LÀZARO PÈREZ GORT, Maikel, Martina OLLIARO, Claudia FEREGRINO URIBE and Agostino CORTESI. Preventing Additive Attacks to Relational Database Watermarking. In Petr Doucek, Josef Basl, A Min Tjoa, Maria Raffai, Antonin Pavlicek, Katrin Detter. 13th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2019. Prague, Czech Republic: Springer, 2019, p. 131-140. ISBN 978-3-030-37631-4. Available from: https://dx.doi.org/10.1007/978-3-030-37632-1_12.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Preventing Additive Attacks to Relational Database Watermarking
Authors LÀZARO PÈREZ GORT, Maikel (guarantor), Martina OLLIARO (380 Italy, belonging to the institution), Claudia FEREGRINO URIBE and Agostino CORTESI (380 Italy).
Edition Prague, Czech Republic, 13th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2019, p. 131-140, 10 pp. 2019.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Switzerland
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
RIV identification code RIV/00216224:14330/19:00116390
Organization unit Faculty of Informatics
ISBN 978-3-030-37631-4
ISSN 1865-1348
Doi http://dx.doi.org/10.1007/978-3-030-37632-1_12
UT WoS 000613129200012
Keywords in English Additive attack; False ownership claim; Relational data; Robust watermarking
Tags International impact
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 14/5/2021 07:06.
Abstract
False ownership claims are carried on through additive and invertibility attacks and, as far as we know, current relational watermarking techniques are not always able to solve the ownership doubts raising from the latter attacks. In this paper, we focus on additive attacks. We extend a conventional image-based relational data watermarking scheme by creating a non-colluded backup of the data owner marks, the so-called secondary marks positions. The technique we propose is able to identify the data owner beyond any doubt.
PrintDisplayed: 12/10/2024 15:36