A Database Watermarking Technique for Temper Detection
- DOI
- 10.2991/jcis.2006.206How to use a DOI?
- Keywords
- database watermarking, digital watermarking, the authentication of integrity.
- Abstract
People pay much attention to the technology of data mining recently and more and more research institutions begin to buy the databases to analyze. If it doesn’t concern customer’s secrets the enterprises would also like to sell their data warehouse to do the research. Therefore, it becomes an important subject to prove the integrity of the database. This paper discusses about using the digital watermarking and the public authentication mechanism to strengthen the verification of integrity of the database. First, MD5 hash algorithm is used to fetch a database feature. Second, making XOR operation of database feature and digital watermarking gets a certification number. At last, using the secret key encrypts the certification number and makes public in the network with the database. Before using this database, user needs to use database owner’s public key to decrypt the ciphertext to get the certification number. Then making XOR operation of database feature fetched by MD5 algorithm and certification number gets a watermark. Finally, user can rely on the integrity of fetched watermark to understand whether the database is destroyed or not.
- Copyright
- © 2006, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Meng-Hsiun Tsai AU - Hsiao-Yun Tseng AU - Chen-Ying Lai PY - 2006/10 DA - 2006/10 TI - A Database Watermarking Technique for Temper Detection BT - Proceedings of the 9th Joint International Conference on Information Sciences (JCIS-06) PB - Atlantis Press SP - 468 EP - 471 SN - 1951-6851 UR - https://doi.org/10.2991/jcis.2006.206 DO - 10.2991/jcis.2006.206 ID - Tsai2006/10 ER -