By Topic

An algorithm resistive to invertibility attack in watermarking relational databases

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Xiaomei Dong ; School of Information Science and Engineering, Northeastern University, Shenyang 110004, USA ; Xiaohua Li ; Ge Yu ; Lei Zheng

As a copyright protection technique, digital watermarking has arisen more and more attention from the public. It has been widely applied to copyright protection of multimedia data (images, video and audio). The increasing use of relational databases also calls for the need of applying the technique to databases in order to protect the copyright. With the development of digital watermarking technique for relational databases, some studies go deep into watermarking attacks. Study on attacks will obtain algorithm's improvement and technique's development. Although there are several relational database digital watermarking algorithms, they cannot resist some attacks like invertibility attack. Invertibility attack is such an attack that the attacker finds a fictitious watermark in the watermarked database, and he fabricates an original database to announce his copyright possession. Thus it will result in the confusion of copyright confirmation. After analyzing the invertibility attack and studying the current watermarking algorithms on relational databases, we propose an algorithm by constructing relating characteristics according to the content of the database, which can resist invertibility attack efficiently. The simulative experiments also demonstrate that the algorithm is resistive to subset attacks as well.

Published in:

2009 Chinese Control and Decision Conference

Date of Conference:

17-19 June 2009