FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching

  • Conference paper
  • First Online:
Intelligent Information Processing XII (IIP 2024)

Abstract

The protection of database watermarking techniques based on primary key (PK) is weakened by potential PK attacks and their huge impact. Using virtual primary key (VPK) schemes is an effective solution to enhance the robustness of these techniques. Pérez Gort et al. proposed the HQR-Scheme, which first considers balancing the participation rate of each attribute to improve the ability of scheme to cope with deletion attacks. However, the HQR-Scheme has limited control ability and cannot adapt to changes in relevant information in databases. Facing these challenges, we innovatively propose the FRBBM-Scheme, which allows users to fully analyze data table information and formulate flexible ratio adjustment strategies to enhance their ability to cope with deletion attacks. We verify our proposed scheme through multiple experiments, which show that it has excellent ratio control ability, can generate high-quality VPK sets, and can resist different levels of attribute deletion attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook
EUR 85.59
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 128.39
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sardroudi, H.M., Ibrahim, S.: A new approach for relational database watermarking using image. In: 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 606–610. IEEE (2010)

    Google Scholar 

  2. Wang, W., Liu, C., Wang, Z., Liang, T.: FBIPT: a new robust reversible database watermarking technique based on position tuples. In: 2022 4th International Conference on Data Intelligence and Security (ICDIS), pp. 67–74. IEEE (2022)

    Google Scholar 

  3. Gort, M.L., Pérez, O., Martina, C., Agostino, U., Claudia, F.: Semantic-driven watermarking of relational textual databases. Expert Syst. Appl. 167, 114013 (2021)

    Google Scholar 

  4. Li, W., Li, N., Yan, J., Zhang, Z., Yu, P., Long, G.: Secure and high-quality watermarking algorithms for relational database based on semantic. IEEE Trans. Knowl. Data Eng. (2022)

    Google Scholar 

  5. Siledar, S.B., Tamane, S.: Quadratic difference expansion based reversible watermarking for relational database. J. Integr. Sci. Technol. 9(2), 107–112 (2021)

    Google Scholar 

  6. Hou, R., **an, H.: A graded reversible watermarking scheme for relational data. Mob. Netw. Appl. 26, 1552–1563 (2021)

    Article  Google Scholar 

  7. Zhang, Y., Yang, B.. Niu, X.-M.: Reversible watermarking for relational database authentication (2008)

    Google Scholar 

  8. Hu, D., Zhao, D., Zheng, S.: A new robust approach for reversible database watermarking with distortion control. IEEE Trans. Knowl. Data Eng. 31(6), 1024–1037 (2018)

    Article  Google Scholar 

  9. Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 73–82 (2004)

    Google Scholar 

  10. Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: ICSOFT (2), pp. 229–234 (2009)

    Google Scholar 

  11. Li, M., Zhao, W., Guo, J.: An asymmetric watermarking scheme for relational database. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, pp. 180–184. IEEE (2011)

    Google Scholar 

  12. Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 78–89 (2006)

    Google Scholar 

  13. Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: ICISS, pp. 252–264 (2009)

    Google Scholar 

  14. Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of IEEE International Conference on Advances in Communication, Network, and Computing (CNC), pp. 4–5 (2010)

    Google Scholar 

  15. Hamadou, A., Sun, X., Gao, L., Shah, S.A.: A fragile zero-watermarking technique for authentication of relational databases. Int. J. Digit. Content Technol. Appl. 5(5) (2011)

    Google Scholar 

  16. Camara, L., Li, J., Li, R., **e, W.: Distortion-free watermarking approach for relational database integrity checking. Math. Probl. Eng. 2014 (2014)

    Google Scholar 

  17. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: VLDB’02: Proceedings of the 28th International Conference on Very Large Databases, pp. 155–166 (2002)

    Google Scholar 

  18. Li, Y., Swarup, V., Jajodia, S.: Constructing a virtual primary key for fingerprinting relational data. In: Proceedings of the 3rd ACM Workshop on Digital Rights Management, pp. 133–141 (2003)

    Google Scholar 

  19. Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 222–236. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10772-6_17

    Chapter  Google Scholar 

  20. **ao, X., Sun, X., Chen, M.: Second-LSB-dependent robust watermarking for relational database. In: Third International Symposium on Information Assurance and Security, pp. 292–300. IEEE (2007)

    Google Scholar 

  21. Halder, R., Dasgupta, P., Naskar, S., Sarma, S.S.: An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. In: Proceedings of the 22nd Annual Symposium on Integrated Circuits and System Design: Chip on the Dunes, pp. 1–6 (2009)

    Google Scholar 

  22. Gort, M.L.P., Díaz, E.A., Uribe, C.F.: A highly-reliable virtual primary key scheme for relational database watermarking techniques. In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 55–60 (2017)

    Google Scholar 

  23. Gort, M.L.P., Feregrino-Uribe, C., Cortesi, A., Fernández-Peña, F.: HQR-scheme: a high quality and resilient virtual primary key generation approach for watermarking relational data. Expert Syst. Appl. 138, 112770 (2019)

    Google Scholar 

  24. Cox, I.J., Doërr, G., Furon, T.: Watermarking is not cryptography. In: International Workshop on Digital Watermarking, pp. 1–15 (2006)

    Google Scholar 

  25. Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: survey, classification and comparison. J. Univ. Comput. Sci. 16(21), 3164–3190 (2010)

    Google Scholar 

  26. Iftikhar, S., Kamran, M., Anwar, Z.: RRW–a robust and reversible watermarking technique for relational data. IEEE Trans. Knowl. Data Eng. 27(4), 1132–1145 (2014)

    Article  Google Scholar 

  27. Iftikhar, S., Kamran, M., Anwar, Z.: A survey on reversible watermarking techniques for relational databases. Secur. Commun. Netw. 8(15), 2580–2603 (2015)

    Article  Google Scholar 

  28. Agarwal, N., Singh, A.K., Singh, P.K.: Survey of robust and imperceptible watermarking. Multimedia Tools Appl. 78(7), 8603–8633 (2019)

    Article  Google Scholar 

  29. Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B.: Watermarking Security: Fundamentals, Secure Designs and Attacks. Springer, Heidelberg (2016). https://doi.org/10.1007/978-981-10-0506-0

    Book  Google Scholar 

  30. Rani, S., Koshley, D.K., Halder, R.: A watermarking framework for outsourced and distributed relational databases. In: International Conference on Future Data and Security Engineering, pp. 175–188 (2016)

    Google Scholar 

  31. Khanna, S., Zane, F.: Watermarking maps: hiding information in structured data. In: Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 596–605 (2000)

    Google Scholar 

  32. Agrawal, R., Haas, P.J, Kiernan, J.: A system for watermarking relational databases. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, p. 674 (2003)

    Google Scholar 

  33. Qin, Z., Ying, Y., LE, J., Lup, Y.: Watermark based copyright protection of outsourced database. In: 2006 10th International Database Engineering and Applications Symposium (IDEAS’06), pp. 301–308 (2006)

    Google Scholar 

  34. **ang, Y., Li, J.Y., Pan, J.F.: Database watermarking algorithm based on virtual primary key. J. Comput. Res. Dev. 46, 66–70 (2009)

    Google Scholar 

Download references

Acknowledgment

This work is supported by Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaoguo Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liang, T. et al. (2024). FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching. In: Shi, Z., Torresen, J., Yang, S. (eds) Intelligent Information Processing XII. IIP 2024. IFIP Advances in Information and Communication Technology, vol 703. Springer, Cham. https://doi.org/10.1007/978-3-031-57808-3_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57808-3_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57807-6

  • Online ISBN: 978-3-031-57808-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation