Cargando…
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. Thes...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2013
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3684121/ https://www.ncbi.nlm.nih.gov/pubmed/23818831 http://dx.doi.org/10.1155/2013/796726 |
_version_ | 1782273544816689152 |
---|---|
author | Khan, Aihab Husain, Syed Afaq |
author_facet | Khan, Aihab Husain, Syed Afaq |
author_sort | Khan, Aihab |
collection | PubMed |
description | We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully. |
format | Online Article Text |
id | pubmed-3684121 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2013 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-36841212013-07-01 A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations Khan, Aihab Husain, Syed Afaq ScientificWorldJournal Research Article We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully. Hindawi Publishing Corporation 2013-06-02 /pmc/articles/PMC3684121/ /pubmed/23818831 http://dx.doi.org/10.1155/2013/796726 Text en Copyright © 2013 A. Khan and S. A. Husain. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Khan, Aihab Husain, Syed Afaq A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations |
title | A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations |
title_full | A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations |
title_fullStr | A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations |
title_full_unstemmed | A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations |
title_short | A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations |
title_sort | fragile zero watermarking scheme to detect and characterize malicious modifications in database relations |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3684121/ https://www.ncbi.nlm.nih.gov/pubmed/23818831 http://dx.doi.org/10.1155/2013/796726 |
work_keys_str_mv | AT khanaihab afragilezerowatermarkingschemetodetectandcharacterizemaliciousmodificationsindatabaserelations AT husainsyedafaq afragilezerowatermarkingschemetodetectandcharacterizemaliciousmodificationsindatabaserelations AT khanaihab fragilezerowatermarkingschemetodetectandcharacterizemaliciousmodificationsindatabaserelations AT husainsyedafaq fragilezerowatermarkingschemetodetectandcharacterizemaliciousmodificationsindatabaserelations |