{"title":"A Reversible Database Watermark Scheme for Textual and Numerical Datasets","authors":"Chinchen Chang, T. Nguyen, Chia-Chen Lin","doi":"10.1109/SNPD51163.2021.9704991","DOIUrl":null,"url":null,"abstract":"In this paper, we present our design of a new, blind, reversible, robust, watermarking scheme for relational databases storing textual and numerical data, which is not only guaranteed to meet the above seven requirements and to provide proof of ownership for the legal owner of a relational database but also does not require the existence of the primary key attribute in the relational database. Extensive analysis and our experimental results showed that the proposed scheme achieves strong robustness under a variety of possible attacks, e.g., deletion attacks, modification attacks, addition attacks, and sorting attacks. In addition, in comparison with six existing schemes, the proposed scheme was more secure and robust, as evidenced by our experimental results and robustness analysis.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SNPD51163.2021.9704991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In this paper, we present our design of a new, blind, reversible, robust, watermarking scheme for relational databases storing textual and numerical data, which is not only guaranteed to meet the above seven requirements and to provide proof of ownership for the legal owner of a relational database but also does not require the existence of the primary key attribute in the relational database. Extensive analysis and our experimental results showed that the proposed scheme achieves strong robustness under a variety of possible attacks, e.g., deletion attacks, modification attacks, addition attacks, and sorting attacks. In addition, in comparison with six existing schemes, the proposed scheme was more secure and robust, as evidenced by our experimental results and robustness analysis.