mirehi N (2013) Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content. Multimedia Tools and Applications

  13. Fan C-I, Juang W-S, Chen M-T (2010) Efficient fair content exchange in cloud computing," Computer Symposium (ICS), 2010 International, 16–18, pp. 294–299

  14. Guo J, Li Y, Deng RH, Chen K (2006) Rights protection for data cubes. Proceedings of Information Security Conference (ISC), pp. 359–372

  15. Hang D, Liang S, Pan Z, Li H, Liu X (2010) An Image Authentication Scheme Based on Correlation. JDCTA 4(2):89–94

    Article  Google Scholar 

  16. Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107

    Article  Google Scholar 

  17. Jonathan KS, Girod B (2002) Power spectrum conditions for energy efficient watermarking. IEEE Trans. on Multimedia 4(4)

  18. Kamel I (2009) A schema for protecting the integrity of databases. Computers and Security 28:698–709

    Article  Google Scholar 

  19. Katariya SS (2012) Digital Watermarking: Review. International Journal of Engineering and Innovative Technology 1(2):143–153

    Google Scholar 

  20. Kerckhoffs A (1883) La cryptographie militaire. Journal des Sciences Militaires 9:5–38

    Google Scholar 

  21. Khan A, Jabeen F, Naz F, Suhail S, Ahmed M, Nawaz S (2016) Buyer Seller Watermarking Protocols Issues and Challenges - A Survey. J Netw Comput Appl 75:317–334 Elsevier

    Article  Google Scholar 

  22. Lei C-L, Yu P-L, Tsai P-L, Chan M-H (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Transaction Image Process 13(12):1618–1626

    Article  Google Scholar 

  23. Li Y, Guo H, Wang S (2008) A Multiple-Bits Watermark for relational Data. J Database Manag 19(3):1–21

    Article  Google Scholar 

  24. Li Y, Swarup V, Jajodia S (2003) A robust watermarking scheme for relational data. In Proc. The 13th workshop on information technology and engineering, pp. 195–200

  25. Li Y, Swarup V, Jajodia S (2005) Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans Dependable and Secure Computing 2(1):34–45

    Article  Google Scholar 

  26. Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Transaction Image Process 10(4):643–649

    Article  Google Scholar 

  27. Meng S, Cao W, Yan Y, Li S (2010) Bit Replacement Audio Watermarking Using Stereo Signals. AISS 2(3):18–24

    Article  Google Scholar 

  28. Petitcolas FAP, Anderson R, Kuhn MG (1999) Information hiding A survey. Proc IEEE 87(7):1062–1077

    Article  Google Scholar 

  29. Raju H, Shantanu P (2010) Watermarking techniques for relational databases: survey, classification and comparison. Journal of Universal Computer Science 16(21)

  30. Rial A, Balasch J, Preneel B (2011) A privacy preserving buyer seller watermarking protocol based on priced oblivious transfer. Information forensics and security, IEEE Transactions 6(1)

  31. Robert L, Shanmugapriya T (2009) A Study on Digital Watermarking Techniques. International Journal of Recent Trends in Engineering 1(2):223–225

    Google Scholar 

  32. Song C, Sang J, Sudirman S (2018) A buyer-seller watermarking protocol for digital secondary market. Multimedia Tools Appl 77:225. https://doi.org/10.1007/s11042-016-4247-8

    Article  Google Scholar 

  33. Wolfgang RB, Podilchuk CI, Delp EJ (1999) Perceptual watermarks for digital images and video. Proc IEEE 87(7):1108–1126

    Article  Google Scholar 

  34. Yu Z, Wang C, Thomborson C, Wang J, Lian S, Vasilakos AV (2011) A novel watermarking method for software protection in the cloud. Software. Practice and Experience

  35. Zhang LY, Zheng Y, Weng J, Wang C, Shan Z, Ren K (2018) You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center. IEEE TraTDSC, in press

  36. Zhu W, Thomborson C, Wang F-Y (2005) A survey of software watermarking, Proceedings of the 2005 IEEE international conference on intelligence and security informatics

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abid Khan.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naz, F., Khan, A., Ahmed, M. et al. Watermarking as a service (WaaS) with anonymity. Multimed Tools Appl 79, 16051–16075 (2020). https://doi.org/10.1007/s11042-018-7074-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-7074-2

Keywords

Navigation