Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013, Article ID 796726, 16 pages
http://dx.doi.org/10.1155/2013/796726
Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

1Department of Computing & Technology, Iqra University, Islamabad 44000, Pakistan
2Faculty of Computer Science & IT, King Faisal University, Ahsaa 31982, Saudi Arabia

Received 19 February 2013; Accepted 10 April 2013

Academic Editors: P. Melin and Y. Zhu

Copyright © 2013 Aihab Khan and Syed Afaq Husain. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, “Combining digital watermarks and collusion secure fingerprints for digital images,” SPIE Journal of Electronic Imaging, vol. 9, no. 4, pp. 456–467, 2000. View at Google Scholar · View at Scopus
  2. E. T. Lin and E. J. Delp, “Temporal synchronization in video watermarking,” IEEE Transactions on Signal Processing, vol. 52, no. 10, pp. 3007–3022, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Chen, Y. He, and R. L. Lagendijk, “A fragile watermark error detection scheme for wireless video communications,” IEEE Transactions on Multimedia, vol. 7, no. 2, pp. 201–211, 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. F. Hartung, P. Eisert, and B. Girod, “Digital watermarking of mpeg-4 facial animation parameters,” Computers and Graphics, vol. 22, no. 4, pp. 425–435, 1998. View at Google Scholar · View at Scopus
  5. R. Agrawal, P. J. Haas, and J. Kiernan, “Watermarking relational data: framework, algorithms and analysis,” VLDB Journal, vol. 12, no. 2, pp. 157–169, 2003. View at Publisher · View at Google Scholar · View at Scopus
  6. G. Gupta and J. Pieprzyk, “Database relation watermarking resilient against secondary watermarking attacks,” in Proceedings of the 5th International Conference on Information Systems Security (ICISS '09), vol. 5905 of Lecture Notes in Computer Science, pp. 222–236, Springer, Kolkata, India, 2009.
  7. Y. Zhang, X. Niu, and D. Zhao, “A method of protecting relational databases copyright with cloud watermark,” International Journal of Information and Communication Engineering, vol. 1, pp. 337–341, 2005. View at Google Scholar
  8. F. Guo, J. Wang, Z. Zhang, X. Ye, and D. Li, “An improved algorithm to watermark numeric relational data,” in Proceedings of the 6th International Workshop on Information Security applications (WISA '05), vol. 3786 of Lecture Notes in Computer Science, pp. 138–149, Springer, Jeju Island, Republic of Korea, 2005.
  9. M. Huang, J. Cao, Z. Peng, and Y. Fang, “A new watermark mechanism for relational data,” in Proceedings of the 4th International Conference on Computer and Information Technology (CIT '04), pp. 946–950, IEEE Computer Society, Wuhan, China, 2004.
  10. T. Hu, G. Chen, K. Chen, and J. Dong, “Garwm: towards a generalized and adaptive watermark scheme for relational data,” in Proceedings of the 6th International Conference in Advances in Web-Age Information Management (WAIM '05), vol. 3739 of Lecture Notes in Computer Science, pp. 380–391, Springer, Hangzhou, China, 2005.
  11. R. Sion, “Proving ownership over categorical data,” in Proceedings of the 20th International Conference on Data Engineering (ICDE '04), pp. 584–595, IEEE Computer Society, Boston, Mass, USA, April 2004. View at Publisher · View at Google Scholar · View at Scopus
  12. R. Sion, M. Atallah, and S. Prabhakar, “Rights protection for categorical data,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 7, pp. 912–926, 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. C. Wang, J. Wang, M. Zhou, G. Chen, and D. Li, “Atbam: an arnold transform based method on watermarking relational data,” in Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE '08), pp. 263–270, IEEE Computer Society, Beijing, China, 2008.
  14. X. Zhou, M. Huang, and Z. Peng, “An additive-attack-proof watermarking mechanism for databases copyrights protection using image,” in Proceedings of the ACM symposium on Applied Computing (SAC '07), pp. 254–258, ACM Press, Seoul, Republic of Korea, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Al-Haj and A. Odeh, “Robust and blind watermarking of relational database systems,” Journal of Computer Science, vol. 4, no. 12, pp. 1024–1029, 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Wang, X. Cui, and Z. Cao, “A speech based algorithm for watermarking relational databases,” in Proceedings of the International Symposiums on Information Processing (ISIP '08), pp. 603–606, IEEE Computer Society, Moscow, Russia, 2008.
  17. H. Guo, Y. Li, A. Liu, and S. Jajodia, “A fragile watermarking scheme for detecting malicious modifications of database relations,” Information Sciences, vol. 176, no. 10, pp. 1350–1378, 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Khataeimaragheh and H. Rashidi, “A novel watermarking scheme for detecting and recovering distortions in database tables,” International Journal of Database Management Systems, vol. 2, no. 3, pp. 1–11, 2010. View at Google Scholar
  19. S. Iqbal, A. Rauf, S. Mahfooz, S. Khusro, and S. H. Shah, “Self-constructing fragile watermark algorithm for. relational database integrity proof,” World Applied Sciences Journal, vol. 19, no. 9, pp. 1273–1277, 2012. View at Google Scholar
  20. V. Prasannakumari, “A robust tamperproof watermarking for data integrity in relational databases,” Research Journal of Information Technology, vol. 1, no. 3, pp. 115–121, 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Lafaye, D. Gross-Amblard, C. Constantin, and M. Guerrouani, “WATERMILL: an optimized fingerprinting system for databases under constraints,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 4, pp. 532–546, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. Y. Li, H. Guo, and S. Jajodia, “Tamper detection and localization for categorical data using fragile watermarks,” in Proceedings of the 4th ACM Workshop on Digital Rights Management (DRM '04), pp. 73–82, ACM Press, Washington, DC, USA, October 2004. View at Scopus
  23. I. Kamel, “A schema for protecting the integrity of databases,” Computers and Security, vol. 28, no. 7, pp. 698–709, 2009. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Bhattacharya and A. Cortesi, “A distortion free watermark framework for relational databases,” in Proceedings of the 4th International Conference on Software and Data Technologies (ICSOFT '09), pp. 229–234, INSTICC Press, Sofia, Bulgaria, July 2009. View at Scopus
  25. A. Hamadou, X. Sun, L. Gao, and S. A. Shah, “A fragile zero-watermarking technique for authentication of relational databases,” International Journal of Digital Content Technology and its Applications, vol. 5, no. 5, pp. 189–200, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting relational databases: schemes and specialties,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 1, pp. 34–45, 2005. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Liu, S. Wang, R. H. Deng, and W. Shao, “A block oriented fingerprinting scheme in relational database,” in Proceedings of the 7th International Conference in Information Security and Cryptology (ICISC '04), vol. 3506 of Lecture Notes in Computer Science, pp. 455–466, Springer, Seoul, Republic of Korea, 2004.
  28. F. Guo, J. Wang, and D. Li, “Fingerprinting relational databases,” in Proceedings of the ACM symposium on Applied Computing (SAC '06), pp. 487–492, ACM Press, Dijon, France, 2006.
  29. C. T. Li, F. M. Yang, and C. S. Lee, “Oblivious fragile watermarking scheme for image authentication,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 3445–3448, IEEE Press, Orlando, Fla, USA, 2002.
  30. H. Yang, X. Sun, B. Wang, and Z. Qin, “An image-adaptive semi-fragile watermarking for image authentication and tamper detection,” in Proceedings of the International Conference on Computational Science and its Applications, Kuala Lumpur, Malaysia, 2007.
  31. J. Hu, J. Huang, D. Huang, and Y. Q. Shi, “Image fragile watermarking based on fusion of multi-resolution tamper detection,” Electronics Letters, vol. 38, no. 24, pp. 1512–1513, 2002. View at Publisher · View at Google Scholar · View at Scopus
  32. J. Zhang and H. Bin, “Fragile audio watermarking scheme based on sample mean sequence,” in Proceedings of the IEEE International Conference on Multimedia Technology (ICMT '11), pp. 333–336, 2011.
  33. H. Wang and M. Fan, “Centroid-based semi-fragile audio watermarking in hybrid domain,” Science in China F, vol. 53, no. 3, pp. 619–633, 2010. View at Publisher · View at Google Scholar · View at Scopus
  34. S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption and watermarking in video compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, no. 6, pp. 774–778, 2007. View at Publisher · View at Google Scholar · View at Scopus
  35. X. Huazheng, S. Xingming, and T. Chengliang, “New fragile watermarking scheme for text documents authentication,” Wuhan University Journal of Natural Sciences, vol. 11, no. 6, pp. 1661–1666, 2006. View at Publisher · View at Google Scholar · View at Scopus
  36. H. Yang, A. C. Kot, and J. Liu, “Semi-fragile watermarking for text document images authentication,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '05), pp. 4002–4005, May 2005. View at Publisher · View at Google Scholar · View at Scopus
  37. http://archive.ics.uci.edu/ml/datasets/Covertype.