Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 1387375, 14 pages
https://doi.org/10.1155/2017/1387375
Research Article

A New Reversible Database Watermarking Approach with Firefly Optimization Algorithm

Department of Computer Engineering, Karadeniz Technical University, 61080 Trabzon, Turkey

Correspondence should be addressed to Mustafa Bilgehan Imamoglu; rt.ude.utk@naheglib

Received 5 September 2016; Revised 25 December 2016; Accepted 30 January 2017; Published 6 March 2017

Academic Editor: Lotfi Senhadji

Copyright © 2017 Mustafa Bilgehan Imamoglu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. Cox, “Digital watermarking,” Journal of Electronic Imaging, vol. 11, no. 3, 2002. View at Publisher · View at Google Scholar
  2. J. Kiernan, R. Agrawal, and P. J. Haas, “Watermarking relational data: framework, algorithms and analysis,” The VLDB Journal, vol. 12, no. 2, pp. 157–169, 2003. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Sion, M. Atallah, and S. Prabhakar, “Rights protection for relational data,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 12, pp. 1509–1525, 2004. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. Li, H. Guo, and S. Jajodia, “Tamper detection and localization for categorical data using fragile watermarks,” in Proceedings of the 4th ACM Workshop on Digital Rights Management (DRM '04), pp. 73–82, October 2004. View at Scopus
  5. H. Guo, Y. Li, A. Liu, and S. Jajodia, “A fragile watermarking scheme for detecting malicious modifications of database relations,” Information Sciences, vol. 176, no. 10, pp. 1350–1378, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  6. Y. Zhang, B. Yang, and X.-M. Niu, “Reversible watermarking for relational database authentication,” Journal of Computers, vol. 17, no. 2, pp. 59–66, 2006. View at Google Scholar
  7. X. Zhou, M. Huang, and Z. Peng, “An additive-attack-proof watermarking mechanism for databases' copyrights protection using image,” in Proceedings of the ACM Symposium on Applied Computing (SAC '07), pp. 254–258, Seoul, Korea, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Gupta and J. Pieprzyk, “Reversible and blind database watermarking using difference expansion,” in Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, Adelaide, Australia, January 2008.
  9. A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147–1156, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. S. Bhattacharya and A. Cortesi, “A distortion free watermark framework for relational databases,” in Proceedings of the 4th International Conference on Software and Data Technologies (ICSOFT '09), pp. 229–234, Springer, Sofia, Bulgaria, July 2009. View at Scopus
  11. D. Hanyurwimfura, Y. Liu, and Z. Liu, “Text format based relational database watermarking for non-numeric data,” in Proceedings of the International Conference on Computer Design and Applications (ICCDA '10), pp. V4-312–V4-316, IEEE, Qinhuangdao, China, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen, and M. K. Khan, “A blind reversible method for watermarking relational databases based on a time-stamping protocol,” Expert Systems with Applications, vol. 39, no. 3, pp. 3185–3196, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. D. M. Thodi and J. J. Rodriguez, “Prediction-error based reversible watermarking,” in Proceedings of the International Conference on Image Processing (ICIP '04), Singapore, October 2004. View at Publisher · View at Google Scholar
  14. F. Arif, S. Suhail, and M. Kamran, “Watermarking of relational databases with emphasis on re-watermarking attack,” International Journal of Computer Science Issues, vol. 9, no. 3, pp. 521–526, 2012. View at Google Scholar
  15. A. Khan and S. A. Husain, “A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations,” The Scientific World Journal, vol. 2013, Article ID 796726, 16 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. L. Camara, J. Li, R. Li, and W. Xie, “Distortion-free watermarking approach for relational database integrity checking,” Mathematical Problems in Engineering, vol. 2014, Article ID 697165, 10 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. K. Jawad and A. Khan, “Genetic algorithm and difference expansion based reversible watermarking for relational databases,” Journal of Systems and Software, vol. 86, no. 11, pp. 2742–2753, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. X.-S. Yang, Nature-Inspired Metaheuristic Algorithms, Luniver Press, 2008.
  19. J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proceedings of the IEEE International Conference on Neural Networks, vol. 1–6, pp. 1942–1948, Perth, Australia, December 1995.
  20. A. Colorni, M. Dorigo, and V. Maniezzo, “Distributed optimization by ant colonies,” in Proceedings of the 1st European Conference on Artificial Life, Paris, France, December 1991.
  21. D. Karaboga, “An idea based on honey bee swarm for numerical optimization,” Tech. Rep. TR06, Erciyes University, Engineering Faculty, Computer Engineering Department, 2005. View at Google Scholar