This Article 
 Bibliographic References 
 Add to: 
Rights Protection for Categorical Data
July 2005 (vol. 17 no. 7)
pp. 912-926
A novel method of rights protection for categorical data through watermarking is introduced in this paper. New watermark embedding channels are discovered and associated novel watermark encoding algorithms are proposed. While preserving data quality requirements, the introduced solution is designed to survive important attacks, such as subset selection and random alterations. Mark detection is fully "blind” in that it doesn't require the original data, an important characteristic, especially in the case of massive data. Various improvements and alternative encoding methods are proposed and validation experiments on real-life data are performed. Important theoretical bounds including mark vulnerability are analyzed. The method is proved (experimentally and by analysis) to be extremely resilient to both alteration and data loss attacks, for example, tolerating up to 80 percent data loss with a watermark alteration of only 25 percent.

[1] E. Bertino, M. Braun, S. Castano, E. Ferrari, and M. Mesiti, “Author-X: A Java-Based System for XML Data Protection,” Proc. 14th Ann. Int'l Federation Information Processing Workshop Database Security, pp. 15-26, 2000.
[2] E. Bertino, S. Jajodia, and P. Samarati, “A Flexible Authorization Mechanism for Relational Data Management Systems,” ACM Trans. Information Systems, vol. 17, no. 2, 1999.
[3] C. Clifton and D. Marks, “Security and Privacy Implications of Data Mining,” Proc. Workshop Data Mining and Knowledge Discovery, pp. 15-19, 1996.
[4] L.d.C.T. Gomes, M. Mboup, M. Bonnet, and N. Moreau, “Cyclostationarity-Based Audio Watermarking with Private and Public Hidden Data,” Proc. Convention Audio Eng. Soc., Sept. 2000.
[5] J. Eggers, J. Su, and B. Girod, “Public Key Watermarking by Eigenvectors of Linear Transforms,” Proc. European Signal Processing Conf., Sept. 2000.
[6] N. Ferguson and B. Schneier, Practical Cryptography. Wiley & Sons, 2003.
[7] T. Furon and P. Duhamel, “Audio Asymmetric Watermarking Technique,” Proc. Int'l Conf. Audio, Speech and Signal Processing, June 2000.
[8] T. Furon and P. Duhamel, “Robustness of an Asymmetric Technique,” Proc. Int'l Conf. Image Processing, Sept. 2000.
[9] T. Furon, I. Venturini, and P. Duhamel, “Unified Approach of Asymmetric Watermarking Schemes,” Security and Watermarking of Multimedia Contents III, P.W. Wong and E. Delp, eds. 2001.
[10] J. Hale, J. Threet, and S. Shenoi, “A Framework for High Assurance Security of Distributed Objects,” Proc. 10th Ann. Int'l Federation for Information Processing WG11.3 Working Conf. Database Security, 1997.
[11] F. Hartung and B. Girod, “Fast Public-Key Watermarking of Compressed Video,” Proc. IEEE Int'l Conf. Image Processing, Oct. 1997.
[12] E. Hildebrandt and G. Saake, “User Authentication in Multidatabase Systems,” Proc. Ninth Int'l Workshop Database and Expert Systems Applications, pp. 281-286, 1998.
[13] S. Jajodia, P. Samarati, and V.S. Subrahmanian, “A Logical Language for Expressing Authorizations,” Proc. IEEE Symp. Security and Privacy, pp. 31-42, 1997.
[14] S. Jajodia, P. Samarati, V.S. Subrahmanian, and E. Bertino, “A Unified Framework for Enforcing Multiple Access Control Policies,” Proc. SIGMOD, 1997.
[15] J. Kiernan and R. Agrawal, “Watermarking Relational Databases,” Proc. 28th Int'l Conf. Very Large Databases, 2002.
[16] N. Li, J. Feigenbaum, and B.N. Grosof, “A Logic-Based Knowledge Representation for Authorization with Delegation,” PCSFW: Proc. 12th Computer Security Foundations Workshop, 1999.
[17] M. Nyanchama and S.L. Osborn, “Access Rights Administration in Role-Based Security Systems,” Proc. Int'l Federation Information Processing Workshop Database Security, pp. 37-56, 1994.
[18] S.L. Osborn, “Database Security Integration Using Role-Based Access Control,” Proc. Int'l Federation Information Processing Workshop Database Security, pp. 245-258 2000.
[19] D. Rasikan, S.H. Son, and R. Mukkamala, “Supporting Security Requirements in Multilevel Real-Time Databases,” comdavid95supporting.html , 1995.
[20] S. Ross, A First Course in Probability. Prentice Hall, 2001.
[21] R.S. Sandhu, “On Five Definitions of Data Integrity,” Proc. Int'l Federation Information Processing Workshop Database Security, pp. 257-267, 1993.
[22] B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley & Sons, 1996.
[23] R. Sion, “Proving Ownership over Categorical Data,” Proc. IEEE Int'l Conf. Data Eng., 2004.
[24] R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,” Proc. ACM SIGMOD, 2003.
[25] R. Sion, M. Atallah, and S. Prabhakar, “Relational Data Rights Protection through Watermarking,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 6, June 2004.
[26] J. Stern and J.-P. Tillich, “Automatic Detection of a Watermarked Document Using a Private Key,” Proc. Fourth Int'l Workshop Information Hiding, vol. 2137, Apr. 2001.

Index Terms:
Index Terms- Rights protection, categorical data, relational data, watermarking, information hiding.
Radu Sion, Mikhail Atallah, Sunil Prabhakar, "Rights Protection for Categorical Data," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 7, pp. 912-926, July 2005, doi:10.1109/TKDE.2005.116
Usage of this product signifies your acceptance of the Terms of Use.