Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Elliptic Curve Cryptography (ECC) based Relational Database Watermarking

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Manoj Kumar, O. P. Verma, Archana Saxena
10.5120/ijca2016912159

Manoj Kumar, O P Verma and Archana Saxena. Elliptic Curve Cryptography (ECC) based Relational Database Watermarking. International Journal of Computer Applications 154(6):20-28, November 2016. BibTeX

@article{10.5120/ijca2016912159,
	author = {Manoj Kumar and O. P. Verma and Archana Saxena},
	title = {Elliptic Curve Cryptography (ECC) based Relational Database Watermarking},
	journal = {International Journal of Computer Applications},
	issue_date = {November 2016},
	volume = {154},
	number = {6},
	month = {Nov},
	year = {2016},
	issn = {0975-8887},
	pages = {20-28},
	numpages = {9},
	url = {http://www.ijcaonline.org/archives/volume154/number6/26496-2016912159},
	doi = {10.5120/ijca2016912159},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Database Watermarking methods are used for copyright protection of relational database. Many techniques have been developed for watermarking multimedia digital assets like audio, video, text, images etc. But these methods are usually not applicable with numerical database, because to insert a watermark into a data, small error is created in data, called mark. An error in relational data is usually not acceptable, so a different approach need to be develop to create a mark into the numerical database. Many different approaches have been discussed in previous researches for relational database watermarking. In this paper a new approach has been introduced for relational database watermarking using Elliptic Curve Cryptography (ECC). It has been proofed that ECC provides more security with smaller key size in comparison with other encryption techniques. Proposed approach gives better results in subset deletion and selection attacks which have been compared with other methods.

References

  1. VahabPournaghshband, “A New Watermarking Approach for Relational Data”, ACM-SE ‘08, March 28–29, 2008, Auburn, AL, USA. Copyright 2008 ACM ISBN.
  2. Agrawal, R. and Kiernan, J., “Watermarking relational databases”, in Proceeding of the 28th International conference on Very Large Databases, p. 155-166, 2002.
  3. Agrawal, R., Haas, P.J. and Kiernan, J., “Watermarking relational data: framework, algorithms and analysis”, VLDB Journal, vol.3, 2003.
  4. Zhi-hao Zhang, Xiao-mingJin, Jian-min wang and De-yi Li, “Watermarking relational database using image”, in Proceedings of International Conference on Machine Learning and Cybernetics, vol. 3, 2006, pp. 1739-1744.
  5. Jianhua Sun, Zaihui Cao and Zhongyan Hu, “Multiple Watermarking Relational Databases Using Image”, in IEEE International Conference on MultiMedia and Information Technology, 2008, pp. 373-376.
  6. Chaokun Wang, Jianmin Wang, Ming Zhou, Guisheng Chen and Deyi Li, “Atbam: An Arnold transform based method on watermarking relational data”, in Proceedings of the 2008International Conference on Multimedia and Ubiquitous Engineering, 2008, pp. 263-270.
  7. Zhongyan Hu, Zaihui Cao and Jianhua Sun, “An Image Based Algorithm for Watermarking Relational Databases”, in Proceedings of the 2009International Conference on Measuring Technology and Mechatronics Automation, 2009, pp. 425-428.
  8. TheodorosTzouramanis, “A Robust Watermarking Scheme for Relational Databases”, in IEEE 6thInternational Conference on Internet Technology and Secured Transactions, December 2011.
  9. UdaiPratap Rao, Dhiren R. Patel and Punitkumar M. Vikani, “Relational Database Watermarking for Ownership Protection”, in Elsevier 2nd International Conference on Communication, Computing & Security [ICCCS-2012], 2012.
  10. Yu Fu, Tianyu Ye, ZhiguoQu, XinxinNiu and Yixian Yang, “A Novel Relational Database Watermarking Algorithm for Joint Ownership”, in IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008.
  11. Damien Hanyurwimfura, Yuling Liu and Zhijie Liu, “Text Format Based Relational Database Watermarking for Non-numeric Data”, in IEEE International Conference On Computer Design And Appliations (ICCDA 2010), 2010.
  12. Kaiyin Huang, Min Yue ,Pengfei Chen, Yanshan He and Xiaoyun Chen, “A Cluster-Based Watermarking Technique for Relational Database”, in IEEE First International Workshop on Database Technology and Applications, 2009.
  13. VidhiKhanduja, ShampaChakraverty, Om Prakash Verma, RakshitaTandon and SahilGoel, “A Robust Multiple Watermarking Technique for Information Recovery”, IEEE International Advance Computing Conference (IACC), 2014.
  14. Hongbin Kong, Zhengquan Zeng, Lijun Yan, Jicheng Yang, Shaowen Yao and Nuoya Sheng, “Combine Elliptic Curve Cryptography with Digital Watermark for OWL Based Ontology Encryption”, in International Conference on Computational Intelligence and Security, 2009.
  15. Javier Franco-Contreras, GouenouCoatrieux, FrédericCuppens, Nora Cuppens-Boulahia, and Christian Roux, “Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation”, in IEEE Transactions on Information Forensics and Security, Vol. 9, No. 3, MARCH 2014.
  16. Wang Yanmin and GaoYuxi, “The Digital Watermarking Algorithm of the Relational Database Based on the Effective Bits of Numerical Field”, in IEEE Explore, World Automation Congress (WAC), June 2012.
  17. Lizhong Zhang, Wei Gao, Nan Jiang, Liqiu Zhang and Yan Zhang, “Relational Databases Watermarking for textual and numerical data”, in IEEE International Conference on Mechatronic Science, Electric Engineering and Computer, Jilin, China, August 2011.

Keywords

Relational Database Watermarking, Elliptic Curve Cryptosystem, Watermark Extraction, Watermark Insertion, Watermarking.

Learn about the IJCA article correction policy and process
Dealing with any form of infringement.
‘Peer Review – A Critical Inquiry’ by David Shatz
Directly place requests for print/ hard copies of IJCA via Google Docs