A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

1 Watermarking Relational Databases Acknowledgement: Mohamed Shehab from Purdue Univ.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Fifth International Conference on Information
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Watermarking For Image Authentication Presented by San-Hao Wang.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Watermarking Relational Databases CSC 574/474 Information System Security.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Teacher : Hsien-Chu Wu Student : Hsiao-yun Tseng, Chen-ying Lai Speaker : Hsiao-yun Tseng Date : May 10, 2006 Database Temper Detection Techniques Based.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Commutative Encryption and Watermarking in Video Compression 交換式加密及浮水印法應用在視頻壓縮 IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
1 Commutative Encryption and Watermarking in Video Compression Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Watermarking Relational Databases
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Welcome
Der-Chyuan Lou and Jiang-Lung Liu,
DONE BY S.MURALIRAJAN M.NIRMAL
Dept. of Elec. & Comp. Engineering
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
High Capacity Data Hiding for Grayscale Images
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Digital Watermarking for Image Authentication with Localization
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Hidden Digital Watermarks in Images
Authors: J.J. Murillo-Fuentes
Source: Circuits and Systems for Video Technology,
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21

Outline Introduction Relational Database watermarking schemes Discussion 2012/9/211

Introduction Image –Pixel(0-255) Database –Textual data –Numerical data 2012/9/212 Pixel blocks Coefficient blocks Compression code Primary key Attribute1Attribute2Attribute3Attribute4 Tuple Tuple Tuple … Tuple n

Schemes Relational Databases Watermarking for textual and numerical data –Zhang et al., MEC2011, China, DCT Transform based Relational Database Robust Watermarking Algorithm –Song et al., ISDPE2010, USA, /9/213

4 Relational Databases Watermarking for textual and numerical data 2011 International Conference on Mechatronic Science, Electric Engineering and Computer Author: Lizhong Zhang, Wei Gao, Nan Jiang, Liqiu Zhang and Yan Zhang

Notations and Parameters Parameter Description N N is a natural number e Number of groups in the relation Key User’s secret key r i.p Primary key of the ith tuple in relation or in group HiHi Tuple Hash of the ith tuple r i.mod The remainder of the ith tuple r i.A j the jth attribute value of the ith tuple in the relation Lt Watermark tag location of textual attributes Ln Watermark tag location of numerical attributes Number of candidate bits to be modified 2012/9/215

Watermark embedding algorithm Tuples selection. 2012/9/216 Condition: Primary key Attribute1Attribute2Attribute3Attribute4 Tuple 1 Tuple 2 Tuple 3 … Tuple n 40,000

Watermark embedding algorithm Watermark insertion 2012/9/217 Primary key Attribute1Attribute2Attribute3Attribute4 Tuple Textual attribute: Numerical attribute: If Watermark bit =1 then Insert #13(Carriage return character) at location Lt i,j Else Insert #10(Linefeed character) at location Lt i,j 155 mod 5 = mod 4 = 3

Watermark extracting algorithm Tuples selection Watermark extraction 2012/9/218 Primary key Attribute1Attribute2Attribute3Attribute4 Tuple P Textual attribute: Numerical attribute: Watermark bit = Ln i,j digits mod 2 If #13 at location Lt i,j then Watermark bit =1 If #10 at location Lt i,j then Watermark bit =0

Experimental results Subset Addition Attack –Watermark detected ratio 99.5% Subset Alteration Attack –Watermark detected ratio 99.5% even if 70% of the tuples of the database are modified Subset Deletion Attack –Watermark detected ratio 95% even if 70% of the tuples are deleted. 2012/9/219

10 DCT Transform based Relational Database Robust Watermarking Algorithm 2010 Second International Symposium on Data, Privacy, and E-Commerce Author: Song Yige, Liu Weidong, Song Jiaxing and Wong Ming Sze Angela

Notations and Parameters ParameterDescription the primary key of the ith tuple in the relation or in a group user’s secret key tuple hash of the ith tuple tuple group number of the ith tuple gnumber of groups in the relation after divide snumber of attributes allowed tag in the relation watermark tag attribute location of the ith tuple CThe medium frequency coefficient in DCT 2012/9/2111

Watermark embedding algorithm Tuples selection 2012/9/2112 Primary key Attribute1Attribute2Attribute3Attribute4 Tuple 1 Tuple 2 Tuple 3 … Tuple n 581,012

Watermark embedding algorithm DCT transform - two-dimensional DCT Watermark insertion –Select medium frequency coefficient as C Inverse DCT transform Update database 2012/9/2113 Extracting phase: if C > 0 then Watermark bit = 0 else if C < 0 then Watermark bit = 1

Experimental results Subset Addition Attack 2012/9/2114 Original watermark and extracted watermark after tuple deletion attack

Experimental results Subset Alteration Attack 2012/9/2115 Original watermark and extracted watermark after tuple deletion attack

Experimental results Subset Deletion Attack 2012/9/2116 Original watermark and extracted watermark after tuple deletion attack

Discussion Practicality Affect data analysis result Affect data mining result Effect of computing time for big data 2012/9/2117

Introduction-reason Digital Media (Video, Audio, Images, Text) are easily copied and easily distributed via the web. Database outsourcing is a common practice: –Stock market data –Consumer Behavior data (Walmart) –Power Consumption data –Weather data Effective means for proof of authorship. –Signature and data are the same object. Effective means of tamper proofing. –Integrity information is embedded in the data. 2012/9/2118