Prefix oriented N4WA coding scheme for improved tampering detection in relational data
Keywords:
Lossless compression, relational data restoration, tampering attacks, zero watermarking.Abstract
In this paper, a memory efficient N4WA coding scheme (breifed in section 3.1) ispresented to detect tampering and restoring modified data values in relational data.The existing watermarking schemes for tampering detection do not provide necessarycomponents, such as accurate localization and restoration in cooperation. These flawsdegrade the quality and dependability of the tampering detection scheme. However, inthe proposed scheme, firstly the compressed code W is generated from original data M,using N4WA encoding and stored at certification authority CA. Secondly, the assumedsuspicious data M’ is given to N4WA encoding for generating another compressed codeW’. Meanwhile, the genrated W and W’ are compared to detect and accurately localizetampering in M’. Finally utilizing localization information Tcr, W and N4WA decodingassist in restoring the tampered data values. Investigational outcomes indicate thatfor the database relations of all data types, the minimum to maximum alterations aredetected, localized and restored successfully.References
Abdel-Hamid, A.T. & Sofiene, T. (2008) Fragile IP watermarking schemes. In: Adaptive Hardware and
Systems, 2008. AHS’08. NASA/ESA Conference on, pp. 513-519.
Agrawal, R., Haas, P.J. & Kiernan, J. (2003) Watermarking relational data: framework, algorithms and
analysis. The VLDB journal,12:157-169.
Al-Haj, A. & Odeh, A. (2008) Robust and blind watermarking of relational database systems. Journal of
Computer Science, 4:1024.
Bhattacharya, S. & Cortesi, A. (2009a) A distortion free watermark framework for relational databases.
In: ICSOFT (2), pp. 229-234.
Bhattacharya, S. & Cortesi, A. (2009b) A generic distortion free watermarking scheme for relational
databases. Information Systems Security.Springer, Pp. 252-264.
Cao, H.W.X.C.Z. (2008) A speech based algorithm for watermarking relational databases. International
Symposiums on Information Processing, pp. 603-606
Chen, M., He, Y. & Lagendijk, R.L. (2005) A fragile watermark error detection scheme for wireless
video communications. Multimedia, IEEE Transactions on, 7:201-211.
Gao, L., Wang, D. & Hamadou, A. (2013) New fragile database watermarking scheme with restoration
using reed-solomon codes. Journal of Computational and Theoretical Nanoscience, 10:147-153.
Guo, F., Wang, J., Zhang, Z., Ye, X. & Li, D. (2006) An improved algorithm to watermark numeric
relational data. Information Security Applications. Springer, Pp. 138-149.
Guo, H., Li, Y., Liu, A. & Jajodia, S. (2006) A fragile watermarking scheme for detecting malicious
modifications of database relations. Information Sciences, 176:1350-1378.
Gupta, G. & Pieprzyk, J. (2009) Database relation watermarking resilient against secondary watermarking
attacks. Information Systems Security. Springer Pp. 222-236.
Halder, R. & Cortesi, A. (2010) Persistent watermarking of relational databases. In: Proceedings of the
IEEE International Conference on Advances in Communication, Network, and Computing, (CNC
, October, pp. 4-5.
Halder, R., Dasgupta, P., Naskar, S. & Sarma, S.S. (2011) An Internet-based ip protection scheme for
circuit designs using linear feedback shift register-based locking. Engineering Letters, 19:84.
Halder, R., Pal, S. & Cortesi, A. (2010) Watermarking schemes for relational databases: survey,
classification and comparison. Journal of Universal Computer Science, 16:3164-3190.
Hu, T.L., Chen, K. & Dong, J.X. (2005) Garwm: Towards a generalized and adaptive watermark scheme
for relational data. Advances in Web-Age Information Management. Springer, Pp. 380-391.
Huang, M., Cao, J., Peng, Z. & Fang, Y. (2004) A new watermark scheme for relational data. In:
Computer and Information Technology, International Conference, pp. 946-950.
Kamel, I. (2009) A schema for protecting the integrity of databases. Computers & Security, 28:698-709.
Khan, A. & Husain, S.A. (2013) A fragile zero watermarking scheme to detect and characterize malicious
modifications in database relations. The Scientific World Journal 2013: 1-16 Article ID 796726
Li, Y. & Deng, R.H. (2006) Publicly verifiable ownership protection for relational databases. In:
Proceedings of the 2006 ACM Symposium on Information, computer and communications security,
pp. 78-89.
Li, Y., Guo, H. & Jajodia, S. (2004) Tampering detection and localization for categorical data using
fragile watermarks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp.
-82.
Prasannakumari, V. (2009) A robust tampering proof watermarking for data integrity in relational
databases. Research Journal of Information Technology, 1:115-121.
Rashidi, H. (2010) A novel watermarking scheme for detecting and recovering distortions in database
tables. arXiv preprint arXiv:1009.0827
Sion, R. (2004). Proving ownership over categorical data. In: Data Engineering, 2004. Proceedings. 20th International Conference on, pp. 584-595.
Sion, R., Atallah, M.J. & Prabhakar, S. (2005) Rights protection for categorical data. Knowledge and
Data Engineering, IEEE Transactions, 17:912-926.
Tsai, M.H., Hsu, F.Y., Chang, J.D. & Wu, H.C. (2007) Fragile database watermarking for malicious
tampering detection using support vector regression. In: Intelligent Information Hiding and
Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference, pp. 493-496.
Tsai, M.H., Tseng, H.Y. & Lai, C.Y. (2006) A database watermarking scheme for temper detection. In:
Journal of Computer Information Systems, 2006
Zhang, Y., Niu, X.M. & Zhao, D. (2004) A method of protecting relational databases copyright with
cloud watermark. International Journal of Information Technology, 1:206-210.
Zhou, C.W.J.W.M. & Li, G.C.D. (2008) Atbam: An arnold transform based method on watermarking
relational data. International Conference on Multimedia and Ubiquitous Engineering, pp. 263-270
Zhou, X., Huang, M. & Peng, Z. ( 2007) An additive-attack-proof watermarking scheme for databases’
copyrights protection using image. In: Proceedings of the 2007 ACM symposium on Applied
computing, pp. 254-258.