A Database Watermarking Technique for Temper Detection
Meng-Hsiun Tsai 0, Hsiao-Yun Tseng, Chen-Ying Lai
0National Chung Hsing University
Available Online October 2006.
- https://doi.org/10.2991/jcis.2006.206How to use a DOI?
- database watermarking, digital watermarking, the authentication of integrity.
- People pay much attention to the technology of data mining recently and more and more research institutions begin to buy the databases to analyze. If it doesn’t concern customer’s secrets the enterprises would also like to sell their data warehouse to do the research. Therefore, it becomes an important subject to prove the integrity of the database. This paper discusses about using the digital watermarking and the public authentication mechanism to strengthen the verification of integrity of the database. First, MD5 hash algorithm is used to fetch a database feature. Second, making XOR operation of database feature and digital watermarking gets a certification number. At last, using the secret key encrypts the certification number and makes public in the network with the database. Before using this database, user needs to use database owner’s public key to decrypt the ciphertext to get the certification number. Then making XOR operation of database feature fetched by MD5 algorithm and certification number gets a watermark. Finally, user can rely on the integrity of fetched watermark to understand whether the database is destroyed or not.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Meng-Hsiun Tsai AU - Hsiao-Yun Tseng AU - Chen-Ying Lai PY - 2006/10 DA - 2006/10 TI - A Database Watermarking Technique for Temper Detection BT - 9th Joint International Conference on Information Sciences (JCIS-06) PB - Atlantis Press SP - 468 EP - 471 SN - 1951-6851 UR - https://doi.org/10.2991/jcis.2006.206 DO - https://doi.org/10.2991/jcis.2006.206 ID - Tsai2006/10 ER -