Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013, Article ID 796726, 16 pages
http://dx.doi.org/10.1155/2013/796726
Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

1Department of Computing & Technology, Iqra University, Islamabad 44000, Pakistan
2Faculty of Computer Science & IT, King Faisal University, Ahsaa 31982, Saudi Arabia

Received 19 February 2013; Accepted 10 April 2013

Academic Editors: P. Melin and Y. Zhu

Copyright © 2013 Aihab Khan and Syed Afaq Husain. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [18 citations]

The following is the list of published articles that have cited the current article.

  • Waqas Haider, Jiankun Hu, Xinghuo Yu, Yi Xie, Waqas Haider, Jiankun Hu, Xinghuo Yu, and Yi Xie, “Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems,” 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 349–355, . View at Publisher · View at Google Scholar
  • Waqas Haider, Jiankun Hu, and Miao Xie, “Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems,” 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA), pp. 513–517, . View at Publisher · View at Google Scholar
  • Khizar Hameed, M. Saleem Khan, Idrees Ahmed, Zuhaib U. Ahmad, Abid Khan, Aun Haider, and Nadeem Javaid, “A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks,” 2016 19th International Conference on Network-Based Information Systems (NBiS), pp. 119–126, . View at Publisher · View at Google Scholar
  • Sapana Rani, Dileep Kumar Koshley, and Raju Halder, “Adapting MapReduce for Efficient Watermarking of Large Relational Dataset,” 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 729–736, . View at Publisher · View at Google Scholar
  • Lancine Camara, Junyi Li, Renfa Li, and Wenyong Xie, “Distortion-Free Watermarking Approach for Relational Database Integrity Checking,” Mathematical Problems in Engineering, vol. 2014, pp. 1–10, 2014. View at Publisher · View at Google Scholar
  • Ema Utami, and Suwanto Raharjo, “Database security model in the academic information system,” International Journal of Security and its Applications, vol. 8, no. 3, pp. 163–174, 2014. View at Publisher · View at Google Scholar
  • Vidhi Khanduja, Shampa Chakraverty, and Om Prakash Verma, “Watermarking categorical data: Algorithm and robustness analysis,” Defence Science Journal, vol. 65, no. 3, pp. 226–232, 2015. View at Publisher · View at Google Scholar
  • Saman Iftikhar, Sharifullah Khan, Zahid Anwar, and Muhammad Kamran, “GenInfoGuard-A Robust and Distortion-Free Watermarking Technique for Genetic Data,” Plos One, vol. 10, no. 2, 2015. View at Publisher · View at Google Scholar
  • Saman Iftikhar, M. Kamran, and Zahid Anwar, “A survey on reversible watermarking techniques for relational databases,” Security and Communication Networks, 2015. View at Publisher · View at Google Scholar
  • Chin-Chen Chang, Thai-Son Nguyen, and Chia-Chen Lin, “A blind robust reversible watermark scheme for textual relational databases with virtual primary key,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9023, pp. 75–89, 2015. View at Publisher · View at Google Scholar
  • Sapana Rani, Preeti Kachhap, Raju Halder, Sapana Rani, Preeti Kachhap, and Raju Halder, “Data-flow Analysis-Based approach of database watermarking,” Advances in Intelligent Systems and Computing, vol. 396, pp. 153–171, 2015. View at Publisher · View at Google Scholar
  • Güzin Ulutaş, Mustafa Bilgehan Imamoǧlu, and Yasin Şahin, “An effective database watermarking method based on histogram of pairs,” 2016 24th Signal Processing and Communication Application Conference, SIU 2016 - Proceedings, pp. 353–356, 2016. View at Publisher · View at Google Scholar
  • Vidhi Khanduja, Shampa Chakraverty, and Om Prakash Verma, “Enabling information recovery with ownership using robust multiple watermarks,” Journal of Information Security and Applications, 2016. View at Publisher · View at Google Scholar
  • Maikel L. Pérez Gort, Claudia Feregrino Uribe, and Jyrki Nummenmaa, “A minimum distortion - High capacity watermarking technique for relational data,” IH and MMSec 2017 - Proceedings of the 2017 ACM Workshop on Information Hiding and Multimedia Security, pp. 111–121, 2017. View at Publisher · View at Google Scholar
  • Vidhi Khanduja, “Database watermarking, a technological protective measure: Perspective, security analysis and future directions,” Journal of Information Security and Applications, vol. 37, pp. 38–49, 2017. View at Publisher · View at Google Scholar
  • Khizar Hameed, Abid Khan, Mansoor Ahmed, Goutham Reddy Alavalapati, and M. Mazhar Ullah Rathore, “Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks,” Future Generation Computer Systems, 2017. View at Publisher · View at Google Scholar
  • Mustafa Bilgehan Imamoglu, Mustafa Ulutas, and Guzin Ulutas, “A New Reversible Database Watermarking Approach with Firefly Optimization Algorithm,” Mathematical Problems in Engineering, vol. 2017, pp. 1–14, 2017. View at Publisher · View at Google Scholar
  • Salvador Martinez, Sebastien Gerard, and Jordi Cabot, “On Watermarking for Collaborative Model-Driven Engineering,” IEEE Access, vol. 6, pp. 29715–29728, 2018. View at Publisher · View at Google Scholar