A fragile zero-watermarking technique for authentication of relational databases

被引:0
|
作者
Hamadou A. [1 ]
Sun X. [1 ]
Gao L. [1 ]
Shah S.A. [1 ]
机构
[1] School of Computer and Communication, Hunan University, Changsha 410082, Hunan
关键词
Content integrity; Relational databases; Tamper detection; Zero-watermarking;
D O I
10.4156/jdcta.vol5.issue5.21
中图分类号
学科分类号
摘要
The protection of databases integrity is currently a very active research field in digital watermarking. Most of the existing watermarking techniques designed for securing relational databases introduce some distortions to the underlying data during the watermark insertion process. Although these errors are claimed to be minuscule, they inevitably degrade the quality of the watermarked data. Moreover, prior database watermarking schemes are usually developed to protect specific types of data such as numeric or categorical attributes. In this paper, we propose a novel method based on zero-watermarking approach for content integrity checking of database relations. As a result, the proposed scheme does not change the content of the host data, thus resolving the inherent conflict between security and imperceptibility. Furthermore, there is no constraint on the type of attributes being watermarked. Security analysis and experimental results showed that our proposed method can detect and localized malicious data modifications with high probability.
引用
收藏
页码:189 / 200
页数:11
相关论文
共 50 条
  • [31] A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
    Tayan, Omar
    Kabir, Muhammad N.
    Alginahi, Yasser M.
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [32] Robust Image Tampering Detection and Ownership Authentication Using Zero-Watermarking and Siamese Neural Networks
    Arevalo-Ancona, Rodrigo Eduardo
    Cedillo-Hernandez, Manuel
    Garcia-Ugalde, Francisco Javier
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (10) : 436 - 446
  • [33] A video zero-watermarking algorithm based on LPM
    De Li
    Luyan Qiao
    Jongweon Kim
    Multimedia Tools and Applications, 2016, 75 : 13093 - 13106
  • [34] A novel fragile image authentication watermarking technique based on logistic maps
    Li Zhaohong
    Hou Jianjun
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1 - 3, 2006, : 307 - 310
  • [35] A fragile watermarking technique for image authentication using singular value decomposition
    Oktavia, V
    Lee, WH
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 2, PROCEEDINGS, 2004, 3332 : 42 - 49
  • [36] A Zero-watermarking Scheme based on LPM and Holographic
    Li, De
    Qiao, LuYan
    Kim, JongWeon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 89 - 100
  • [37] Double Zero-watermarking Algorithm on Hyperchaotic Iteration
    Wang, W. X.
    Xu, H. L.
    Li, S.
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 2, PROCEEDINGS, 2009, : 567 - 570
  • [38] Robust zero-watermarking algorithm for CAD models
    1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):
  • [39] A video zero-watermarking algorithm based on LPM
    Li, De
    Qiao, Luyan
    Kim, Jongweon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13093 - 13106
  • [40] Zero-Watermarking for Face Image Protection in Database
    Le, Hai-Duong
    Xu, Xiaoyan
    Wang, Qiang
    Li, Li
    Chang, Chin-Chen
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (01): : 129 - 135