A fragile zero-watermarking technique for authentication of relational databases

被引:0
|
作者
Hamadou A. [1 ]
Sun X. [1 ]
Gao L. [1 ]
Shah S.A. [1 ]
机构
[1] School of Computer and Communication, Hunan University, Changsha 410082, Hunan
关键词
Content integrity; Relational databases; Tamper detection; Zero-watermarking;
D O I
10.4156/jdcta.vol5.issue5.21
中图分类号
学科分类号
摘要
The protection of databases integrity is currently a very active research field in digital watermarking. Most of the existing watermarking techniques designed for securing relational databases introduce some distortions to the underlying data during the watermark insertion process. Although these errors are claimed to be minuscule, they inevitably degrade the quality of the watermarked data. Moreover, prior database watermarking schemes are usually developed to protect specific types of data such as numeric or categorical attributes. In this paper, we propose a novel method based on zero-watermarking approach for content integrity checking of database relations. As a result, the proposed scheme does not change the content of the host data, thus resolving the inherent conflict between security and imperceptibility. Furthermore, there is no constraint on the type of attributes being watermarked. Security analysis and experimental results showed that our proposed method can detect and localized malicious data modifications with high probability.
引用
收藏
页码:189 / 200
页数:11
相关论文
共 50 条
  • [41] Fragile logo watermarking for public authentication
    Bravo, Sergio
    Gan, Lu
    Nandi, Asoke K.
    Aburdene, Maurice F.
    2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1669 - +
  • [42] Scalable fragile watermarking for image authentication
    Piper, Angela
    Safavi-Naini, Reihaneh
    IET INFORMATION SECURITY, 2013, 7 (04) : 300 - 311
  • [43] A zero-watermarking technique based on i-vector model for audio copyright protection
    Xu, Longting
    He, Mingrui
    Guo, Xing
    ELECTRONICS LETTERS, 2023, 59 (19)
  • [44] A Fragile Watermarking Algorithm for Hologram Authentication
    Cheng, Chau-Jern
    Hwang, Wen-Jyi
    Zeng, Han-Yi
    Lin, Yu-Chih
    JOURNAL OF DISPLAY TECHNOLOGY, 2014, 10 (04): : 263 - 271
  • [45] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [46] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [47] Fragile watermarking for color image authentication
    Monzoy-Villuendas, M.
    Salinas-Rosales, M.
    Nakano-Miyatake, M.
    Perez-Meana, H. M.
    2007 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING, 2007, : 88 - 91
  • [48] Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing
    Hilal, Anwer Mustafa
    Al-Wesabi, Fahd N.
    Hamza, Manar Ahmed
    Medani, Mohammed
    Mahmood, Khalid
    Mahzari, Mohammad
    PATTERN ANALYSIS AND APPLICATIONS, 2022, 25 (01) : 47 - 62
  • [49] Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing
    Anwer Mustafa Hilal
    Fahd N. Al-Wesabi
    Manar Ahmed Hamza
    Mohammed Medani
    Khalid Mahmood
    Mohammad Mahzari
    Pattern Analysis and Applications, 2022, 25 : 47 - 62
  • [50] Robust zero-watermarking technique based on DO-ResNet and Adaptive Pelican Optimisation
    Shedole, Sambhaji Marutirao
    Santhi, V.
    INTERNATIONAL JOURNAL OF SIGNAL AND IMAGING SYSTEMS ENGINEERING, 2024, 13 (03)