Watermarking Relational Databases CSC 574/474 Information System Security.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
1 Watermarking Relational Databases Acknowledgement: Mohamed Shehab from Purdue Univ.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Watermarking Relational Databases Rakesh Agrawal and Jerry Kiernan.
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Secure Cloud Database with Sense of Security. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment.
Copyright 2000, Odyssey Research Associates, Inc. SL Semantic Data Integrity DARPA Program Review Cornell Business & Technology Park 33 Thornwood.
Hashing and Hash-Based Index. Selection Queries Yes! Hashing  static hashing  dynamic hashing B+-tree is perfect, but.... to answer a selection query.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Hashing Sections 10.2 – 10.3 CS 302 Dr. George Bebis.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Crypto Final Presentation B 林敬倫 B 李佳蓉 B 王姵瑾 B 周振平.
Privacy-preserving rule mining. Outline  A brief introduction to association rule mining  Privacy preserving rule mining Single party  Perturbation.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
1.1 CS220 Database Systems Indexing: Hashing Slides courtesy G. Kollios Boston University via UC Berkeley.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Security in Outsourced Association Rule Mining. Agenda  Introduction  Approximate randomized technique  Encryption  Summary and future work.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
A Partial Survey of the Perfect Digital Watermark Problem.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Introduction to Steganography
Watermarking Relational Databases
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Cryptographic Hash Function
DONE BY S.MURALIRAJAN M.NIRMAL
Parag Agarwal Digital Watermarking Parag Agarwal
Information Theoretical Analysis of Digital Watermarking
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Watermarking Relational Databases CSC 574/474 Information System Security

Cryptography Vs. Steganography Cryptography Encryption: translate information into an unintelligible form Decryption: decode to retrieve information Attackers cannot recover the information Stenography Hide information in a seemingly common message “Security through obscurity”: Attackers don’t know where to find the information

Steganography Examples Greek messengers Message tattooed into shaved head Invisible ink in a cover letter Bits hidden in pictures Sounds familiar? Hide one image into another Least significant bits Other forms?

Example Taken from

Example Courtesy:

Example Courtesy:

Example Courtesy:

Illustration of A Steganographic System

Digital Watermarks Insert marks into original data Use to demonstrate ownership: images, video, audio, software… Other usage? Should not significantly affect quality of original data Should not be able to be destroyed easily Deter instead of prevent illegal copying

Watermarking Databases Why? Data in database are intellectual properties Is it possible? Some numerical data do not need to be precise to be useful Example? Some data are imprecise in nature Example?

What Makes Watermarking Databases Different Dealing with multiple objects (tuples) instead of one Tuple order does not matter After dropping part of the database, the remaining part is still valuable

Desirable Features Detectability Allow undetectable marks Robustness Benign updates, malicious attacks Incremental updatability Do not need to re-compute watermarks during updates

Desirable Features Imperceptibility Preserve usefulness of the database Blind system Do not need the original database for detection Key-based system Watermarking scheme is open Only the private key matters

Attacks Benign updates Malicious attacks Bit attack Rounding attack Subset attack Mix and match attack Additive attack Invertibility attack

Basic Setup n tuples, v numerical attributes, P: primary key e least significant bits 1/r: fraction of tuples marked w: number of marked tuples (n/r) a: confidence parameter t: min number of correct mars for detection H: a one way hash function, K: private key, F: a MAC function F(m) = H(K || H(K||m))

Watermark Insertion Algo. PA1A2… Av Ai… A2A1P (1) if (F(P) mod r = 0) then should mark (2) choose to mark Ai where i = F(P) mod v bjbj bkbk b k-1 …b e-1 ……b1b1 (3) choose jth bit to mark where j = F(P) mod e b j = 0 if H(K || P) is even b i =1 otherwise

Watermark Detection Algo. 1. Determine whether a tuple is marked 2. Determine which attribute is marked 1. totalcount++ 3. Determine which bit is marked 4. Check whether the jth bit is the same as the expected mark 1. Matchout++ 5. Check whether a threshold t is met How to determine threshold t?

Operations on Watermarked Databases Query ? Updates? Insertion Deletion Modification

How to Determine Threshold t 1. The probability that b j is not changed by watermarking is __ 2. Out of w checks, the probability that t matches by chance is __ 3. What is the probability the detection algorithm makes a wrong decision? b j = 0 if H(K || P) is even b i =1 otherwise

How to Determine Threshold t C(w, t) * 0.5^w 3. (C(w, t) + C(w,t+1) + … + C(w,w)) * 0.5^w (1) Let a be the tolerable error rate, we have to choose the minimum t such that (1) < a

Robustness Against Attacks Bit-Flipping attack Choose s tuples from n tuples, flip all the e least significant bits, the chance to erase the watermark is Sum i=w-t+1,…,w C(w, i)C(n-w, s-i)/C(n,s)

Mix-and-Match Attack Mallory takes k fraction of the database Mix it with his own relation Create a new relation of size n For Alice to detect the watermark K*n/r + 0.5*(1-k)*n/r >= t

Additive Attack Mallory inserts his own watermark in Alice’s database How to determine who is the original owner? If two watermarking scheme marks the same bit of the same tuple Then?

Invertibility Attack Mallory finds a key that yields a satisfactory watermark on the database Affected by a The larger a is, is it easier or harder to find such a key?

Design Tradeoffs ↓ a↓ false hits↑ missed watermark ↓ r↑ robustness↑ data errors ↑ v↑ robustness ↑ e↑ robustness↑ data errors

Comments of the Paper Simple yet effective idea Thorough analysis Coming up with a good approach is hard Analyze, validate and make the approach complete is even harder No data on key length and hash function. What are their impact on performance?

Discussion Possible attacks Frequent updates of the same tuple? Side channels Water marking a tuple requires extra time Basic assumption The owner’s database is secured Regulations or law regarding database copyright?

Discussion How to handle non-numerical data Every change is significant But we have to make changes Minimize number of changes Encode message in cross-tuple properties E.g., attribute frequency histogram

Discussion Watermarking semi-structured data, e.g., XML? Attributes or element values can be similarly watermarked Define key is an issue The structure of the semi-structured data may also need to be watermarked

Further Reading Watermarking Relational Databases by Rakesh Agrawal and Jerry Kiernan, International Conference on Very Large Data Bases (VLDB), Rights Assessment for Discrete Digital Data, Ph.D thesis, by Radu Sion, Purdue University.