Watermill: An Optimized Fingerprinting System for Databases under Constraints

This paper presents a walermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints that watermarked data sets must comply with. For a subset of these constraints, namely, weight-independent constraints, we propose a novel w...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on knowledge and data engineering Vol. 20; no. 4; pp. 532 - 546
Main Authors Lafaye, J., Gross-Amblard, D., Constantin, C., Guerrouani, M.
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.04.2008
IEEE Computer Society
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper presents a walermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints that watermarked data sets must comply with. For a subset of these constraints, namely, weight-independent constraints, we propose a novel watermarking strategy that consists of translating them into an integer linear program. We show two watermarking strategies: an exhaustive one based on integer linear programming constraint solving and a scalable pairing heuristic. Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that precomputes the watermarks only once. Moreover, we show that our method enables practical collusion-secure fingerprinting since the precomputed watermarks are based on binary alterations located at exactly the same positions. The paper includes an in-depth analysis of false-hit and false-miss occurrence probabilities for the detection algorithm. Experiments performed on our open source software WATERMILL assess the watermark robustness against common attacks and show that our method outperforms the existing ones concerning the watermark embedding speed.
AbstractList This paper presents a walermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints that watermarked data sets must comply with. For a subset of these constraints, namely, weight-independent constraints, we propose a novel watermarking strategy that consists of translating them into an integer linear program. We show two watermarking strategies: an exhaustive one based on integer linear programming constraint solving and a scalable pairing heuristic. Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that precomputes the watermarks only once. Moreover, we show that our method enables practical collusion-secure fingerprinting since the precomputed watermarks are based on binary alterations located at exactly the same positions. The paper includes an in-depth analysis of false-hit and false-miss occurrence probabilities for the detection algorithm. Experiments performed on our open source software WATERMILL assess the watermark robustness against common attacks and show that our method outperforms the existing ones concerning the watermark embedding speed.
his paper presents a watermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints that watermarked datasets must comply with. For a subset of these constraints, namely weight-independent constraints, we propose a novel watermarking strategy which consists of translating them into an integer linear program. We show two watermarking strategies: an exhaustive one based on integer linear programming constraint solving and a scalable pairing heuristic. Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that precomputes the watermarks only once. Moreover we show that our method enables practical collusion-secure fingerprinting since the precomputed watermarks are based on binary alterations located at exactly the same positions. The paper includes an in-depth analysis of false hits and false misses occurrence probabilities for the detection algorithm. Experiments performed on our open source software Watermill assess the watermark robustness against common attacks, and show that our method outperforms the existing ones concerning the watermark embedding speed.
Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that precomputes the watermarks only once. [...] we show that our method enables practical collusion-secure fingerprinting since the precomputed watermarks are based on binary alterations located at exactly the same positions.
Author Lafaye, J.
Gross-Amblard, D.
Constantin, C.
Guerrouani, M.
Author_xml – sequence: 1
  givenname: J.
  surname: Lafaye
  fullname: Lafaye, J.
  organization: Lab. Cedric, Paris
– sequence: 2
  givenname: D.
  surname: Gross-Amblard
  fullname: Gross-Amblard, D.
– sequence: 3
  givenname: C.
  surname: Constantin
  fullname: Constantin, C.
– sequence: 4
  givenname: M.
  surname: Guerrouani
  fullname: Guerrouani, M.
  organization: Lab. Cedric, Paris
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=20194847$$DView record in Pascal Francis
https://hal.science/hal-01185453$$DView record in HAL
BookMark eNp90cFu1DAQBmALFYm2cEfiEiEB4pBlJrZjh9tq21LEoh4o4mjNxjakSpzFziKVp8ch1R44cPLI_sYa-z9jJ2EMjrHnCCtEaN7dfrq4XFUAaoUNKOSP2ClKqcsKGzzJNQgsBRfqCTtL6Q4AtNJ4yj5_o8nFoev798U6FDf7qRu6384WV1347uI-dmHKVfHlPk1uKPwYiwuaaEfJpeIQrIvFZgxpipRhesoee-qTe_awnrOvV5e3m-tye_Ph42a9LVuBaiq90Fg7Ia33ZAW13nLUXnNLtRW8bmqhG9opvwMPmlwlofbWOimo2oHlmp-zt8u9P6g3ecaB4r0ZqTPX662Z9wBRSyH5L8z2zWL3cfx5cGkyQ5da1_cU3HhIRisJMuM6y9f_lfn3UPO_8OU_8G48xJBfbBqsOADWM4IFtXFMKTp_HBTBzJGZOTIzR2aWyHLLq4d7KbXU-0ih7dKxrwJshBYquxeL65xzx2PBleaq4X8ALBaf2g
CODEN ITKEEH
CitedBy_id crossref_primary_10_1109_TIFS_2013_2294240
crossref_primary_10_1007_s10707_011_0133_8
crossref_primary_10_3390_electronics9071093
crossref_primary_10_1155_2013_796726
crossref_primary_10_1109_ACCESS_2022_3157866
crossref_primary_10_1109_TDSC_2022_3191117
crossref_primary_10_1145_1929934_1929937
crossref_primary_10_1109_ACCESS_2018_2876879
crossref_primary_10_1109_TKDE_2007_190713
crossref_primary_10_1093_bioinformatics_btac243
crossref_primary_10_1109_TIFS_2015_2439962
crossref_primary_10_1007_s11554_016_0647_2
Cites_doi 10.1145/773153.773172
10.1201/1079/43263.28.6.20001201/30373.5
10.1109/TKDE.2007.190713
10.1109/ICDE.1990.113485
10.1109/TIFS.2006.873596
10.1145/872757.872772
10.1109/TDSC.2005.12
10.1109/TKDE.2004.94
10.1109/18.705568
10.1145/335168.335172
10.1109/TKDE.2007.190668
10.1145/780559.780561
10.1080/01621459.1963.10500830
10.1145/947380.947398
ContentType Journal Article
Copyright 2008 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: 2008 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID 97E
RIA
RIE
IQODW
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
1XC
DOI 10.1109/TKDE.2007.190713
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
Pascal-Francis
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Hyper Article en Ligne (HAL)
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList
Technology Research Database
Technology Research Database
Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Applied Sciences
EISSN 1558-2191
EndPage 546
ExternalDocumentID oai_HAL_hal_01185453v1
2545287331
10_1109_TKDE_2007_190713
20194847
4378379
Genre orig-research
GroupedDBID -~X
.DC
0R~
1OL
29I
4.4
5GY
5VS
6IK
97E
9M8
AAJGR
AASAJ
AAYOK
ABFSI
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AI.
AIBXA
AKJIK
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
ICLAB
IEDLZ
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIC
RIE
RIG
RNI
RNS
RXW
RZB
TAE
TAF
TN5
UHB
VH1
XFK
IQODW
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
1XC
ID FETCH-LOGICAL-c417t-f4816e45dffad4acfd318f83da6d43696489ab7fb0f08ae2506fdde54a2b0d383
IEDL.DBID RIE
ISSN 1041-4347
IngestDate Tue Oct 15 15:21:04 EDT 2024
Sat Aug 17 00:58:34 EDT 2024
Thu Aug 15 22:39:58 EDT 2024
Thu Oct 10 17:11:54 EDT 2024
Fri Aug 23 01:04:18 EDT 2024
Fri May 03 09:36:16 EDT 2024
Wed Jun 26 19:28:23 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Security and Privacy Protection
database watermarking
database fingerprinting
optimization
Constrained database
Collusion
Fingerprint
Declarative language
Probabilistic approach
Database query
Relational database
Constraint satisfaction
Linear programming
Stéganography
linear optimization
query optimizations
relational databases
Open source software
Constrained optimization
Integer programming
Fingerprinting
Heuristic method
Robustness
Safety
Usability
Digital watermarking
Language English
License CC BY 4.0
Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c417t-f4816e45dffad4acfd318f83da6d43696489ab7fb0f08ae2506fdde54a2b0d383
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
PQID 912300166
PQPubID 23500
PageCount 15
ParticipantIDs hal_primary_oai_HAL_hal_01185453v1
ieee_primary_4378379
pascalfrancis_primary_20194847
proquest_miscellaneous_34718346
crossref_primary_10_1109_TKDE_2007_190713
proquest_journals_912300166
proquest_miscellaneous_875058546
PublicationCentury 2000
PublicationDate 2008-04-01
PublicationDateYYYYMMDD 2008-04-01
PublicationDate_xml – month: 04
  year: 2008
  text: 2008-04-01
  day: 01
PublicationDecade 2000
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on knowledge and data engineering
PublicationTitleAbbrev TKDE
PublicationYear 2008
Publisher IEEE
IEEE Computer Society
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Publisher_xml – name: IEEE
– name: IEEE Computer Society
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
– name: Institute of Electrical and Electronics Engineers
References bibttk200804053225
schrijver (bibttk200804053219) 1998
wosley (bibttk200804053226) 1998
gross-amblard (bibttk20080405328) 2003
lafaye (bibttk200804053213) 2006
davide (bibttk20080405326) 2004
bibttk20080405323
guth (bibttk20080405329) 2000
bibttk20080405327
bibttk200804053212
agrawal (bibttk20080405322) 2003
bibttk200804053211
bibttk200804053215
bibttk200804053214
buneman (bibttk20080405324) 2001; 1973
bibttk200804053218
li (bibttk200804053216) 2003
li (bibttk200804053217) 2005; 2
hettich (bibttk200804053210) 1999
cox (bibttk20080405325) 2001
(bibttk20080405321) 2007
ullman (bibttk200804053224) 1988
bibttk200804053223
bibttk200804053222
bibttk200804053221
bibttk200804053220
References_xml – start-page: 191
  year: 2003
  ident: bibttk20080405328
  article-title: Query-Preserving Watermarking of Relational Databases and XML Documents
  publication-title: Proc 22nd SIGMOD-SIGACT-SIGART Symp Principles of Database Systems (PODS '03)
  doi: 10.1145/773153.773172
  contributor:
    fullname: gross-amblard
– ident: bibttk200804053212
  doi: 10.1201/1079/43263.28.6.20001201/30373.5
– year: 1998
  ident: bibttk200804053226
  publication-title: Integer Programming
  contributor:
    fullname: wosley
– ident: bibttk200804053214
  doi: 10.1109/TKDE.2007.190713
– year: 1988
  ident: bibttk200804053224
  publication-title: Principles of database and knowledge-base systems
  contributor:
    fullname: ullman
– start-page: 348
  year: 2004
  ident: bibttk20080405326
  article-title: Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins
  publication-title: Proc Sixth Int'l Conf Flexible Query Answering Systems (FQAS '04)
  contributor:
    fullname: davide
– year: 1999
  ident: bibttk200804053210
  contributor:
    fullname: hettich
– ident: bibttk200804053225
  doi: 10.1109/ICDE.1990.113485
– ident: bibttk200804053218
  doi: 10.1109/TIFS.2006.873596
– ident: bibttk200804053221
  doi: 10.1145/872757.872772
– start-page: 195
  year: 2003
  ident: bibttk200804053216
  article-title: A Robust Watermarking Scheme for Relational Data
  publication-title: Proc 13th Workshop Information Technology and Systems (WITS '03)
  contributor:
    fullname: li
– volume: 2
  start-page: 34
  year: 2005
  ident: bibttk200804053217
  article-title: Fingerprinting Relational Databases: Schemes and Specialties
  publication-title: IEEE Trans Dependable and Secure Computing
  doi: 10.1109/TDSC.2005.12
  contributor:
    fullname: li
– ident: bibttk200804053222
  doi: 10.1109/TKDE.2004.94
– year: 2007
  ident: bibttk20080405321
– ident: bibttk20080405323
  doi: 10.1109/18.705568
– ident: bibttk20080405327
  doi: 10.1145/335168.335172
– year: 1998
  ident: bibttk200804053219
  publication-title: Theory of Linear and Integer Programming
  contributor:
    fullname: schrijver
– year: 2006
  ident: bibttk200804053213
  article-title: WATERMILL: Protecting Ownership Rights of Sales Statistics Databases through Watermarking (DEMO)
  publication-title: Proc Bases de Donn es Avanc es (BDA '06)
  contributor:
    fullname: lafaye
– ident: bibttk200804053220
  doi: 10.1109/TKDE.2007.190668
– ident: bibttk200804053223
  doi: 10.1145/780559.780561
– start-page: 134
  year: 2000
  ident: bibttk20080405329
  article-title: Error- and Collusion-Secure Fingerprinting for Digital Data
  publication-title: Proc Third Int'l Workshop Information Hiding (IH '99)
  contributor:
    fullname: guth
– start-page: 157
  year: 2003
  ident: bibttk20080405322
  article-title: Watermarking Relational Data: Framework, Algorithms and Analysis
  publication-title: VLDB J
  contributor:
    fullname: agrawal
– year: 2001
  ident: bibttk20080405325
  publication-title: Digital Watermarking
  contributor:
    fullname: cox
– ident: bibttk200804053211
  doi: 10.1080/01621459.1963.10500830
– volume: 1973
  start-page: 316
  year: 2001
  ident: bibttk20080405324
  article-title: Why and Where: A Characterization of Data Provenance
  publication-title: Proc Eighth Int'l Conf Database Theory (ICDT '01)
  contributor:
    fullname: buneman
– ident: bibttk200804053215
  doi: 10.1145/947380.947398
SSID ssj0008781
Score 2.086651
Snippet This paper presents a walermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints...
Fingerprinting applications, for which several distinct watermarks need to be computed, benefit from the reduced computation time of our method that...
his paper presents a watermarking/fingerprinting system for relational databases. It features a built-in declarative language to specify usability constraints...
SourceID hal
proquest
crossref
pascalfrancis
ieee
SourceType Open Access Repository
Aggregation Database
Index Database
Publisher
StartPage 532
SubjectTerms Algorithm design and analysis
Algorithms
Applied sciences
Computation
Computer programs
Computer Science
Computer science; control theory; systems
Constraint optimization
Data processing. List processing. Character string processing
database fingerprinting
database watermarking
Detection algorithms
Exact sciences and technology
Fingerprint recognition
Fingerprinting
Information systems. Data bases
Integer linear programming
Integers
Linear programming
Memory and file management (including protection and security)
Memory organisation. Data processing
Open source software
optimization
Relational databases
Security and Privacy Protection
Software
Source code
Spatial databases
Strategy
Studies
Usability
Watermarking
Title Watermill: An Optimized Fingerprinting System for Databases under Constraints
URI https://ieeexplore.ieee.org/document/4378379
https://www.proquest.com/docview/912300166
https://search.proquest.com/docview/34718346
https://search.proquest.com/docview/875058546
https://hal.science/hal-01185453
Volume 20
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3BTtwwEB2xnNpDaaFVA5RaqJdKZMkSJ7Z7WxVWq5ZtL6Byi5zYFlUhi0iWA1_PjJ1EpbRSb1HiSInHnjfPHs8D-JBZUeWlrGKEDxtzYWSsS-PizHKEE2Q-1tJ6x-JbPj_nXy6yizU4GM7CWGt98pkd06XfyzfLakVLZYc8Fcin1AhGQqlwVmvwulJ4QVJkF8iJUi76LclEHZ59PT4JxQoR_cQkfQRBo0tKgPTKKpQXqRvsGhc0LZ64Z485sw1Y9F8bUk1-jVdtOa7u_yjk-L-_8xJedMEnm4bR8grWbL0JG72wA-vm-SY8_61K4RYsfmifMnN19YlNa_Ydncz1z3tr2MwvCdLKIOVOs1D8nGEUzI51qwkfG0Zn1G4ZyYJ6MYq2eQ3ns5Ozz_O4U2GIKz4RbezQaLnlmXFOG64rZ9ANOJkanRtOaoBcKl0KVyYukdpiSJU79JkZ10dlYpAAv4H1elnbt8ASlWhpBZIkejXLdeqkm0jkmEe6EjyL4GNvmOImFNsoPElJVEFGJM1MUQQjRrCPlhuaUZXs-fS0oHt0mBYDw_RuEsEWdfvQquvxCPYeGXp4jtGQ4ojXEez0li-6Od0UCkGeIuQ8gvfDU5yMtMOia7tcNUVKUJ9ybMH-0QLpYYIMjefbf_-0HXgWMlIoN2gX1tvblX2HYU9b7vnx_gBX1v8K
link.rule.ids 230,315,783,787,799,888,27938,27939,55088
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB215QA9UGhBDYXWQlyQyDbbOLHDbUW7WuhuuWxFb5YT2wJRsqjJcuivZ8ZOIsqHxC1KHCnx2PPm2eN5AK8yK6q8lFWM8GFjLoyMdWlcnFmOcILMx1pa71hc5LNL_uEqu9qAN8NZGGutTz6zI7r0e_lmVa1pqeyYpwL5VLEJ9zKKK8JprcHvSuElSZFfICtKueg3JZPieHl-ehbKFSL-iXF6B4Q2P1MKpNdWocxI3WDnuKBq8YeD9qgz3YFF_70h2eTraN2Wo-r2t1KO__tDj-BhF36ySRgvj2HD1ruw00s7sG6m78L2L3UK92DxSfukmevrt2xSs4_oZr59ubWGTf2iIK0NUvY0C-XPGcbB7FS3mhCyYXRK7YaRMKiXo2ibJ3A5PVu-m8WdDkNc8bFoY4dmyy3PjHPacF05g47AydTo3HDSA-Sy0KVwZeISqS0GVblDr5lxfVImBinwU9iqV7XdB5YUiZZWIE2iV7Ncp066sUSWeaIrwbMIXveGUd9DuQ3laUpSKDIiqWYKFYwYwUu03NCM6mTPJnNF9-g4LYaG6Y9xBHvU7UOrrscjOLxj6OE5xkMFR8SO4KC3vOpmdaMKhHmKkfMIjoanOB1pj0XXdrVuVEpgn3Jswf7RAglighyN58_-_mlHcH-2XMzV_P3F-QE8CPkplCn0HLbam7V9gUFQWx76sf8T0gQCZg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Watermill%3A+An+Optimized+Fingerprinting+System+for+Databases+under+Constraints&rft.jtitle=IEEE+transactions+on+knowledge+and+data+engineering&rft.au=Lafaye%2C+Julien&rft.au=Gross-Amblard%2C+David&rft.au=Constantin%2C+Camelia&rft.au=Guerrouani%2C+Meryem&rft.date=2008-04-01&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1041-4347&rft.volume=20&rft.issue=4&rft.spage=532&rft.epage=546&rft_id=info:doi/10.1109%2FTKDE.2007.190713&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=oai_HAL_hal_01185453v1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1041-4347&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1041-4347&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1041-4347&client=summon