IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Reversible and Blind Database Watermarking Using Difference Expansion

Reversible and Blind Database Watermarking Using Difference Expansion
View Sample PDF
Author(s): Gaurav Gupta (Macquarie University, Australia)and Josef Pieprzyk (Macquarie University, Australia)
Copyright: 2009
Volume: 1
Issue: 2
Pages: 13
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/jdcf.2009040104

Purchase

View Reversible and Blind Database Watermarking Using Difference Expansion on the publisher's website for pricing and purchasing information.

Abstract

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.

Related Content

Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev. © 2024. 17 pages.
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu. © 2024. 13 pages.
Dawei Zhang. © 2024. 16 pages.
Yuwen Zhu, Lei Yu. © 2023. 16 pages.
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu. © 2023. 14 pages.
Wenjun Yao, Ying Jiang, Yang Yang. © 2023. 20 pages.
Dawei Zhang. © 2023. 14 pages.
Body Bottom