Prefix oriented N4WA coding scheme for improved tampering detection in relational data

Waqas Haider, Muhammad Sharif, Hadia Bashir, Mudassar Raza, Mussarat Yasmin

Abstract


In this paper, a memory efficient N4WA coding scheme (breifed in section 3.1) ispresented to detect tampering and restoring modified data values in relational data.The existing watermarking schemes for tampering detection do not provide necessarycomponents, such as accurate localization and restoration in cooperation. These flawsdegrade the quality and dependability of the tampering detection scheme. However, inthe proposed scheme, firstly the compressed code W is generated from original data M,using N4WA encoding and stored at certification authority CA. Secondly, the assumedsuspicious data M’ is given to N4WA encoding for generating another compressed codeW’. Meanwhile, the genrated W and W’ are compared to detect and accurately localizetampering in M’. Finally utilizing localization information Tcr, W and N4WA decodingassist in restoring the tampered data values. Investigational outcomes indicate thatfor the database relations of all data types, the minimum to maximum alterations aredetected, localized and restored successfully.

Keywords


Lossless compression; relational data restoration; tampering attacks; zero watermarking.

Full Text:

PDF

References


Abdel-Hamid, A.T. & Sofiene, T. (2008) Fragile IP watermarking schemes. In: Adaptive Hardware and

Systems, 2008. AHS’08. NASA/ESA Conference on, pp. 513-519.

Agrawal, R., Haas, P.J. & Kiernan, J. (2003) Watermarking relational data: framework, algorithms and

analysis. The VLDB journal,12:157-169.

Al-Haj, A. & Odeh, A. (2008) Robust and blind watermarking of relational database systems. Journal of

Computer Science, 4:1024.

Bhattacharya, S. & Cortesi, A. (2009a) A distortion free watermark framework for relational databases.

In: ICSOFT (2), pp. 229-234.

Bhattacharya, S. & Cortesi, A. (2009b) A generic distortion free watermarking scheme for relational

databases. Information Systems Security.Springer, Pp. 252-264.

Cao, H.W.X.C.Z. (2008) A speech based algorithm for watermarking relational databases. International

Symposiums on Information Processing, pp. 603-606

Chen, M., He, Y. & Lagendijk, R.L. (2005) A fragile watermark error detection scheme for wireless

video communications. Multimedia, IEEE Transactions on, 7:201-211.

Gao, L., Wang, D. & Hamadou, A. (2013) New fragile database watermarking scheme with restoration

using reed-solomon codes. Journal of Computational and Theoretical Nanoscience, 10:147-153.

Guo, F., Wang, J., Zhang, Z., Ye, X. & Li, D. (2006) An improved algorithm to watermark numeric

relational data. Information Security Applications. Springer, Pp. 138-149.

Guo, H., Li, Y., Liu, A. & Jajodia, S. (2006) A fragile watermarking scheme for detecting malicious

modifications of database relations. Information Sciences, 176:1350-1378.

Gupta, G. & Pieprzyk, J. (2009) Database relation watermarking resilient against secondary watermarking

attacks. Information Systems Security. Springer Pp. 222-236.

Halder, R. & Cortesi, A. (2010) Persistent watermarking of relational databases. In: Proceedings of the

IEEE International Conference on Advances in Communication, Network, and Computing, (CNC

, October, pp. 4-5.

Halder, R., Dasgupta, P., Naskar, S. & Sarma, S.S. (2011) An Internet-based ip protection scheme for

circuit designs using linear feedback shift register-based locking. Engineering Letters, 19:84.

Halder, R., Pal, S. & Cortesi, A. (2010) Watermarking schemes for relational databases: survey,

classification and comparison. Journal of Universal Computer Science, 16:3164-3190.

Hu, T.L., Chen, K. & Dong, J.X. (2005) Garwm: Towards a generalized and adaptive watermark scheme

for relational data. Advances in Web-Age Information Management. Springer, Pp. 380-391.

Huang, M., Cao, J., Peng, Z. & Fang, Y. (2004) A new watermark scheme for relational data. In:

Computer and Information Technology, International Conference, pp. 946-950.

Kamel, I. (2009) A schema for protecting the integrity of databases. Computers & Security, 28:698-709.

Khan, A. & Husain, S.A. (2013) A fragile zero watermarking scheme to detect and characterize malicious

modifications in database relations. The Scientific World Journal 2013: 1-16 Article ID 796726

Li, Y. & Deng, R.H. (2006) Publicly verifiable ownership protection for relational databases. In:

Proceedings of the 2006 ACM Symposium on Information, computer and communications security,

pp. 78-89.

Li, Y., Guo, H. & Jajodia, S. (2004) Tampering detection and localization for categorical data using

fragile watermarks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp.

-82.

Prasannakumari, V. (2009) A robust tampering proof watermarking for data integrity in relational

databases. Research Journal of Information Technology, 1:115-121.

Rashidi, H. (2010) A novel watermarking scheme for detecting and recovering distortions in database

tables. arXiv preprint arXiv:1009.0827

Sion, R. (2004). Proving ownership over categorical data. In: Data Engineering, 2004. Proceedings. 20th International Conference on, pp. 584-595.

Sion, R., Atallah, M.J. & Prabhakar, S. (2005) Rights protection for categorical data. Knowledge and

Data Engineering, IEEE Transactions, 17:912-926.

Tsai, M.H., Hsu, F.Y., Chang, J.D. & Wu, H.C. (2007) Fragile database watermarking for malicious

tampering detection using support vector regression. In: Intelligent Information Hiding and

Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference, pp. 493-496.

Tsai, M.H., Tseng, H.Y. & Lai, C.Y. (2006) A database watermarking scheme for temper detection. In:

Journal of Computer Information Systems, 2006

Zhang, Y., Niu, X.M. & Zhao, D. (2004) A method of protecting relational databases copyright with

cloud watermark. International Journal of Information Technology, 1:206-210.

Zhou, C.W.J.W.M. & Li, G.C.D. (2008) Atbam: An arnold transform based method on watermarking

relational data. International Conference on Multimedia and Ubiquitous Engineering, pp. 263-270

Zhou, X., Huang, M. & Peng, Z. ( 2007) An additive-attack-proof watermarking scheme for databases’

copyrights protection using image. In: Proceedings of the 2007 ACM symposium on Applied

computing, pp. 254-258.


Refbacks

  • There are currently no refbacks.