Authentication of Ownership Rights against Malicious Attack on non-Numeric Data Stores

IJCSEC Front Page
Information technology is playing an increasing role in the use of relational databases. These databases are used effectively in collaborative environments for information extraction. These databases are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is used to enforce ownership rights over relational data and for providing a means for tackling data tampering. When ownership rights are enforced using watermarking, the underlying data undergoes certain modifications; as a result of which, the data quality gets compromised. Reversible watermarking is employed to ensure data quality along-with data recovery. However, such techniques protect against malicious attacks and provide any mechanism to selectively watermark a particular attribute by taking into account its role in knowledge discovery. However, such techniques do not support non-numeric and shared databases. Robust and Reversible Watermarking (RRW) ensure authentication against malicious attack on non-numeric data stores.

Keywords:Ownership,Authentication,Malicious Attack,non-Numeric,Data Stores


  1. Y.-C. Liu, Y.-T. Ma, H.-S. Zhang, D.-Y. Li, and G.-S. Chen, “A method for trust management in cloud computing: Data coloring by cloud watermarking,” Int. J. Autom. Comput., vol. 8, no. 3, pp. 280–285, 2011.
  2. (2013, Apr. 11). Identity theft watch. [Online]. Available: http:// 04/identity-theft-watch-customerpasswords-stolen-from-walmart-vudu-video-service/
  3. (2013, Feb. 26). Securing outsourced consumer data. [Online]. Available:
  4. (2012, Jun. 3). As patients’ records go digital, theft and hacking problems grow. [Online]. Available: http://kaiserhealthnews. org/Stories/2012/June/04/ electronic-health-records-theft-hacking.aspx
  5. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
  6. I. Cox, M. Miller, J. Bloom, and M. Miller, Digital Watermarking. Burlington, MA, USA: Morgan Kaufmann, 2001.
  7. P. W. Wong, “A public key watermark for image verification and authentication,” in Proc. IEEE Int. Conf. Image Process., 1998, vol. 1, pp. 455–459.
  8. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Process., vol. 10, no. 10, pp. 1593– 1601, Oct. 2001.
  9. F. A. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58–64, Sep. 2000.
  10. J. T. Brassil, S. Low, and N. F. Maxemchuk, “Copyright protection for the electronic distribution of text documents,” Proc. IEEE, vol. 87, no. 7, pp. 1181–1196, Jul. 1999.
  11. R. Agrawal and J. Kiernan, “Watermarking relational databases,” in Proc. 28th Int. Conf. Very Large Data Bases, 2002, pp. 155–166.
  12. R. Sion, M. Atallah, and S. Prabhakar, “Rights protection for categorical data,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 7, pp. 912– 926, Jul. 2005.
  13. S. Subramanya and B. K. Yi, “Digital rights management,” IEEE Potentials, vol. 25, no. 2, pp. 31–34, Mar.-Apr. 2006.
  14. P. E. Gill, W. Murray, and M. A. Saunders, “Snopt: An sqp algorithm for large-scale constrained optimization,” SIAM Rev., vol. 47, no. 1, pp. 99–131, 2005.
  15. K. E. Parsopoulos and M. N. Vrahatis, “Particle swarm optimization method for constrained optimization problems,” Intel. Technol.–Theory Appl. New Trends Intell. Technol., vol. 76, pp. 214– 220, 2002.
  16. R. Hassan, B. Cohanim, O. De Weck, and G. Venter, “A comparison of particle swarm optimization and the genetic algorithm,” in Proc. 46th AIAA/ASME/ASCE/AHS/ASC Struct., Struct. Dyn. Mater. Conf., 2005, pp. 1–13.
  17. Y.-R. Wang, W.-H. Lin, and L. Yang, “An intelligent watermarking method based on particle swarm optimization,” Expert Syst. Appl., vol. 38, no. 7, pp. 8024–8029, 2011.
  18. M. Kamran and M. Farooq, “An information-preserving watermarking scheme for right protection of EMR systems,” IEEE Trans. Knowl. Data Eng., vol. 24, no. 11, pp. 1950–1962, Nov. 2012.
  19. T. M. Cover, J. A. Thomas, and J. Kieffer, “Elements of information theory,” SIAM Rev., vol. 36, no. 3, pp. 509–510, 1994.
  20. T. M. Cover and J. A. Thomas, Elements of Information Theory. New York, NY, USA: Wiley-Interscience, 2012.
  21. Y. Zhang, B. Yang, and X.-M. Niu, “Reversible watermarking for relational database authentication,” J. Comput., vol. 17, no. 2, pp. 59–66, 2006.
  22. G. Gupta and J. Pieprzyk, “Reversible and blind database watermarking using difference expansion,” in Proc. 1st Int. Conf. Forensic Appl. Tech. Telecommun., Inf., Multimedia Workshop, 2008, p. 24.