Abstract

Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as “histogram shifting of adjacent pixel difference” (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.

Highlights

  • The rapid development of the Internet and related technologies has allowed for the tremendous ability to access and redistribute digital multi media contents

  • Blind watermarking refers to the case in which the original image and the watermark are not required at the extraction phase [1, 5], whereas nonblind watermarking refers to the cases in which the original image and the watermark are required at the extraction phase [21]

  • Since adjacent pixel difference” (APD) is used in our proposed watermarking scheme for relational database, we present an example in Figure 1 to explain the APD data-embedding concept

Read more

Summary

Introduction

The rapid development of the Internet and related technologies has allowed for the tremendous ability to access and redistribute digital multi media contents. In such a context, protecting the ownership and controlling the copies of digital data have become very important. The second type of watermarking is that a fragile watermark for tamper detection is used to identify and report every possible region in which someone has tampered with the watermarked data This type of watermarking may be damaged or destroyed after processing is applied on the content of data either in incidental or malicious operations. Blind watermarking refers to the case in which the original image and the watermark are not required at the extraction phase [1, 5], whereas nonblind watermarking refers to the cases in which the original image and the watermark are required at the extraction phase [21]

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call