





































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Watermarking techniques for relational databases, focusing on the methods proposed by Agrawal et al. and Sion et al. The techniques aim to embed watermarks in databases for data integrity, proof of authorship, and tamper detection. the general watermarking model, attacks, and strengths and weaknesses of each technique.
What you will learn
Typology: Lecture notes
1 / 45
This page cannot be seen from the preview
Don't miss anything!
Acknowledgement: Mohamed Shehab from Purdue Univ.
¨ Stock market data ¨ Consumer Behavior data (Walmart) ¨ Power Consumption data ¨ Weather data
¨ Signature and data are the same object.
¨ Integrity information is embedded in the data.
What defines the usability constraints? n Usability constraints are application dependent.
What defines the usability constraints? (Cont.)
Attacker Channel Watermark Decoder Watermark Encoder Secret Key, Ks Data, D Watermarked Data, DW Attacked Data, D’W Watermark W=(100100100….) Decoded Watermark WD=(100100100….)
Attacker Channel Watermark Decoder Watermark Encoder Secret Key, Ks Data, D Watermarked Data, DW Attacked Data, D’W Watermark W=(100100100….) Decoded Watermark WD=(100100100….) Instead: Watermark is a function of the data and the secret key
n i = (MAC(r.P) mod v // Selected Attribute n b = (MAC(r.P) mod e // Selected LSB index n if((MAC(r.P) mod 2 == 0) // MAC is even ¨ Set bit b of r.Ai n Else ¨ Clear bit b of r.Ai
MAC mod m 1 4 0 9 (MAC mod v= PKey Attribute 0^ Attribute 1^ ……….^ Attribute v-^1 1234 2345 3390 4455
MAC is MAC(K || MAC(K || r.P)) MAC mod e