DocumentCode
678217
Title
Embedding watermarks in multiple tables in numeric dataset by bit pattern generation sub-watermarks
Author
Sultana, Shabana
Author_Institution
Dept. of Comput. Software Eng., Nat. Univ. of Sci. & Technol., Rawalpindi, Pakistan
fYear
2013
fDate
11-12 Dec. 2013
Firstpage
83
Lastpage
88
Abstract
A novel and technical approach for watermarking tables of a numeric dataset is proposed. Watermark insertion and detection is done by K Map Minimizer. The crucial aspect of the proposed technique is the permuted bit pattern generation. The bit pattern is generated by first selecting unique rows and columns and solving the four attributes at the selected position through the K Map Minimizer to constitute a pattern. To make the bit pattern more secure permutation is applied before, where the size of the bit pattern is adjusted as per requirement. This unique permuted bit pattern is called the watermarked permuted bit pattern. Each bit of watermarked permuted bit pattern is added /subtracted while sub watermarking the selected attribute. Four secret keys and one permutation key are used which adds to the integrity of the technique. Secret keys are always used in pair so knowledge of a single key to an attacker, is of no use rather access to k-1 keys, where k is the number of keys, is also of not much worth as to generate a watermarked permuted bit pattern all four keys are requirement. Watermark detection routine is blind as it neither requires the original dataset nor the watermarked one. Watermarks are equally distributed in a very large dataset as six digits number is selected through K Map Minimizer, so the watermark can be detected even in a small subset of a watermarked relation as long as the sample contains some of the marks. Proposed technique is robust against various malicious attacks and updates to the data. Dealing with multiple tables adds to the practicality of the data.
Keywords
watermarking; K map minimizer; bit pattern generation subwatermarks; malicious attacks; multiple tables; numeric dataset; permutation key; secret keys; secure permutation; subwatermarking; watermark detection; watermark insertion; watermarked permuted bit pattern; watermarking tables; Computer architecture; Databases; Information security; Probability; Robustness; Software; Watermarking; K Map Minimizer; data security and privacy; information security; robust; sub-watermarking; watermarking;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance (NCIA), 2013 2nd National Conference on
Conference_Location
Rawalpindi
Print_ISBN
978-1-4799-1287-2
Type
conf
DOI
10.1109/NCIA.2013.6725329
Filename
6725329
Link To Document