Abstract

Semi-structured data is a widely used text format for data interchange and storage. This paper proposes a robust watermarking scheme of data protection for semi-structured data, which uses JSON format as an example for illustration. We first parse JSON file into a data structure of distinct pairs. Afterwards, we generate a transfer matrix to get the intermediate sequences, which are then encoded using error-correction codes and embedded into the pairs. A private key is shared by the data hider and the recipient to resist collusion attacks. On the recipient’s side, data extraction can be successfully carried out even the received stego data are tampered. The imperceptibility is realized by embedding data into the less significant digits of numeric data in the cover file. The proposed scheme can be extended on several other formats. The experimental results show that the proposed scheme is robust to various kinds of typical attacks such as contextual truncating, modification, and redundancy addition.

Highlights

  • Semi-structured data are widely used for information storage and data interchange for its convenience and efficiency in data transmission

  • We propose a robust watermarking scheme for semi-structured data protection

  • The experimental results show that the proposed scheme is robust to various kinds of typical attacks

Read more

Summary

Introduction

Semi-structured data are widely used for information storage and data interchange for its convenience and efficiency in data transmission. We parse the cover JSON file, denoted as J, into pairs P, which are the basic units for data embedding in the scheme. The recipient first conducts preprocessing, that parses J∗ into P∗ He applies the same hashing algorithm on the key and generate the pseudorandom sequence Si, which is the same as the sequence during data embedding. Afterwards, he starts watermark extraction by initializing G as an empty n × k matrix. If a0i is not a valid cyclic code, the recipient is convinced that the data included in the pair is tampered He does not utilize the packet for watermark extraction. He gets the watermark by concatenating all the recovered packets

Extension
Results and discussion
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.