Title :
Embedding watermarks in multiple tables in numeric dataset by bit pattern generation sub-watermarks
Author :
Sultana, Shabana
Author_Institution :
Dept. of Comput. Software Eng., Nat. Univ. of Sci. & Technol., Rawalpindi, Pakistan
Abstract :
A novel and technical approach for watermarking tables of a numeric dataset is proposed. Watermark insertion and detection is done by K Map Minimizer. The crucial aspect of the proposed technique is the permuted bit pattern generation. The bit pattern is generated by first selecting unique rows and columns and solving the four attributes at the selected position through the K Map Minimizer to constitute a pattern. To make the bit pattern more secure permutation is applied before, where the size of the bit pattern is adjusted as per requirement. This unique permuted bit pattern is called the watermarked permuted bit pattern. Each bit of watermarked permuted bit pattern is added /subtracted while sub watermarking the selected attribute. Four secret keys and one permutation key are used which adds to the integrity of the technique. Secret keys are always used in pair so knowledge of a single key to an attacker, is of no use rather access to k-1 keys, where k is the number of keys, is also of not much worth as to generate a watermarked permuted bit pattern all four keys are requirement. Watermark detection routine is blind as it neither requires the original dataset nor the watermarked one. Watermarks are equally distributed in a very large dataset as six digits number is selected through K Map Minimizer, so the watermark can be detected even in a small subset of a watermarked relation as long as the sample contains some of the marks. Proposed technique is robust against various malicious attacks and updates to the data. Dealing with multiple tables adds to the practicality of the data.
Keywords :
watermarking; K map minimizer; bit pattern generation subwatermarks; malicious attacks; multiple tables; numeric dataset; permutation key; secret keys; secure permutation; subwatermarking; watermark detection; watermark insertion; watermarked permuted bit pattern; watermarking tables; Computer architecture; Databases; Information security; Probability; Robustness; Software; Watermarking; K Map Minimizer; data security and privacy; information security; robust; sub-watermarking; watermarking;
Conference_Titel :
Information Assurance (NCIA), 2013 2nd National Conference on
Conference_Location :
Rawalpindi
Print_ISBN :
978-1-4799-1287-2
DOI :
10.1109/NCIA.2013.6725329