skip to main content
10.1145/1029146.1029159acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Tamper detection and localization for categorical data using fragile watermarks

Published: 25 October 2004 Publication History

Abstract

Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In this paper, we propose to make use of fragile watermarks to detect and localize malicious alterations made to a database relation with categorical attributes. Unlike other watermarking schemes which inevitably introduce distortions to the cover data, the proposed scheme is distortion free. In our algorithm, all tuples in a database relation are first securely divided into groups according to some secure parameters. Watermarks are embedded and verified in each group independently. Thus, any modifications can be localized to some specific groups. Theoretical analysis shows that the probability of missing detection is very low.

References

[1]
R. Agrawal and J. Kiernan. Watermark relational databases. In Proc. of the 28th Inter. Conf. On Very Large Data Bases, 2002.
[2]
M. Chen, Y. He, and R. Lagendijk. A fragile watermark error detection scheme for wireless video communications. IEEE Trans. On Multimedia, pages 315--329, August 2003.
[3]
I. J. Cox, M. Miller, and J. Bloom. Watermarking applications and properties. In Proc. International Conference on Information Technology: Coding and Computing, 2000.
[4]
J. Fridrich and M. Du. Images with self-correcting capabilities. In Proc. of the IEEE Inter. Conf. On Image Processing, pages 792--796, 1999.
[5]
J. Fridrich, M. Goljan, and M. Du. Invertible authentication. In Proc. Of SPIE, Security and Watermarking of Multimedia Contents, January 2001.
[6]
H. Hacigumus, B. Iyer, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider. In ACM SIGMOD Conference on Management of Data, pages 216--227, June 2002.
[7]
H. Hacigumus, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of Internal Conference on Data Engineering (ICDE) '02), March 2002.
[8]
Y. Li, V. Swarup, and S. Jajodia. Constructing a virtual primary key for fingerprinting relational data. In Proc. ACM Workshop on Digital Rights Management, pages 133--141, October 2003.
[9]
Y. Li, V. Swarup, and S. Jajodia. A robust watermarking scheme for relational data. In Proc. The 13th workshop on information technology and engineering, pages 195--200, December 2003.
[10]
E. Lin and E. Delp. A review of fragile image watermarks. In Proc. Of the Multimedia and Security Workshop (ACM Multimedia '99), October 30 - November 5, 1999.
[11]
C. Lu, H. Liao, and L. Chen. Multipurpose audio watermarking. In Proc. 15th Int. Conf. on Pattern Recognition, 2000.
[12]
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In Proc. Of the Network and Distributed System Security Symposium 2004), Feb 2004.
[13]
R.Sion. Proving ownership over categorical data. In Proceedings of ICDE 2004, 2004.
[14]
R.Sion, M. Atallah, and S. Prabhakar. Rights protection for relational data. In Proceedings of ACM SIGMOD 2003, 2003.

Cited By

View all
  • (2024)A Robust Database Watermarking Scheme That Preserves Statistical CharacteristicsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.3324932(1-13)Online publication date: 2024
  • (2024)Research on blind reversible database watermarking algorithm based on dual embedding strategyThe Computer Journal10.1093/comjnl/bxae080Online publication date: 31-Aug-2024
  • (2024)FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary MatchingIntelligent Information Processing XII10.1007/978-3-031-57808-3_32(438-452)Online publication date: 6-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DRM '04: Proceedings of the 4th ACM workshop on Digital rights management
October 2004
120 pages
ISBN:1581139691
DOI:10.1145/1029146
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. database security
  2. fragile watermarking
  3. integrity

Qualifiers

  • Article

Conference

CCS04
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Robust Database Watermarking Scheme That Preserves Statistical CharacteristicsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.3324932(1-13)Online publication date: 2024
  • (2024)Research on blind reversible database watermarking algorithm based on dual embedding strategyThe Computer Journal10.1093/comjnl/bxae080Online publication date: 31-Aug-2024
  • (2024)FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary MatchingIntelligent Information Processing XII10.1007/978-3-031-57808-3_32(438-452)Online publication date: 6-Apr-2024
  • (2023)An Improved Reversible Database Watermarking Method based on Histogram ShiftingProceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security10.1145/3577163.3595091(103-114)Online publication date: 28-Jun-2023
  • (2023)A study on the application of digital watermarking techniques on relational databases2023 9th International Conference on Computer and Communications (ICCC)10.1109/ICCC59590.2023.10507581(2312-2316)Online publication date: 8-Dec-2023
  • (2023)Robust and Imperceptible Watermarking Scheme for GWAS Data TraceabilityDigital Forensics and Watermarking10.1007/978-3-031-25115-3_10(147-161)Online publication date: 29-Jan-2023
  • (2022)Forward Chaining and Self-Embedding Watermarking for Tamper Detection in a Continuous Stream of DataArtificial Intelligence and Fuzzy Logic System10.5121/csit.2022.121612(147-162)Online publication date: 24-Sep-2022
  • (2022)Comparative Analysis of Relational Database Watermarking Techniques: An Empirical StudyIEEE Access10.1109/ACCESS.2022.315786610(27970-27989)Online publication date: 2022
  • (2021)Context-Based Zero Database Watermarking Scheme Based on Evolutionary MechanismAdvanced Machine Learning Technologies and Applications10.1007/978-3-030-69717-4_94(1005-1015)Online publication date: 5-Mar-2021
  • (2020)A Reversible Hiding Technique Using LSB Matching for Relational DatabasesInformatica10.15388/20-INFOR411(1-17)Online publication date: 6-May-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media