• DocumentCode
    678217
  • Title

    Embedding watermarks in multiple tables in numeric dataset by bit pattern generation sub-watermarks

  • Author

    Sultana, Shabana

  • Author_Institution
    Dept. of Comput. Software Eng., Nat. Univ. of Sci. & Technol., Rawalpindi, Pakistan
  • fYear
    2013
  • fDate
    11-12 Dec. 2013
  • Firstpage
    83
  • Lastpage
    88
  • Abstract
    A novel and technical approach for watermarking tables of a numeric dataset is proposed. Watermark insertion and detection is done by K Map Minimizer. The crucial aspect of the proposed technique is the permuted bit pattern generation. The bit pattern is generated by first selecting unique rows and columns and solving the four attributes at the selected position through the K Map Minimizer to constitute a pattern. To make the bit pattern more secure permutation is applied before, where the size of the bit pattern is adjusted as per requirement. This unique permuted bit pattern is called the watermarked permuted bit pattern. Each bit of watermarked permuted bit pattern is added /subtracted while sub watermarking the selected attribute. Four secret keys and one permutation key are used which adds to the integrity of the technique. Secret keys are always used in pair so knowledge of a single key to an attacker, is of no use rather access to k-1 keys, where k is the number of keys, is also of not much worth as to generate a watermarked permuted bit pattern all four keys are requirement. Watermark detection routine is blind as it neither requires the original dataset nor the watermarked one. Watermarks are equally distributed in a very large dataset as six digits number is selected through K Map Minimizer, so the watermark can be detected even in a small subset of a watermarked relation as long as the sample contains some of the marks. Proposed technique is robust against various malicious attacks and updates to the data. Dealing with multiple tables adds to the practicality of the data.
  • Keywords
    watermarking; K map minimizer; bit pattern generation subwatermarks; malicious attacks; multiple tables; numeric dataset; permutation key; secret keys; secure permutation; subwatermarking; watermark detection; watermark insertion; watermarked permuted bit pattern; watermarking tables; Computer architecture; Databases; Information security; Probability; Robustness; Software; Watermarking; K Map Minimizer; data security and privacy; information security; robust; sub-watermarking; watermarking;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance (NCIA), 2013 2nd National Conference on
  • Conference_Location
    Rawalpindi
  • Print_ISBN
    978-1-4799-1287-2
  • Type

    conf

  • DOI
    10.1109/NCIA.2013.6725329
  • Filename
    6725329