LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases
<p>Flowchart of our proposed LRW-RDB scheme.</p> "> Figure 2
<p>Resilience to alteration attacks for various values of the <span class="html-italic">g</span> parameter.</p> "> Figure 3
<p>Resilience to deletion attacks for various values of <span class="html-italic">g</span> parameter.</p> "> Figure 4
<p>Resilience to mix-match attacks for various values of <span class="html-italic">g</span> parameter.</p> "> Figure 5
<p>Comparison of the results of resilience to an alteration attack among the four schemes with <span class="html-italic">g</span> = 6.</p> "> Figure 6
<p>Comparison of the results of resilience to a deletion attack among the four schemes, with <span class="html-italic">g</span> = 6.</p> "> Figure 7
<p>Comparison of the results of resilience to a mix-match attack among the four schemes, with <span class="html-italic">g</span> = 6.</p> ">
Abstract
:1. Introduction
2. Five Basic Requirements for Relational Databased-Based Watermarking Scheme
- i.
- Preventing illegal watermark embedding and authentication: To embed a watermark, some parameters that are used to control the number of selected tuples and attributes for generating the watermark must be determined in advance and kept secret. In other words, only the authorized database owner, such as Kait, who knows all of the above parameters, can generate and embed watermark during the watermark embedding phase and then extract the hidden watermark and verify it during the watermark extracting and verifying phase. Therefore, a good relational database-based watermarking scheme must prevent illegal watermark embedding by malicious attackers.
- ii.
- Reversibility: The original relational database, such as K-RDB, should be completely restored after the hidden watermark W has been detected or identified by its owner, Kait.
- iii.
- Incremental updatability: A database may need to be updated frequently, the amount of either tuples or attributes may be updated frequently. To maintain the scalability and availability of a relational database’s watermark, the selected tuples and attributes for watermark generation and embedding must be independent from the remaining tuples and attributes.
- iv.
- Robustness: The designed watermark scheme must be able to resistant various attacks, e.g., deletion, alternation, mix-match, and sorting attacks.
- v.
- Imperceptibility: The watermarked tuple and the watermarked attributes are chosen randomly. Therefore, a malicious attacker Evil cannot guess which tuple and attribute were used to carry the watermark during the watermark embedding phase.
- vi.
- Blind system: When either the owner or a third-party wants to verify the database, such as K-RDBW, they neither need knowledge of the original database nor the original watermark.
3. The Proposed LRW-CRDB Watermarking Scheme
3.1. Reference Set Generation
Algorithm 1: Reference set generation |
Input: MAC value of primary key ti.PK, two embedding keys K1 and K2 |
Output: two reference sets, RS1 and RS2 |
Generate two random sequences S1 and S2;//using a pseudo-random generator with the seed value *K1 and *K2, respectively. S1 and S2 have four distinct elements, and their values are from 0 to 3. |
OriginalSet1 = {S, M, L, XL}; |
OriginalSet2 = {s, m, l, xl}; |
for i = 0 to 3 do |
RS1[i] = OriginalSet1[S1[i]]; |
RS2[i] = OriginalSet2[S2[i]]; |
end for; |
end |
3.2. Watermark Insertion
Algorithm 2: Watermark embedding |
Input: Relational database R, parameter g |
Output: Watermarked relational database RW, embedding keys K1 and K2 |
Generate the embedding keys K1 and K2//using Equations (2) and (3) |
Generate watermark W;//using Equation (4) |
for each tuple ti ∈ R do |
if mod g is equal to 0, then//the current tuple is selected |
attribute_index j = mod α//the current attribute Aj is selected |
mark_bit_idx = mod L |
b = W[mark_bit_idx]; |
bit_encoding(, K1, K2, b, tiAj); |
end if; |
end for each tuple; |
end |
Algorithm 3: Bit-encoding |
Input: , embedding keys, K1 and K2, watermark bit b, the value of attribute j of tuple i: tiAj |
Output: the update value of attribute j of tuple i: tiAj |
[RS1 RS2] = ReferenceSetGeneration(, K1, K2)//determine two reference sets, RS1 and RS2 |
Get index idx of attribute value tiAj//index of attribute value in OriginalSet set |
if %2 = 0, then |
if b = 0, then tiA’j = RS1[idx]; |
else tiA’j = RS2[idx]; |
end if; |
else |
if b = 0, then tiA’j = RS2[idx]; |
else tiA’j = RS1[idx]; |
end if; |
end if; |
Update_Attr(); //Update attribute value tiAj by value tiA’j |
3.3. Watermark Detection
Algorithm 4: Watermark detection |
Input: Relational database RW, parameters g, and α |
Output: Watermarked status ∈ {true, false}, and recover relational database RGenerate embedding keys, K1 and K2//using Equations (2) and (3) |
Generate watermark W;//using Equation (4) |
for i = 0 to L − 1 do |
count[i][0] = 0; count[i][1] = 0; //reset the votes of the watermark |
end for; |
for each tuple ti ∈ R do |
if mod g equal 0, then//select this tuple |
attribute_index j = mod α//select this attribute Aj |
mark_bit_idx = mod L |
b = bit_decoding(, K1, K2, tiAj); |
count[mark_bit_idx][b] = count[mark_bit_idx][b] + 1; |
end if; |
end for each tuple; |
for i = 0 to L − 1 do |
if count[i][0] + count[i][1] = 0 then W′[i] = −1; |
end if; |
if count[i][1] > count[i][1] then W′[i] = 1; |
else W′[i] = 0; |
end if; |
end for; |
for i = 0 to L − 1 do//find the match result between the original and the detected watermarks |
if W′ [i] = W[i] then matchamount + = 1; |
end if; |
end for; |
if matchamount = L, then |
return true;//relational database R is restored successfully |
else |
return false;//relational database R can not be restored |
end if; |
Algorithm 5: Bit-decoding |
Input: , embedding keys, K1 and K2, the value of the watermarked attribute j of tuple i: tiAj |
Output: watermark bit b and the update value of attribute j of tuple i: tiAj |
[RS1 RS2] = ReferenceSetGeneration(, K1, K2)//determine two reference sets, RS1 and RS2 |
if%2 = 0, then |
if tiA’j ∈ RS1, then |
b = 0; |
Get index idx of attribute value tiAj from the set RS1; |
else |
b = 1; |
Get index idx of attribute value tiAj from the set RS1; |
end if; |
else |
if tiA’j ∈ RS2 then |
b = 0; |
Get index idx of attribute value tiAj from the set RS1; |
else |
b = 1; |
Get index idx of attribute value tiAj from the set RS1; |
end if; |
recon_value = OriginalSet[idx]; |
end if; |
Update_Attr(); //Update attribute value tiAj by value recon_value |
4. Experimental Results
4.1. Robustness Analysis
4.1.1. Alternation Attack
4.1.2. Deletion Attack
4.1.3. Mix-Match Attack
4.1.4. Sorting Attack
4.1.5. Combination Attack
4.2. Performance Comparison
4.2.1. Alternation Attack
4.2.2. Deletion Attack
4.2.3. Mix-Match Attack
4.2.4. Sorting Attack
4.3. Usability Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Swanson, M.; Kobayashi, M.; Tewfik, A. Multimedia data-embedding and watermarking technologies. Proc. IEEE 1998, 86, 1064–1087. [Google Scholar] [CrossRef]
- Chang, C.-C.; Nguyen, T.S.; Lin, C.-C. A reversible data hiding scheme for VQ indices using locally adaptive coding. J. Vis. Commun. Image Represent. 2011, 22, 664–672. [Google Scholar] [CrossRef]
- Shiu, P.-F.; Tai, W.-L.; Jan, J.-K.; Chang, C.-C.; Lin, C.-C. An Interpolative AMBTC-based high-payload RDH scheme for encrypted images. Signal Process. Image Commun. 2019, 74, 64–77. [Google Scholar] [CrossRef]
- Xie, X.-Z.; Lin, C.-C.; Chang, C.-C. Data Hiding Based on a Two-Layer Turtle Shell Matrix. Symmetry 2018, 10, 47. [Google Scholar] [CrossRef] [Green Version]
- Su, G.-D.; Chang, C.-C.; Lin, C.-C. A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images. IEEE Access 2020, 8, 26984–27000. [Google Scholar] [CrossRef]
- Chen, M.; He, Y.; Lagendijk, R. A fragile watermark error detection scheme for wireless video communications. IEEE Trans. Multimed. 2005, 7, 201–211. [Google Scholar] [CrossRef] [Green Version]
- Lin, C.-C.; He, S.-L.; Chang, C.-C. Pixel-based fragile image watermarking based on absolute moment block truncation coding. Multimed. Tools Appl. 2021, 80, 29497–29518. [Google Scholar] [CrossRef]
- Sergio, B.S.; Gan, L.; Nandi, A.K.; Aburdene, M.F. Secure private fragile watermarking scheme with improved tampering localization accuracy. IET Inf. Secur. 2010, 4, 137–148. [Google Scholar]
- Dharwadkar, N.V.; Amberker, B.B. An Efficient Non-blind Watermarking Scheme for Color Images using Discrete Wavelet Transformation. Int. J. Comput. Appl. 2010, 2, 60–66. [Google Scholar] [CrossRef]
- Bhatnagar, G.; Wu, Q.J.; Raman, B. Robust gray-scale logo watermarking in wavelet domain. Comput. Electr. Eng. 2012, 38, 1164–1176. [Google Scholar] [CrossRef]
- Song, C.; Sudirman, S.; Merabti, M. A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 2012, 23, 549–568. [Google Scholar] [CrossRef]
- Preda, R.O. Semi-fragile watermarking for image authentication with sensitive tamper location in the wavelet domain. Measurement 2013, 46, 367–373. [Google Scholar] [CrossRef]
- Chang, C.-C.; Lin, C.-C.; Su, G.-D. An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC. Multimed. Tools Appl. 2020, 79, 24795–24824. [Google Scholar] [CrossRef]
- Agrawal, R.; Kiernan, J. Watermarking Relational Databases. In Proceedings of the 28th International Conference on Very Large Databases, Hong Kong, China, 20–23 August 2002; pp. 155–166. [Google Scholar] [CrossRef]
- Sion, R. Proving ownership over categorical data. In Proceedings of the 20th IEEE International Conference on Data Engineering ICDE, Boston, MA, USA, 2 April 2004; pp. 584–596. [Google Scholar]
- Li, Y.; Swarup, V.; Jajodia, S. Fingerprinting relational databases: Schemes and specialties. IEEE Trans. Dependable Secur. Comput. 2005, 2, 34–45. [Google Scholar] [CrossRef]
- Shehab, M.; Bertino, E.; Ghafoor, A. Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Trans. Knowl. Data Eng. 2007, 20, 116–129. [Google Scholar] [CrossRef]
- Al-Haj, A.; Odeh, A. Robust and Blind Watermarking of Relational Database Systems. J. Comput. Sci. 2008, 4, 1024–1029. [Google Scholar] [CrossRef] [Green Version]
- Bhattacharya, S.; Cortesi, A. A Generic Distortion Free Watermarking Technique for Relational Databases. In International Conference on Information Systems Security; Springer: Berlin, Germany, 2009; pp. 252–264. [Google Scholar] [CrossRef]
- Prasannakumari, V. A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inf. Technol. 2009, 1, 115–121. [Google Scholar]
- Hamadou, A.; Sun, X.; Gao, L.; Shah, S.S.A. A Fragile Zero-Watermarking Technique for Authentication of Relational Databases. Int. J. Digit. Content Technol. Its Appl. 2011, 5, 189–200. [Google Scholar] [CrossRef]
- Farfoura, M.E.; Horng, S.-J.; Lai, J.-L.; Run, R.-S.; Chen, R.-J.; Khan, M.K. A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst. Appl. 2012, 39, 3185–3196. [Google Scholar] [CrossRef]
- Rao, U.P.; Patel, D.R.; Vikani, P.M. Relational Database Watermarking for Ownership Protection. Procedia Technol. 2012, 6, 988–995. [Google Scholar] [CrossRef] [Green Version]
- Khan, A.; Husain, S.A. A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations. Sci. World J. 2013, 2013, 796726. [Google Scholar] [CrossRef]
- Shah, S.A.; Khan, I.A.; Kazmi, S.Z.H.; Nasaruddin, F.H.B.M. Semi-fragile watermarking scheme for relational database tamper detection. Malays. J. Comput. Sci. 2021, 34, 1–12. [Google Scholar]
Attack Types | Definitions |
---|---|
Alteration attack | Malicious attackers, such as Evil, who want to destroy the hidden watermark in the watermarked relational database by randomly modifying partial values of the chosen tuples, i.e., K-RDBW. |
Deletion attack | Malicious attackers, such as Evil, try to randomly delete partial chosen tuples in the watermarked relational database, i.e., K-RDBW. to weaken the hidden watermark. |
Sorting attack | Malicious attackers, such as Evil, try to re-sort the selected tuples of the watermarked relational data, to damage the hidden watermark. |
Mix-match attack | The mix-match attack is also called an insertion attack. Malicious attackers, such as Evil, try to insert a certain number of selected tuples from other database into all of the tuples of the watermarked relational database, and Evil hopes the hidden watermark will not be detected. |
Benign database updates | Assume that malicious attackers, such as Evil, try to copy Kait’s watermarked relational database K-RDBW, so that the attackers can sell this valuable database. However, the attackers do not know the hidden watermark W in Kait’s database. Therefore, the malicious attackers insert new tuples or new attributes into Kait’s database before he/she uses it, so that the attackers can claim they also own Kait’s database. Although the attackers update the relational database several times, Kait’s watermark might not be deleted from K-RDBW. Therefore, when Kait suspects that one database entry is illegally copied from her watermarked relational database, Kait can extract her watermark W from the suspected database to prove her copyright.In other words, benign database updates can also be referred to the subset attack, as defined by Agrawal and Kiernan [2]. |
Parameters | Descriptions |
---|---|
R | Database relation which is used to be watermarked |
RW | Relational database with hidden watermark |
tiAj | Attribute j of tuple i in the relational database R. It is noted that tiAj is the smallest inserting unit in our scheme. |
N | Number of tuples in the relational database R |
K1 and K2 | Two secret embedding keys |
1/g | Fraction of tuples selected for watermark embedding |
α | Number of attributes in the relational database available for carrying a watermark |
L | The length of a given watermark W |
Criteria | LRW-RDB Scheme | Shah et al.’s Semi-Fragile Watermarking Scheme [25] |
---|---|---|
Database Type | Relational database | Relational database |
Embedding strategy | Switching between two difference reference set + majority voting | Changing text case |
Attack types | Alternation, Deletion, Mix-match (insertion), Sorting | Insertion with error in detection, Detection with error detection |
Watermarking type | Reversibility | Semi-fragile |
Blind system | Yes | Yes |
Benign database updates | Yes | No |
Imperceptibility | Yes | Yes |
Incremental updatability | Yes | Yes |
Reversibility | Yes | No |
Prevent illegal watermark embedding and authentication | Yes | Yes |
% of watermark match when 50% tuples’ deletion | 100% | 60% when group size is 25, 100% when group size is 75 |
% of watermark match when 90% tuples’ deletion | 100% | 5% when group size is 25,50% when group size is 75,100% when group size is 150 |
Usability | + | − |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lin, C.-C.; Nguyen, T.-S.; Chang, C.-C. LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases. Symmetry 2021, 13, 2191. https://doi.org/10.3390/sym13112191
Lin C-C, Nguyen T-S, Chang C-C. LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases. Symmetry. 2021; 13(11):2191. https://doi.org/10.3390/sym13112191
Chicago/Turabian StyleLin, Chia-Chen, Thai-Son Nguyen, and Chin-Chen Chang. 2021. "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases" Symmetry 13, no. 11: 2191. https://doi.org/10.3390/sym13112191
APA StyleLin, C. -C., Nguyen, T. -S., & Chang, C. -C. (2021). LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases. Symmetry, 13(11), 2191. https://doi.org/10.3390/sym13112191