Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013 (2013), Article ID 717165, 12 pages
http://dx.doi.org/10.1155/2013/717165
Research Article

A Blind Reversible Robust Watermarking Scheme for Relational Databases

1Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2Department of Biomedical Imaging and Radiological Science, China Medical University, Taichung 40402, Taiwan
3Department of Computer Science and Information Engineering, Asia University, Taichung 41354, Taiwan
4Department of Information Technology, Travinh University, Travinh, Vietnam
5Department of Computer Science and Information Management, Providence University, No. 200 Chung-chi Road, Taichung 43301, Taiwan

Received 2 July 2013; Accepted 27 August 2013

Academic Editors: G. Jiang and J. Ma

Copyright © 2013 Chin-Chen Chang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Agrawal and J. Kiernan, “Watermarking relational databases,” in Proceedings of the 28th International Conference on Very Large Databases, pp. 155–166, 2002.
  2. M. Shehab, E. Bertino, and A. Ghafoor, “Watermarking relational databases using optimization based techniques,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 1, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. U. P. Rao, D. R. Patel, and P. M. Vikani, “Relational database watermarking for ownership protection,” in Proceedings of the 2nd International Conference on Communication, Computing and Security, pp. 988–995, 2012.
  4. R. Sion, “Proving ownership over categorical data,” in Proceedings of the 20th International Conference on Data Engineering (ICDE '04), pp. 584–595, April 2004. View at Publisher · View at Google Scholar · View at Scopus
  5. M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen, and M. K. Khan, “A blind reversible method for watermarking relational databases based on a time-stamping protocol,” Expert Systems with Applications, vol. 39, no. 3, pp. 3185–3196, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Chen and H. Leung, “Chaotic watermarking for video authentication in surveillance applications,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 5, pp. 704–709, 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia data-embedding and watermarking technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998. View at Publisher · View at Google Scholar · View at Scopus
  8. F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079–1107, 1999. View at Publisher · View at Google Scholar · View at Scopus
  9. G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking digital image and video data,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20–46, 2000. View at Publisher · View at Google Scholar · View at Scopus
  10. C. Collberg and C. Thomborson, “Software watermarking: models and dynamic embeddings,” in Proceedings of the 26th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language (POPL '99), pp. 311–324, January 1999. View at Scopus
  11. S. Bhattacharya and A. Cortesi, “A generic distortion free watermarking technique for relational databases,” in Proceedings of the 5th International Conference on Information Systems Security (ICISS '09), pp. 252–264, 2009.
  12. C. Song, S. Sudirman, and M. Merabti, “A robust region-adaptive dual image watermarking technique,” Journal of Visual Communication and Image Representation, vol. 23, no. 3, pp. 549–568, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. G. Bhatnagar, Q. M. Jonathan Wu, and B. Raman, “Robust gray-scale logo watermarking in wavelet domain,” Computers and Electrical Engineering, vol. 38, no. 5, pp. 1164–1176, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Bravo-Solorio, L. Gan, A. K. Nandi, and M. F. Aburdene, “Secure private fragile watermarking scheme with improved tampering localisation accuracy,” IET Information Security, vol. 4, no. 3, pp. 137–148, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. C.-C. Chang, T. S. Nguyen, and C.-C. Lin, “A reversible data hiding scheme for VQ indices using locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 22, no. 7, pp. 664–672, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003. View at Publisher · View at Google Scholar · View at Scopus
  17. D. M. Thodi and J. J. Rodríguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721–730, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. K.-S. Kim, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, vol. 42, no. 11, pp. 3083–3096, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Atallah, V. Raskin, C. Hempelman et al., “Natural language watermarking and tamperproofing,” in Proceedings of the 5th International Information Hiding Workshop, pp. 196–212, 2002.
  21. N. V. Dharwadkar and B. B. Amberker, “An efficient non-blind watermarking scheme for color images using discrete wavelet transformation,” International Journal of Computer Applications, vol. 2, no. 3, 2010. View at Google Scholar
  22. Y.-C. Li, C.-M. Yeh, and C.-C. Chang, “Data hiding based on the similarity between neighboring pixels with reversibility,” Digital Signal Processing, vol. 20, no. 4, pp. 1116–1128, 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. B. Schneier, Applied Cryptography, John Wiley and Sons, 2nd edition, 1996.