Watermill: An Optimized Fingerprinting System for Databases under Constraints
This paper presents a walermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints that watermarked data sets must comply with. For a subset of these constraints, namely, weight-independent constraints, we propose a novel w...
Saved in:
Published in | IEEE transactions on knowledge and data engineering Vol. 20; no. 4; pp. 532 - 546 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.04.2008
IEEE Computer Society The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper presents a walermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints that watermarked data sets must comply with. For a subset of these constraints, namely, weight-independent constraints, we propose a novel watermarking strategy that consists of translating them into an integer linear program. We show two watermarking strategies: an exhaustive one based on integer linear programming constraint solving and a scalable pairing heuristic. Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that precomputes the watermarks only once. Moreover, we show that our method enables practical collusion-secure fingerprinting since the precomputed watermarks are based on binary alterations located at exactly the same positions. The paper includes an in-depth analysis of false-hit and false-miss occurrence probabilities for the detection algorithm. Experiments performed on our open source software WATERMILL assess the watermark robustness against common attacks and show that our method outperforms the existing ones concerning the watermark embedding speed. |
---|---|
AbstractList | This paper presents a walermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints that watermarked data sets must comply with. For a subset of these constraints, namely, weight-independent constraints, we propose a novel watermarking strategy that consists of translating them into an integer linear program. We show two watermarking strategies: an exhaustive one based on integer linear programming constraint solving and a scalable pairing heuristic. Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that precomputes the watermarks only once. Moreover, we show that our method enables practical collusion-secure fingerprinting since the precomputed watermarks are based on binary alterations located at exactly the same positions. The paper includes an in-depth analysis of false-hit and false-miss occurrence probabilities for the detection algorithm. Experiments performed on our open source software WATERMILL assess the watermark robustness against common attacks and show that our method outperforms the existing ones concerning the watermark embedding speed. his paper presents a watermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints that watermarked datasets must comply with. For a subset of these constraints, namely weight-independent constraints, we propose a novel watermarking strategy which consists of translating them into an integer linear program. We show two watermarking strategies: an exhaustive one based on integer linear programming constraint solving and a scalable pairing heuristic. Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that precomputes the watermarks only once. Moreover we show that our method enables practical collusion-secure fingerprinting since the precomputed watermarks are based on binary alterations located at exactly the same positions. The paper includes an in-depth analysis of false hits and false misses occurrence probabilities for the detection algorithm. Experiments performed on our open source software Watermill assess the watermark robustness against common attacks, and show that our method outperforms the existing ones concerning the watermark embedding speed. Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that precomputes the watermarks only once. [...] we show that our method enables practical collusion-secure fingerprinting since the precomputed watermarks are based on binary alterations located at exactly the same positions. |
Author | Lafaye, J. Gross-Amblard, D. Constantin, C. Guerrouani, M. |
Author_xml | – sequence: 1 givenname: J. surname: Lafaye fullname: Lafaye, J. organization: Lab. Cedric, Paris – sequence: 2 givenname: D. surname: Gross-Amblard fullname: Gross-Amblard, D. – sequence: 3 givenname: C. surname: Constantin fullname: Constantin, C. – sequence: 4 givenname: M. surname: Guerrouani fullname: Guerrouani, M. organization: Lab. Cedric, Paris |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=20194847$$DView record in Pascal Francis https://hal.science/hal-01185453$$DView record in HAL |
BookMark | eNp90cFu1DAQBmALFYm2cEfiEiEB4pBlJrZjh9tq21LEoh4o4mjNxjakSpzFziKVp8ch1R44cPLI_sYa-z9jJ2EMjrHnCCtEaN7dfrq4XFUAaoUNKOSP2ClKqcsKGzzJNQgsBRfqCTtL6Q4AtNJ4yj5_o8nFoev798U6FDf7qRu6384WV1347uI-dmHKVfHlPk1uKPwYiwuaaEfJpeIQrIvFZgxpipRhesoee-qTe_awnrOvV5e3m-tye_Ph42a9LVuBaiq90Fg7Ia33ZAW13nLUXnNLtRW8bmqhG9opvwMPmlwlofbWOimo2oHlmp-zt8u9P6g3ecaB4r0ZqTPX662Z9wBRSyH5L8z2zWL3cfx5cGkyQ5da1_cU3HhIRisJMuM6y9f_lfn3UPO_8OU_8G48xJBfbBqsOADWM4IFtXFMKTp_HBTBzJGZOTIzR2aWyHLLq4d7KbXU-0ih7dKxrwJshBYquxeL65xzx2PBleaq4X8ALBaf2g |
CODEN | ITKEEH |
CitedBy_id | crossref_primary_10_1109_TIFS_2013_2294240 crossref_primary_10_1007_s10707_011_0133_8 crossref_primary_10_3390_electronics9071093 crossref_primary_10_1155_2013_796726 crossref_primary_10_1109_ACCESS_2022_3157866 crossref_primary_10_1109_TDSC_2022_3191117 crossref_primary_10_1145_1929934_1929937 crossref_primary_10_1109_ACCESS_2018_2876879 crossref_primary_10_1109_TKDE_2007_190713 crossref_primary_10_1093_bioinformatics_btac243 crossref_primary_10_1109_TIFS_2015_2439962 crossref_primary_10_1007_s11554_016_0647_2 |
Cites_doi | 10.1145/773153.773172 10.1201/1079/43263.28.6.20001201/30373.5 10.1109/TKDE.2007.190713 10.1109/ICDE.1990.113485 10.1109/TIFS.2006.873596 10.1145/872757.872772 10.1109/TDSC.2005.12 10.1109/TKDE.2004.94 10.1109/18.705568 10.1145/335168.335172 10.1109/TKDE.2007.190668 10.1145/780559.780561 10.1080/01621459.1963.10500830 10.1145/947380.947398 |
ContentType | Journal Article |
Copyright | 2008 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008 Distributed under a Creative Commons Attribution 4.0 International License |
Copyright_xml | – notice: 2008 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008 – notice: Distributed under a Creative Commons Attribution 4.0 International License |
DBID | 97E RIA RIE IQODW AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 1XC |
DOI | 10.1109/TKDE.2007.190713 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) Pascal-Francis CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database Hyper Article en Ligne (HAL) |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science Applied Sciences |
EISSN | 1558-2191 |
EndPage | 546 |
ExternalDocumentID | oai_HAL_hal_01185453v1 2545287331 10_1109_TKDE_2007_190713 20194847 4378379 |
Genre | orig-research |
GroupedDBID | -~X .DC 0R~ 1OL 29I 4.4 5GY 5VS 6IK 97E 9M8 AAJGR AASAJ AAYOK ABFSI ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AI. AIBXA AKJIK ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 ICLAB IEDLZ IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIC RIE RIG RNI RNS RXW RZB TAE TAF TN5 UHB VH1 XFK IQODW AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 1XC |
ID | FETCH-LOGICAL-c417t-f4816e45dffad4acfd318f83da6d43696489ab7fb0f08ae2506fdde54a2b0d383 |
IEDL.DBID | RIE |
ISSN | 1041-4347 |
IngestDate | Tue Oct 15 15:21:04 EDT 2024 Sat Aug 17 00:58:34 EDT 2024 Thu Aug 15 22:39:58 EDT 2024 Thu Oct 10 17:11:54 EDT 2024 Fri Aug 23 01:04:18 EDT 2024 Fri May 03 09:36:16 EDT 2024 Wed Jun 26 19:28:23 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | Security and Privacy Protection database watermarking database fingerprinting optimization Constrained database Collusion Fingerprint Declarative language Probabilistic approach Database query Relational database Constraint satisfaction Linear programming Stéganography linear optimization query optimizations relational databases Open source software Constrained optimization Integer programming Fingerprinting Heuristic method Robustness Safety Usability Digital watermarking |
Language | English |
License | CC BY 4.0 Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c417t-f4816e45dffad4acfd318f83da6d43696489ab7fb0f08ae2506fdde54a2b0d383 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 912300166 |
PQPubID | 23500 |
PageCount | 15 |
ParticipantIDs | hal_primary_oai_HAL_hal_01185453v1 ieee_primary_4378379 pascalfrancis_primary_20194847 proquest_miscellaneous_34718346 crossref_primary_10_1109_TKDE_2007_190713 proquest_journals_912300166 proquest_miscellaneous_875058546 |
PublicationCentury | 2000 |
PublicationDate | 2008-04-01 |
PublicationDateYYYYMMDD | 2008-04-01 |
PublicationDate_xml | – month: 04 year: 2008 text: 2008-04-01 day: 01 |
PublicationDecade | 2000 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY – name: New York |
PublicationTitle | IEEE transactions on knowledge and data engineering |
PublicationTitleAbbrev | TKDE |
PublicationYear | 2008 |
Publisher | IEEE IEEE Computer Society The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
Publisher_xml | – name: IEEE – name: IEEE Computer Society – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) – name: Institute of Electrical and Electronics Engineers |
References | bibttk200804053225 schrijver (bibttk200804053219) 1998 wosley (bibttk200804053226) 1998 gross-amblard (bibttk20080405328) 2003 lafaye (bibttk200804053213) 2006 davide (bibttk20080405326) 2004 bibttk20080405323 guth (bibttk20080405329) 2000 bibttk20080405327 bibttk200804053212 agrawal (bibttk20080405322) 2003 bibttk200804053211 bibttk200804053215 bibttk200804053214 buneman (bibttk20080405324) 2001; 1973 bibttk200804053218 li (bibttk200804053216) 2003 li (bibttk200804053217) 2005; 2 hettich (bibttk200804053210) 1999 cox (bibttk20080405325) 2001 (bibttk20080405321) 2007 ullman (bibttk200804053224) 1988 bibttk200804053223 bibttk200804053222 bibttk200804053221 bibttk200804053220 |
References_xml | – start-page: 191 year: 2003 ident: bibttk20080405328 article-title: Query-Preserving Watermarking of Relational Databases and XML Documents publication-title: Proc 22nd SIGMOD-SIGACT-SIGART Symp Principles of Database Systems (PODS '03) doi: 10.1145/773153.773172 contributor: fullname: gross-amblard – ident: bibttk200804053212 doi: 10.1201/1079/43263.28.6.20001201/30373.5 – year: 1998 ident: bibttk200804053226 publication-title: Integer Programming contributor: fullname: wosley – ident: bibttk200804053214 doi: 10.1109/TKDE.2007.190713 – year: 1988 ident: bibttk200804053224 publication-title: Principles of database and knowledge-base systems contributor: fullname: ullman – start-page: 348 year: 2004 ident: bibttk20080405326 article-title: Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins publication-title: Proc Sixth Int'l Conf Flexible Query Answering Systems (FQAS '04) contributor: fullname: davide – year: 1999 ident: bibttk200804053210 contributor: fullname: hettich – ident: bibttk200804053225 doi: 10.1109/ICDE.1990.113485 – ident: bibttk200804053218 doi: 10.1109/TIFS.2006.873596 – ident: bibttk200804053221 doi: 10.1145/872757.872772 – start-page: 195 year: 2003 ident: bibttk200804053216 article-title: A Robust Watermarking Scheme for Relational Data publication-title: Proc 13th Workshop Information Technology and Systems (WITS '03) contributor: fullname: li – volume: 2 start-page: 34 year: 2005 ident: bibttk200804053217 article-title: Fingerprinting Relational Databases: Schemes and Specialties publication-title: IEEE Trans Dependable and Secure Computing doi: 10.1109/TDSC.2005.12 contributor: fullname: li – ident: bibttk200804053222 doi: 10.1109/TKDE.2004.94 – year: 2007 ident: bibttk20080405321 – ident: bibttk20080405323 doi: 10.1109/18.705568 – ident: bibttk20080405327 doi: 10.1145/335168.335172 – year: 1998 ident: bibttk200804053219 publication-title: Theory of Linear and Integer Programming contributor: fullname: schrijver – year: 2006 ident: bibttk200804053213 article-title: WATERMILL: Protecting Ownership Rights of Sales Statistics Databases through Watermarking (DEMO) publication-title: Proc Bases de Donn es Avanc es (BDA '06) contributor: fullname: lafaye – ident: bibttk200804053220 doi: 10.1109/TKDE.2007.190668 – ident: bibttk200804053223 doi: 10.1145/780559.780561 – start-page: 134 year: 2000 ident: bibttk20080405329 article-title: Error- and Collusion-Secure Fingerprinting for Digital Data publication-title: Proc Third Int'l Workshop Information Hiding (IH '99) contributor: fullname: guth – start-page: 157 year: 2003 ident: bibttk20080405322 article-title: Watermarking Relational Data: Framework, Algorithms and Analysis publication-title: VLDB J contributor: fullname: agrawal – year: 2001 ident: bibttk20080405325 publication-title: Digital Watermarking contributor: fullname: cox – ident: bibttk200804053211 doi: 10.1080/01621459.1963.10500830 – volume: 1973 start-page: 316 year: 2001 ident: bibttk20080405324 article-title: Why and Where: A Characterization of Data Provenance publication-title: Proc Eighth Int'l Conf Database Theory (ICDT '01) contributor: fullname: buneman – ident: bibttk200804053215 doi: 10.1145/947380.947398 |
SSID | ssj0008781 |
Score | 2.086651 |
Snippet | This paper presents a walermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints... Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that... his paper presents a watermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints... |
SourceID | hal proquest crossref pascalfrancis ieee |
SourceType | Open Access Repository Aggregation Database Index Database Publisher |
StartPage | 532 |
SubjectTerms | Algorithm design and analysis Algorithms Applied sciences Computation Computer programs Computer Science Computer science; control theory; systems Constraint optimization Data processing. List processing. Character string processing database fingerprinting database watermarking Detection algorithms Exact sciences and technology Fingerprint recognition Fingerprinting Information systems. Data bases Integer linear programming Integers Linear programming Memory and file management (including protection and security) Memory organisation. Data processing Open source software optimization Relational databases Security and Privacy Protection Software Source code Spatial databases Strategy Studies Usability Watermarking |
Title | Watermill: An Optimized Fingerprinting System for Databases under Constraints |
URI | https://ieeexplore.ieee.org/document/4378379 https://www.proquest.com/docview/912300166 https://search.proquest.com/docview/34718346 https://search.proquest.com/docview/875058546 https://hal.science/hal-01185453 |
Volume | 20 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3BTtwwEB2xnNpDaaFVA5RaqJdKZMkSJ7Z7WxVWq5ZtL6Byi5zYFlUhi0iWA1_PjJ1EpbRSb1HiSInHnjfPHs8D-JBZUeWlrGKEDxtzYWSsS-PizHKEE2Q-1tJ6x-JbPj_nXy6yizU4GM7CWGt98pkd06XfyzfLakVLZYc8Fcin1AhGQqlwVmvwulJ4QVJkF8iJUi76LclEHZ59PT4JxQoR_cQkfQRBo0tKgPTKKpQXqRvsGhc0LZ64Z485sw1Y9F8bUk1-jVdtOa7u_yjk-L-_8xJedMEnm4bR8grWbL0JG72wA-vm-SY8_61K4RYsfmifMnN19YlNa_Ydncz1z3tr2MwvCdLKIOVOs1D8nGEUzI51qwkfG0Zn1G4ZyYJ6MYq2eQ3ns5Ozz_O4U2GIKz4RbezQaLnlmXFOG64rZ9ANOJkanRtOaoBcKl0KVyYukdpiSJU79JkZ10dlYpAAv4H1elnbt8ASlWhpBZIkejXLdeqkm0jkmEe6EjyL4GNvmOImFNsoPElJVEFGJM1MUQQjRrCPlhuaUZXs-fS0oHt0mBYDw_RuEsEWdfvQquvxCPYeGXp4jtGQ4ojXEez0li-6Od0UCkGeIuQ8gvfDU5yMtMOia7tcNUVKUJ9ybMH-0QLpYYIMjefbf_-0HXgWMlIoN2gX1tvblX2HYU9b7vnx_gBX1v8K |
link.rule.ids | 230,315,783,787,799,888,27938,27939,55088 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB215QA9UGhBDYXWQlyQyDbbOLHDbUW7WuhuuWxFb5YT2wJRsqjJcuivZ8ZOIsqHxC1KHCnx2PPm2eN5AK8yK6q8lFWM8GFjLoyMdWlcnFmOcILMx1pa71hc5LNL_uEqu9qAN8NZGGutTz6zI7r0e_lmVa1pqeyYpwL5VLEJ9zKKK8JprcHvSuElSZFfICtKueg3JZPieHl-ehbKFSL-iXF6B4Q2P1MKpNdWocxI3WDnuKBq8YeD9qgz3YFF_70h2eTraN2Wo-r2t1KO__tDj-BhF36ySRgvj2HD1ruw00s7sG6m78L2L3UK92DxSfukmevrt2xSs4_oZr59ubWGTf2iIK0NUvY0C-XPGcbB7FS3mhCyYXRK7YaRMKiXo2ibJ3A5PVu-m8WdDkNc8bFoY4dmyy3PjHPacF05g47AydTo3HDSA-Sy0KVwZeISqS0GVblDr5lxfVImBinwU9iqV7XdB5YUiZZWIE2iV7Ncp066sUSWeaIrwbMIXveGUd9DuQ3laUpSKDIiqWYKFYwYwUu03NCM6mTPJnNF9-g4LYaG6Y9xBHvU7UOrrscjOLxj6OE5xkMFR8SO4KC3vOpmdaMKhHmKkfMIjoanOB1pj0XXdrVuVEpgn3Jswf7RAglighyN58_-_mlHcH-2XMzV_P3F-QE8CPkplCn0HLbam7V9gUFQWx76sf8T0gQCZg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Watermill%3A+An+Optimized+Fingerprinting+System+for+Databases+under+Constraints&rft.jtitle=IEEE+transactions+on+knowledge+and+data+engineering&rft.au=Lafaye%2C+Julien&rft.au=Gross-Amblard%2C+David&rft.au=Constantin%2C+Camelia&rft.au=Guerrouani%2C+Meryem&rft.date=2008-04-01&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1041-4347&rft.volume=20&rft.issue=4&rft.spage=532&rft.epage=546&rft_id=info:doi/10.1109%2FTKDE.2007.190713&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=oai_HAL_hal_01185453v1 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1041-4347&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1041-4347&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1041-4347&client=summon |