Presentation is loading. Please wait.

Presentation is loading. Please wait.

Tamper Detection and Localization for Categorical Data Using Fragile Watermarks.

Similar presentations


Presentation on theme: "Tamper Detection and Localization for Categorical Data Using Fragile Watermarks."— Presentation transcript:

1 Tamper Detection and Localization for Categorical Data Using Fragile Watermarks

2 What is Digital watermarking? A digital watermark is technique of embedding an invisible signal directly into the data, thus providing a promising way to protect digital data from illicit copying and manipulation. A digital watermark is technique of embedding an invisible signal directly into the data, thus providing a promising way to protect digital data from illicit copying and manipulation.

3 Why is it required? It is used to detect data tampering and illicit copying of data. It is used to detect data tampering and illicit copying of data. It complements cryptography and steganography. It complements cryptography and steganography. Cryptography- once the encrypted data is decrypted, the data is clear and no longer under protection. Cryptography- once the encrypted data is decrypted, the data is clear and no longer under protection. Steganography :The problem is that it cannot extract the hidden data if the stego data undergo some distortions. Steganography :The problem is that it cannot extract the hidden data if the stego data undergo some distortions.

4 Applications Copy protection Copy protection Authentication Authentication Tamper detection Tamper detection

5 Classifications of Digital Watermarks Fragile watermarks for tamper detection Fragile watermarks for tamper detection Robust watermarks for ownership verification Robust watermarks for ownership verification

6 Difference between multimedia and Database Watermarking Multimedia data are highly correlated, there is a lot of redundant information present in multimedia data. Multimedia data are highly correlated, there is a lot of redundant information present in multimedia data. Database relations contain large number of independent tuples and all tuples are equally important. Database relations contain large number of independent tuples and all tuples are equally important.

7 Challenges Embedding watermarks in database relations is a challenging problem because there is little redundancy present in a database relation. Embedding watermarks in database relations is a challenging problem because there is little redundancy present in a database relation.

8 Watermark Embedding Algorithm Algorithm 1 Watermark embedding 1: For all k ∈ [1, g] qk = 0 2: for i = 1 to ω do 3: hi = HASH(K, ri.A1, ri.A2, · · ·, ri.Aγ) // row hash 4: hpi = HASH(K, ri.P ) // primary key hash 5: k = hpi mod g 6: ri → Gk 7: qk ++ 8: end for 9: for k = 1 to g do 10: watermark embedding in Gk // See Algorithm 2 11: end for

9 Watermark Embedding Algorithm(cont…) 1. 1. Algorithm 2 Watermark embedding in Gk 2. 2. sort tuples in Gk in ascendant order according to their primary 3. 3. key hash // Virtual operation 4. 4. H = HASH(K, h1, h2, · · ·, hqk) 5. 5. W = extractBits(H, qk/2) // See line 9 - 16 6. 6. for i = 1, i < qk, i = i + 2 do 7. 7. if (W[i/2] == 1 and hi hi+1) then 8. 8. switch the position of ri and ri+1 9. 9. end if 10. 10. end for 11. 11. extractBits(H, l) { 10: if length(H) ≥ l then 12. 12. W = concatenation of first l selected bits from H 13. 13. else 14. 14. m = l - length(H) 15. 15. W = concatenation of H and extractBits(H,m) 16. 16. end if 17. 17. return W }

10 Example Figure 1: A table before and after watermark embedding WM={0,1}

11 Watermark Detection Algorithm 3 Watermark detection 1: For all k ∈ [1, g] qk = 0 2: for i = 1 to ω do 3: hi = HASH(K, ri.A1, ri.A2, · · ·, ri.Aγ) // tuple hash 4: hp i = HASH(K, ri.P ) // primary key hash 5: k = hp i mod g 6: ri → Gk 7: qk ++ 8: end for 9: for k = 1 to g do 10: watermark verification in Gk // See Algorithm 4 11: end for

12 Watermark Detection Algorithm 4 Watermark verification in Gk 1: sort tuples in Gk in ascendant order according to their primary key hash // Virtual operation 2: H = HASH(K, h1, h2, · · ·, hqk) // hi(i = 1, · · · qk) is the tuple hash of ith tuple after ordering 3: W = extractBits(H, qk/2) //See line 9-16 in Algorithm 2 4: for i = 1, i < qk, i = i + 2 do 5: if hi ≤ hi+1 then 6: W[i/2] = 0 7: else 8: W[i/2] = 1 9: end if 10: end for 11: ifW == W then 12: V = TRUE 13: else 14: V = FALSE 15: end if


Download ppt "Tamper Detection and Localization for Categorical Data Using Fragile Watermarks."

Similar presentations


Ads by Google