Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 697165, 10 pages
http://dx.doi.org/10.1155/2014/697165
Research Article

Distortion-Free Watermarking Approach for Relational Database Integrity Checking

1College of Information Science and Engineering, Hunan University, Changsha, Hunan 410082, China
2Key Laboratory for Embedded and Network Computing of Hunan Province, Changsha, Hunan 410082, China

Received 21 March 2014; Revised 15 July 2014; Accepted 23 July 2014; Published 14 August 2014

Academic Editor: Kwok-Wo Wong

Copyright © 2014 Lancine Camara et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Sion, M. Atallah, and S. Prabhakar, “Rights protection for categorical data,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 7, pp. 912–926, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. U. P. Rao, D. R. Patel, and P. M. Vikani, “Relational database watermarking for ownership protection,” in Proceedings of the 2nd International Conference on Communication, Computing & Security (ICCCS '12), vol. 6, 2012, Procedia Technology, vol. 6, pp. 988–995, 2012.
  3. Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting relational databases: schemes and specialties,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 1, pp. 34–35, 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. X. Xiangrong, S. Xingming, and C. Minggang, “Second-LSB-dependent robust watermarking for relational database,” in Proceedings of the 3rd Internationl Symposium on Information Assurance and Security (IAS '07), pp. 292–297, Manchester, UK, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Li, H. Guo, and S. Jajodia, “Tamper detection and localization for categorical data using fragile watermarks,” in Proceedings of the 4th ACM Workshop on Digital Rights Management (DRM ’04), pp. 73–82, October 2004. View at Scopus
  6. H. Xiang, X. Sun, and C. Tang, “New fragile watermarking scheme for text documents authentication,” Wuhan University Journal of Natural Sciences, vol. 11, no. 6, pp. 1661–1666, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  7. S. Bhattacharya and A. Cortesi, “Distortion-free authentication watermarking,” in Software and Data Technologies, vol. 170 of Communications in Computer and Information Science, pp. 205–219, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  8. R. Halder, S. Pal, and A. Cortesi, “Watermarking techniques for relational databases: survey, classification and comparison,” Journal of Universal Computer Science, vol. 16, no. 21, pp. 3164–3190, 2010. View at Google Scholar · View at Scopus
  9. R. Agrawal, P. J. Haas, and J. Kiernan, “Watermarking relational data: framework, algorithms and analysis,” The VLDB Journal, vol. 12, no. 2, pp. 157–169, 2003. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Guo, Y. Li, and S. Jajodia, “Chaining watermarks for detecting malicious modifications to streaming data,” Information Sciences, vol. 177, no. 1, pp. 281–298, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Shehab, E. Bertino, and A. Ghafoor, “Watermarking relational databases using optimization based techniques,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 1, pp. 116–129, 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. M. E. Farfoura, S. J. Horng, J. L. Lai, R. S. Run, R. J. Chen, and M. K. Khan, “A blind reversible method for watermarking relational databases based on a time-stamping protocol,” Expert Systems with Applications, vol. 39, no. 3, pp. 3185–3196, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. I. Kamel, “A schema for protecting the integrity of databases,” Computers and Security, vol. 28, no. 7, pp. 698–709, 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Suhail, M. Kamran, and F. Arif, “Watermarking of relational databases with emphasis on re-watermarking attack,” International Journal of Computer Science, vol. 9, no. 1, 2012. View at Google Scholar
  15. H. Guo, Y. Li, A. Liu, and S. Jajodia, “A fragile watermarking scheme for detecting malicious modifications of database relations,” Information Sciences, vol. 176, no. 10, pp. 1350–1378, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. S. Bhattacharya and A. Cortesi, “A distortion free watermark framework for relational databases,” in Proceedings of the 4th International Conference on Software and Data Technologies (ICSOFT '09), pp. 229–234, INSTICC Press, Sofia, Bulgaria, July 2009. View at Scopus
  17. A. Khan and S. A. Husain, “A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations,” The Scientific World Journal, vol. 2013, Article ID 796726, 16 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. K. H. Rosen, Discrete Mathematics and Its Applications, McGraw-Hill Education, Singapore, 6th edition, 2007.
  19. http://archive.ics.uci.edu/ml/datasets/covertype.
  20. M. Kamran, S. Suhail, and M. Farooq, “A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 12, pp. 2694–2706, 2013. View at Google Scholar