SEMI-FRAGILE WATERMARKING SCHEME FOR RELATIONAL DATABASE TAMPER DETECTION

被引:6
|
作者
Shah, Saeed Arif [1 ]
Khan, Imran Ali [2 ]
Kazmi, Syed Zaki Hassan [3 ]
Nasaruddin, Fariza Hanum Binti Md [4 ]
机构
[1] Saudi Elect Univ Riyadh, Riyadh, Saudi Arabia
[2] COMSATS Univ Islamabad, Abbottabad, Pakistan
[3] Univ AJK, Muzaffarabad, Pakistan
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
关键词
Semi-fragile watermark; Relational Database Security; Integrity;
D O I
10.22452/mjcs.vol34no1.1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of data over the Internet today is hosted on outsourced third-party servers which are not trusted. Sometimes data is to be distributed to other organizations or individuals for pre-agreed use. In both of these scenarios data is susceptible to malicious tampering so there is a need for some mechanism to verify database integrity. Moreover, the authentication process should be able to differentiate between valid updates and malicious modifications. In this paper, we present a novel semi-fragile watermarking scheme for relational database integrity verification. Besides detection and localization of database tampering, the proposed scheme allows modifications to the data that need periodic updates, without requiring re-watermarking. Watermark embedding is distortion free, as it is done by adjusting the text case of selected data values resulting in retention of semantic meaning of data. Additionally, group-based embedding ensures the localization of tampering up to group level. We implemented a proof of concept application of our watermarking technique. Theoretical analysis and experiments show that even a single value modification can be detected with very high probability besides detection of attacks like tuple insertion and tuple deletion.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [21] A semi-fragile reversible watermarking method based on qdft and tamper ranking
    Ouyang, Junlin
    Huang, Jingtao
    Wen, Xingzi
    Multimedia Tools and Applications, 2024, 83 (14) : 41555 - 41578
  • [22] Window switching strategy based semi-fragile watermarking for MP3 tamper detection
    Su, Zhaopin
    Chang, Lejie
    Zhang, Guofu
    Jiang, Jianguo
    Yue, Feng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9363 - 9386
  • [23] Window switching strategy based semi-fragile watermarking for MP3 tamper detection
    Zhaopin Su
    Lejie Chang
    Guofu Zhang
    Jianguo Jiang
    Feng Yue
    Multimedia Tools and Applications, 2017, 76 : 9363 - 9386
  • [24] Semi-Fragile Watermarking Scheme for Authentication of JPEG Images
    Lin, Chih-Hung
    Su, Tung-Shih
    Hsieh, Wen-Shyong
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2007, 10 (01): : 57 - 66
  • [25] A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization
    Qi, Xiaojun
    Xin, Xing
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 30 : 312 - 327
  • [26] Semi-fragile watermarking scheme for authentication of JPEG images
    Ho, CK
    Li, CT
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 7 - 11
  • [27] A Semi-Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 317 - 321
  • [28] A semi-fragile watermarking scheme based on neural network
    Hong, F
    Shi, L
    Luo, T
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3536 - 3541
  • [29] Detector Polarization Scheme for Fragile, Semi-fragile and Hybrid Digital Watermarking
    Pacitti, Marcos de Castro
    Finamore, Weiler Alves
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 512 - +
  • [30] A Novel Semi-Fragile Watermarking Algorithm with Tamper Localization and Self-Recovery
    Chao, Yan
    Liu, Shuying
    Liu, Huaming
    PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 186 - 190