A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations
In this paper, we present a new zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. Most existing fragile watermarking schemes introduce errors or permanent distortion into the original database content. These distortions violat...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Islamabad : Little Lion Scientific
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/41221/ http://irep.iium.edu.my/41221/ http://irep.iium.edu.my/41221/7/41221_a%20zero_distortion%20fragile%20watermarking.pdf |
Summary: | In this paper, we present a new zero-distortion fragile watermarking scheme to detect and localize malicious
modifications in textual database relations. Most existing fragile watermarking schemes introduce errors or
permanent distortion into the original database content. These distortions violate the integrity of the database
consequently the database quality and usability are degraded. Although, some fragile schemes are able to
authenticate the database integrity and detect the malicious modifications made on the database but they are
either tuples or attributes ordering based and unable to characterize the attack, identify the type of attack,
identify the tampered data and locating the tampered tuples. In addition, most existing fragile schemes are
based on LSB or MSB in generating the watermark unlike to this scheme, which is based on local
characteristics of the relation itself such as frequencies of characters and text length in generating the
watermark. This scheme is serviceable for sensitive and insensitive textual relational database since it does
not introduce any error into the original contents. In addition, this scheme overcomes the weaknesses of data
integrity violate, data usability and data quality degradation. The experimental results show the ability of
proposed scheme in authenticating the database relation as well as the ability of characterize the attack,
identifying the changed data and locating the text that affected by the malicious modification without depend
on tuples and attributes ordering. |
---|