DOI QR코드

DOI QR Code

Reversible Watermarking For Relational Databases using DE (Difference Expansion) Algorithm

DE 알고리즘을 사용한 관계형 데이터베이스를 위한 가역 워터마킹

  • 김천식 (안양대학교 디지털미디어학과)
  • Received : 2015.04.23
  • Accepted : 2015.06.12
  • Published : 2015.06.30

Abstract

Generally, watermarking can be used copyright for contents such as audios, videos, images, and texts. With the development of Internet, many malicious attackers illegally copy relational databases synchronized applications Therefore, it is needed for the protection of databases copyright, because databases involve various sensitive information such as personal information, information industry, and secret national intelligence. Thus, the protection of relational databases is a major research field in the databases research topics. In this paper, we will review previous researches related the protection of relational databases and propose new method for relational data. Especially, we propose watermarking scheme for databases using reversible method in this paper. As an experimental result, the proposed scheme is very strong to malicious attacks. In addition, we proved our proposed scheme is to apply real application.

일반적으로 워터마킹은 오디오, 비디오, 이미지, 그리고 텍스트 등의 콘텐트의 저작권을 위해서 사용되고 있다. 인터넷의 발달로 어플리케이션과 연동되는 관계형 데이터베이스는 악의적인 공격자들에 의한 데이터베이스 복제, 유출등이 빈번히 발생하고 있다. 따라서 데이터베이스의 저작권보호 역시 필요성이 증대되고 있다. 또한 데이터베이스에는 민감한 개인정보에서 산업기밀 정보까지 다양한 정보고 포함되어 있다. 따라서 관계형 데이터베이스의 보호는 데이터베이스 분야에서 매우 중요한 연구 영역이 되고 있다. 본 논문에서는 관계형 데이터를 보호할 수 있는 다양한 방안의 기존의 연구를 살펴보고, 이들 데이터를 보호할 수 있는 새로운 방법을 제안하고자 한다. 특히 본 논문에서는 가역적인 방법으로 데이터베이스에 워터마크를 삽입하는 방법을 제안하고자 한다. 실험결과 제안한 기술은 악의적인 공격에 강함을 보였다. 또한, 제안한 방법이 실제 어플리케이션에 적용 가능함을 보였다.

Keywords

References

  1. Cheonshik Kim, "Reversible Data Hiding based on QR Code for Binary Image," The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), vol.14, no. 6, pp.281-288, 2014. https://doi.org/10.7236/JIIBC.2014.14.6.281
  2. Cheonshik Kim, "Data Hiding Based on BTC using EMD," The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), vol.14, no.2, pp.11-16, 2014. https://doi.org/10.7236/JIIBC.2014.14.2.11
  3. B.H. Lee, "Technique for production and encoding of New dot-type Print Watermark Pattern," Journal of the Korea Academia Industrial cooperation Society, vol.10, no.5, pp.979-984, 2009. https://doi.org/10.5762/KAIS.2009.10.5.979
  4. Cheonshik Kim, Ching-Nung Yang, "Watermark with DSA signature using predictive coding," Multimedia Tools and Applications, DOI:10.1007/s11042-013-1667-6, pp.1-15, 2013.
  5. Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Xinpeng Zhang, "Secure and Trust Computing, Data Management and Applications," Communications in Computer and Information Science Volume 186, pp.130-138, 2011. 2011. https://doi.org/10.1007/978-3-642-22339-6_16
  6. Cheonshik Kim, "Data Hiding Based on Compressed Dithering Images," Advances in Intelligent Information and Database Systems Studies in Computational Intelligence Volume 283, pp 89-98, 2010. https://doi.org/10.1007/978-3-642-12090-9_8
  7. R. Agrawal and J. Kiernan. Watermark relational databases. In Proc. of the 28th International. Conference. On Very Large Data Bases, 2002.
  8. R.Sion, M. Atallah, and S. Prabhakar. Rights protection for relational data. In Proceedings of ACM SIGMOD 2003, 2003.
  9. Y. Li, H. Guo, S. Jajodia, Tamper detection and localization for categorical data using fragile Watermarks in: 4th ACM Workshop on Digital Rights Management, CCS04, October 2004.
  10. Mohammad Shehab, Elisa Bertino, Arif Ghafoor Watermarking Relational Data using Optimization Based Techniques, IEEE Transactions on Knowledge and Data Engineering, vol.20, no.1, pp.116-129 https://doi.org/10.1109/TKDE.2007.190668
  11. Ashraf Odeh, Ali Al-Haj, "Watermarking Relational Database Systems," IEEE, pp. 270-274, 2008.
  12. Jun Tian, Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, no.8, pp.890-896, 2003. https://doi.org/10.1109/TCSVT.2003.815962