SEMI-FRAGILE WATERMARKING SCHEME FOR RELATIONAL DATABASE TAMPER DETECTION

被引:6
|
作者
Shah, Saeed Arif [1 ]
Khan, Imran Ali [2 ]
Kazmi, Syed Zaki Hassan [3 ]
Nasaruddin, Fariza Hanum Binti Md [4 ]
机构
[1] Saudi Elect Univ Riyadh, Riyadh, Saudi Arabia
[2] COMSATS Univ Islamabad, Abbottabad, Pakistan
[3] Univ AJK, Muzaffarabad, Pakistan
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
关键词
Semi-fragile watermark; Relational Database Security; Integrity;
D O I
10.22452/mjcs.vol34no1.1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of data over the Internet today is hosted on outsourced third-party servers which are not trusted. Sometimes data is to be distributed to other organizations or individuals for pre-agreed use. In both of these scenarios data is susceptible to malicious tampering so there is a need for some mechanism to verify database integrity. Moreover, the authentication process should be able to differentiate between valid updates and malicious modifications. In this paper, we present a novel semi-fragile watermarking scheme for relational database integrity verification. Besides detection and localization of database tampering, the proposed scheme allows modifications to the data that need periodic updates, without requiring re-watermarking. Watermark embedding is distortion free, as it is done by adjusting the text case of selected data values resulting in retention of semantic meaning of data. Additionally, group-based embedding ensures the localization of tampering up to group level. We implemented a proof of concept application of our watermarking technique. Theoretical analysis and experiments show that even a single value modification can be detected with very high probability besides detection of attacks like tuple insertion and tuple deletion.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [31] Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain
    Preda, Radu O.
    MEASUREMENT, 2013, 46 (01) : 367 - 373
  • [32] A fragile watermarking scheme for tamper detection and recovery of image
    Zhu, Haifeng
    Chao, Chunhui
    Tang, Chunming
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 475 - 475
  • [33] A Fragile Watermarking Scheme for Tamper Detection of Data Cubes
    Xu, Qiao-li
    Guo, Jie
    Xu, Peng
    Qiu, Wei-dong
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, MACHINERY AND MATERIALS (IIMM 2015), 2015, : 329 - 333
  • [34] Semi-fragile watermarking based content image authentication scheme
    Cruz, Clara
    Reyes, Rogelio
    Nakano, Mariko
    Perez, Hector
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (56): : 160 - 169
  • [35] Semi Fragile Watermarking Technique using IWT and a Two Level Tamper Detection Scheme
    Sivasubramanian, Nandhini
    Konganathan, Gunaseelan
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS 2019), 2019, : 156 - 164
  • [36] A region-adaptive semi-fragile dual watermarking scheme
    Shi, Hui
    Li, Ming-chu
    Guo, Cheng
    Tan, Ru
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 465 - 495
  • [37] An improved semi-fragile digital watermarking scheme for image authentication
    Xie, Rongsheng
    Wu, Keshuo
    Li, Chunguang
    Zhu, Shunzhi
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 262 - +
  • [38] A region-adaptive semi-fragile dual watermarking scheme
    Hui Shi
    Ming-chu Li
    Cheng Guo
    Ru Tan
    Multimedia Tools and Applications, 2016, 75 : 465 - 495
  • [39] A semi-fragile watermarking scheme based on SVD and VQ techniques
    Wu, Hsien-Chu
    Yeh, Chuan-Po
    Tsai, Chwei-Shyong
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 406 - 415
  • [40] Speech authentication by semi-fragile watermarking
    Yan, B
    Lu, ZM
    Sun, SH
    Pan, JS
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 497 - 504