Академический Документы
Профессиональный Документы
Культура Документы
% Loss in Watermark
6
Effect of Tuple Deletion on Watermark 5
4
14 3
12 2
% Distortion in
10
Watermark
1
8
0
6
4
10
14
18
22
26
30
2
6
2
0
% Tuples Modified
10
14
18
22
26
30
2
% of Tuples Deleted
Figure 5. Watermark degrades gracefully
Fig. 4 Watermark Degrades Slowly 5.4 Case Alteration Attacks. Since we are
playing with the case of attributes values so this
5.1 Data Loss Attack (Tuple deletion) kind of attack is only specific to our scheme and
In this kind of attack we study the also it is a legal attack so robustness against it must
distortion of watermark as the input data is be checked. In this experiment we randomly (and
subjected to gradually increasing level of data loss. repeatedly) changed the case of attributes values.
The experiment is performed repeatedly and the The results are averaged our various runs. As
results are then averaged over multiple runs. The shown in the Fig. 6 It is observed that our scheme
average behavior is plotted in Fig. 4. It shows that is very robust against this kind of attack. After
with 35-40% of data Loss Watermark distortion is changing the case of up to 60% tuples, the
12 %. watermark distortion is less than 20%. Fig. 7
shows the comparison of all three kinds of attack.
5.2 Data Modification (Updates) Attack After all experiments we can say that our scheme is
Mallorys (The attacker) priority would be to very robust against modification and change of
destroy watermark, while preserving the data. case attacks.
Given no knowledge of secret key or the original
data, the other available choice may to attempt 6. CONCLUSIONS AND FUTURE WORK
(minor) data modification in attributes values, thus In this paper we introduced a new scheme for
hoping to destroy watermark at some point. Since watermarking relational database for owner
Mallory has no knowledge of original data thus verification and copyright protection. A solution is
current watermarks distortions are also unknown so proposed by:
it is impossible for him to determine real minority
of changes. In this experiment we analyze the Discovering a new embedding channel for
sensitivity of our scheme to randomly occurring watermarking.
changes. The demonstrated behavior is shown in
the Fig. 5. The results show that only 6%
Building an algorithm for watermarking
distortion in watermark is observed with 35-40%
such that it preserves data integrity by
random modifications. So it is more robust against
introducing zero distortion to its semantic
such kind of attacks.
meaning.
5.3 Tuple Sorting Attack.
We thus provided a robust watermarking
technique for relational data. Through experiments,
During embedding, we sort the selected tuples
we also proved that our scheme is robust
before embedding watermark, using primary key
against common database attack as well attacks
hash value, and the same process is repeated during
specific to our scheme only.
20
15
10
0
10 15 20 30 35 40 45 50 55 60
% Tuples Altered
Figure 6
10
Tuple deletion
8
6 Modification
4
Case
2 Alteration
0
2 4 6 8 10 12 14 16 18 20 22 24 26 28 30
(% )Tuple Effected
Figure 7
In future we intend to analyze and improve this Proc. International Conference on Information
scheme against other attacks such as sub set and Technology: Coding and Computing, 2000.
partitioning attacks. Another research direction [6] Schneider B (1996) Applied cryptography,
may be to investigate a method for data 2nd ed. Wiley, New York
authentication using fragile watermarks. [7] I. J. Cox, J. Kilian, T. Leighton and T.
Shamoon, Secure Spread Spectrum Watermarking
for Multimedia", IEEE Trans. on Image
References Processing, 6, 12, 1673-1687, (1997).
[1] R. Agrawal and J. Kiernan. Watermark [8] Knuth D (1981) Semi numerical algorithms.
relational databases. In Proc. of the 28th Inter. In: The art of computer programming, vol
Conf. On Very Large Data Bases, 2002. 2.Addison-Wesley, Reading, MA
[2] R.Sion. Proving ownership over categorical [9] Y. Li, V. Swarup, and S. Jajodia. A robust
data. In Proceedings of ICDE 2004, 2004. watermarking scheme for relational data. In Proc.
[3] I. J. Cox, M. Miller, and J. Bloom. The 13th workshop on information technology and
Watermarking applications and properties. In Proc. engineering, pages 195200, December 2003.
International Conference on Information [10] Ingemar Cox, Matthew Miller, Jeffrey Bloom
Technology: Coding and Computing, 2000. Digital Watermarking Morgan Kaufmann .2002
[4] R.Sion, M. Atallah, and S. Prabhakar. Rights [11] N. Ferguson and B. Schneier, Practical
protection for relational data. In Proceedings of Cryptography. Wiley & Sons, 2003.
ACM SIGMOD 2003, 2003. [12] J. Brassil, L. OGorman, Watermarking
[5 I. J. Cox, M. Miller, and J. Bloom. Document Images with Bounding Box
Watermarking applications and properties, In Expansion, in Anderson [1], pp. 227-235.