Embedding watermarks in multiple tables in numeric dataset by bit pattern generation sub-watermarks

Sidra Sultana
{"title":"Embedding watermarks in multiple tables in numeric dataset by bit pattern generation sub-watermarks","authors":"Sidra Sultana","doi":"10.1109/NCIA.2013.6725329","DOIUrl":null,"url":null,"abstract":"A novel and technical approach for watermarking tables of a numeric dataset is proposed. Watermark insertion and detection is done by K Map Minimizer. The crucial aspect of the proposed technique is the permuted bit pattern generation. The bit pattern is generated by first selecting unique rows and columns and solving the four attributes at the selected position through the K Map Minimizer to constitute a pattern. To make the bit pattern more secure permutation is applied before, where the size of the bit pattern is adjusted as per requirement. This unique permuted bit pattern is called the watermarked permuted bit pattern. Each bit of watermarked permuted bit pattern is added /subtracted while sub watermarking the selected attribute. Four secret keys and one permutation key are used which adds to the integrity of the technique. Secret keys are always used in pair so knowledge of a single key to an attacker, is of no use rather access to k-1 keys, where k is the number of keys, is also of not much worth as to generate a watermarked permuted bit pattern all four keys are requirement. Watermark detection routine is blind as it neither requires the original dataset nor the watermarked one. Watermarks are equally distributed in a very large dataset as six digits number is selected through K Map Minimizer, so the watermark can be detected even in a small subset of a watermarked relation as long as the sample contains some of the marks. Proposed technique is robust against various malicious attacks and updates to the data. Dealing with multiple tables adds to the practicality of the data.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 2nd National Conference on Information Assurance (NCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIA.2013.6725329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A novel and technical approach for watermarking tables of a numeric dataset is proposed. Watermark insertion and detection is done by K Map Minimizer. The crucial aspect of the proposed technique is the permuted bit pattern generation. The bit pattern is generated by first selecting unique rows and columns and solving the four attributes at the selected position through the K Map Minimizer to constitute a pattern. To make the bit pattern more secure permutation is applied before, where the size of the bit pattern is adjusted as per requirement. This unique permuted bit pattern is called the watermarked permuted bit pattern. Each bit of watermarked permuted bit pattern is added /subtracted while sub watermarking the selected attribute. Four secret keys and one permutation key are used which adds to the integrity of the technique. Secret keys are always used in pair so knowledge of a single key to an attacker, is of no use rather access to k-1 keys, where k is the number of keys, is also of not much worth as to generate a watermarked permuted bit pattern all four keys are requirement. Watermark detection routine is blind as it neither requires the original dataset nor the watermarked one. Watermarks are equally distributed in a very large dataset as six digits number is selected through K Map Minimizer, so the watermark can be detected even in a small subset of a watermarked relation as long as the sample contains some of the marks. Proposed technique is robust against various malicious attacks and updates to the data. Dealing with multiple tables adds to the practicality of the data.
采用位模式生成子水印的方法在数字数据集中的多个表中嵌入水印
提出了一种新的数字数据集表水印技术。水印的插入和检测由K Map Minimizer完成。提出的技术的关键方面是置换位模式的生成。首先选择唯一的行和列,通过K Map Minimizer求解所选位置的四个属性,从而生成位模式。为了使位模式更安全,以前采用了置换,根据需要调整位模式的大小。这种独特的排列位模式被称为水印排列位模式。在对所选属性进行子水印的同时,对带水印的排列位模式中的每一位进行加/减。使用了四个秘密密钥和一个排列密钥,增加了技术的完整性。密钥总是成对使用的,所以对于攻击者来说,知道一个密钥是没有用的,而访问k-1个密钥是没有用的,其中k是密钥的数量,对于生成一个带水印的排列位模式也没有多大价值,所有四个密钥都是必需的。水印检测方法既不需要原始数据集,也不需要经过水印处理的数据集,因此具有盲目性。在一个非常大的数据集中,通过K Map Minimizer选择6位数字,水印是均匀分布的,因此,只要样本中包含一些水印,即使在一个水印关系的小子集中也可以检测到水印。该技术对各种恶意攻击和数据更新具有较强的鲁棒性。处理多个表增加了数据的实用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信