Reference Hub5
A Multiple-Bits Watermark for Relational Data

A Multiple-Bits Watermark for Relational Data

Yingjiu Li, Huiping Guo, Shuhong Wang
Copyright: © 2008 |Volume: 19 |Issue: 3 |Pages: 21
ISSN: 1063-8016|EISSN: 1533-8010|ISSN: 1063-8016|EISBN13: 9781615200412|EISSN: 1533-8010|DOI: 10.4018/jdm.2008070101
Cite Article Cite Article

MLA

Li, Yingjiu, et al. "A Multiple-Bits Watermark for Relational Data." JDM vol.19, no.3 2008: pp.1-21. http://doi.org/10.4018/jdm.2008070101

APA

Li, Y., Guo, H., & Wang, S. (2008). A Multiple-Bits Watermark for Relational Data. Journal of Database Management (JDM), 19(3), 1-21. http://doi.org/10.4018/jdm.2008070101

Chicago

Li, Yingjiu, Huiping Guo, and Shuhong Wang. "A Multiple-Bits Watermark for Relational Data," Journal of Database Management (JDM) 19, no.3: 1-21. http://doi.org/10.4018/jdm.2008070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

At the heart of the information economy, commercially and publicly useful databases must be sufficiently protected from pirated copying. Complementary to the Database Protection Act, database watermarking techniques are designed to thwart pirated copying by embedding owner-specific information into databases so that the ownership of pirated copies of protected databases can be claimed if the embedded information is detected. This article presents a robust watermarking scheme for embedding a multiple-bits watermark to numerical attributes in database relations. The scheme is robust in the sense that it provides an upper bound for the probability that a valid watermark is detected from unmarked data, or a fictitious secret key is discovered from pirated data. This upper bound is independent of the size of the data. The scheme is extended to database relations without primary-key attributes to thwart attribute-related attacks. The scheme is also extended to multiple watermarks for defending additive attacks and for proving joint ownership.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.