Fingerprinting relational databases: schemes and specialties
- 11 April 2005
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Dependable and Secure Computing
- Vol. 2 (1) , 34-45
- https://doi.org/10.1109/tdsc.2005.12
Abstract
In this paper, we present a technique for fingerprinting relational data by extending Agrawal et al.'s watermarking scheme. The primary new capability provided by our scheme is that, under reasonable assumptions, it can embed and detect arbitrary bit-string marks in relations. This capability, which is not provided by prior techniques, permits our scheme to be used as a fingerprinting scheme. We then present quantitative models of the robustness properties of our scheme. These models demonstrate that fingerprints embedded by our scheme are detectable and robust against a wide variety of attacks including collusion attacks.Keywords
This publication has 12 references indexed in Scilit:
- Proving ownership over categorical dataPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Print signatures for document authenticationPublished by Association for Computing Machinery (ACM) ,2003
- Watermarking relational data: framework, algorithms and analysisThe VLDB Journal, 2003
- Query-preserving watermarking of relational databases and XML documentsPublished by Association for Computing Machinery (ACM) ,2003
- Electronic marking and identification techniques to discourage document copyingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Error- and Collusion-Secure Fingerprinting for Digital DataPublished by Springer Nature ,2000
- Collusion-secure fingerprinting for digital dataIEEE Transactions on Information Theory, 1998
- Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implicationsIEEE Journal on Selected Areas in Communications, 1998
- Secure spread spectrum watermarking for multimediaIEEE Transactions on Image Processing, 1997
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970