2022
DOI: 10.1109/access.2022.3157866
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Relational Database Watermarking Techniques: An Empirical Study

Abstract: Digital watermarking is considered one of the most promising techniques to verify the authenticity and integrity of digital data. It is used for a wide range of applications, e.g., copyright protection, tamper detection, traitor tracing, maintaining the integrity of data, etc. In the past two decades, a wide range of algorithms for relational database watermarking has been proposed. Even though a number of surveys exist in the literature, they are unable to provide insightful guidance to choose the right water… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 97 publications
0
9
0
Order By: Relevance
“…refs. [45,46]) and the references therein. In contrast to existing schemes, the proposed scheme embeds data into shares rather than attribute values or constrained data contents.…”
Section: Resultsmentioning
confidence: 99%
“…refs. [45,46]) and the references therein. In contrast to existing schemes, the proposed scheme embeds data into shares rather than attribute values or constrained data contents.…”
Section: Resultsmentioning
confidence: 99%
“…Since the publication of the AHK algorithm, relational data watermarking techniques have increased in number and diversity. For example, some techniques present database protection as a middleware that generates format-independent watermarks [11], some focus on reducing the distortion caused by the watermark embedding [22], and others allow data owners to define constraints to preserve data usability automatically [23]. Despite the many techniques, most works target numerical attributes for mark embedding while modifying their values and trying to control the distortion using statistical metrics as a reference.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers first proposed watermarking techniques to secure multimedia data. Nevertheless, over time, they have been successfully used to protect other digital assets, such as compiled code [10], relational databases [11], neural networks [12], etc. Regarding relational data, considering third parties can readily access them through the Internet, watermarks secure them without restricting access or portability.…”
Section: Introductionmentioning
confidence: 99%
“…Watermarking techniques for relational databases can be classified in several ways. For instance, by the type of watermark information to embed, the type of attributes into which the marks are embedded, or if the watermark distorts the data or not [9]. In particular, techniques modifying the relation content for its protection are defined as distortion-based, whereas the others as distortionfree.…”
Section: A Architecture Of Relational Database Watermarkingmentioning
confidence: 99%
“…The SSIM is obtained according to (9) and returns an appreciation of the extracted watermark quality closer to human perception. For this case, multiple windows of size N × N are defined by x and y.…”
Section: F(t I [Pk]) = H(sk • H(sk • T I [Pk]))mentioning
confidence: 99%