Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation

Published: 01 March 2014 Publication History

Abstract

In this paper, we adapt the robust reversible watermarking modulation originally proposed by Vleeschouwer et. al. for images to the protection of relational databases. The resulting scheme modulates the relative angular position of the circular histogram center of mass of one numerical attribute for message embedding. It can be used for verifying database authentication as well as for traceability when identifying database origin after it has been modified. Beyond the application framework, we theoretically evaluate the performance of our scheme in terms of capacity, distortion, and robustness against two common database modifications: 1) addition and 2) removal of tuples. To that end, we model the impact of the embedding process and of database modifications on the probability distribution of the center of mass position. We further verify experimentally these theoretical limits within the framework of a medical database of more than one million of inpatient hospital stay records. We show that under the assumptions imposed by the central limit theorem, experimental results fit the theory. We also compare our approach with two recent and efficient schemes so as to prove its benefits.

Cited By

View all
  • (2024)Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational DatabasesInformation and Communications Security10.1007/978-981-97-8801-9_15(289-309)Online publication date: 27-Aug-2024
  • (2023)Reversible Database Watermarking Based on Order-preserving Encryption for Data SharingACM Transactions on Database Systems10.1145/358976148:2(1-25)Online publication date: 13-May-2023
  • (2023)Robust Reversible Watermarking by Fractional Order Zernike Moments and Pseudo-Zernike MomentsIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2023.327911633:12(7310-7326)Online publication date: 1-Dec-2023
  • Show More Cited By
  1. Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Information Forensics and Security
    IEEE Transactions on Information Forensics and Security  Volume 9, Issue 3
    March 2014
    200 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 March 2014

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational DatabasesInformation and Communications Security10.1007/978-981-97-8801-9_15(289-309)Online publication date: 27-Aug-2024
    • (2023)Reversible Database Watermarking Based on Order-preserving Encryption for Data SharingACM Transactions on Database Systems10.1145/358976148:2(1-25)Online publication date: 13-May-2023
    • (2023)Robust Reversible Watermarking by Fractional Order Zernike Moments and Pseudo-Zernike MomentsIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2023.327911633:12(7310-7326)Online publication date: 1-Dec-2023
    • (2021)A Graded Reversible Watermarking Scheme for Relational DataMobile Networks and Applications10.1007/s11036-019-01491-526:4(1552-1563)Online publication date: 1-Aug-2021
    • (2020)A Reversible Hiding Technique Using LSB Matching for Relational DatabasesInformatica10.15388/20-INFOR41131:3(481-497)Online publication date: 1-Jan-2020
    • (2020)Toward watermarking compressed data in columnar database architecturesSecurity and Privacy10.1002/spy2.843:4Online publication date: 2-Jul-2020
    • (2019)An improved capacity data hiding technique based on image interpolationMultimedia Tools and Applications10.1007/s11042-018-6465-878:6(7181-7205)Online publication date: 1-Mar-2019
    • (2018)Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases – Application to Outsourced Genetic DataDigital Forensics and Watermarking10.1007/978-3-030-11389-6_12(151-166)Online publication date: 22-Oct-2018
    • (2017)Numbering with spiral pattern to prove authenticity and integrity in medical imagesPattern Analysis & Applications10.1007/s10044-016-0552-020:4(1129-1144)Online publication date: 1-Nov-2017
    • (2015)Robust Watermarking of Relational Databases With Ontology-Guided Distortion ControlIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.243996210:9(1939-1952)Online publication date: 1-Sep-2015
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media