Analysis of Vulnerability of Keys in a Watermarking System for Attack Susceptibility

Vulnerability of Keys in a Watermarking System

Authors

  • Wahid Rehman Department of Computing and Technology, Iqra University, Islamabad, Pakistan
  • Aihab Khan Department of Computing and Technology, Iqra University, Islamabad, Pakistan
  • Basheer Ahmad Department of Management Sciences, Iqra University, Islamabad, Pakistan

Keywords:

Watermark, dataset security, key-based attack, single key multiple datasets (SKMDs), multiple keys single dataset (MKsSD)

Abstract

Recent research brought up numerous techniques for copyright protection and tamper proofing of relational databases along with proof of robustness, etc. However, these techniques are short of presenting a generalized method for susceptible key-based attacks. In this research, we proposed a framework for the analysis of watermarking system against susceptibility to key attacks. We identified two primary concepts of attack models, SKMDs (Single Key Multiple Datasets) and MKsSD (Multiple Keys Single Dataset). These attack models make variants of single and multiple datasets by the usage of single and multiple keys for watermark insertion. The relationship between various pairs of original and watermarked datasets is then statistically analyzed to determine the linearity among datasets. The strength of the attack models is measured by multivariate and discriminant analysis methods like Wilks’ lambda, Pillai’s trace test, and Box’s M test. The empirical analysis shows that MKsSD model in a watermarking system has high significance as compared to SKMDs. We conclude that SKMDs model is more vulnerable to key-based attacks than MKsSD model even by varying watermarking system parameters.

References

Agrawal, R., P.J. Haas, & J. Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12(2):157-169 (2003).

Lafaye, J. An analysis of database watermarking security. In: Third IEEE International Symposium on Information Assurance and Security (IAS 2007), Manchester, United Kingdom, 29 August, 2007, p. 462-467 (2007).

Khanduja, V, P. Verma, & S. Chakraverty. Watermarking relational databases using bacterial foraging algorithm. Multimedia Tools and Applications 74(3): 813-839 (2015).

Khan, A., & Husain. A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. The Scientific World Journal https://www.hindawi.com/journal/tswj/2013/796726/ (2013).

Melkundi, S., & C. Chandankhede. A robust technique for relational database watermarking and verification. In: Communication, Information & Computing Technology (ICCICT), International Conference IEEE, Mumbai, India, 15 January - 17 January, 2015, p. 1-7 (2015).

Camara, L., J. Li, R.Li, F. Kagorora, & D. Hanyurwimfura. Block-based scheme for database integrity verification. International Journal of Security and Its Applications 8(6): 25-40 (2014).

Sruthi, N., A.V. Sheetal, & V. Elamaran. Spatial and spectral digital watermarking with robustness evaluation. In: Computation of Power, Energy, Information and Communication (ICCPEIC), International Conference IEEE, Chennai, India, 16 April – 17 April, 2014, p. 500-505 (2014).

Rohith, S., K.H. Bhat, & B. K. Sujatha. A secure and robust digital image watermarking scheme using repetition codes for copyright protection. In: Advances in Electronics, Computers and Communications (ICAECC). International Conference IEEE, Bangalore, India, 10 October – 11 October, 2014, p. 1-8 (2014).

Dhar, P. K, & I. Echizen. Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio Data. In: Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), Seventh International ConferenceIEEE, Shanghai Songjiang, China, 26 July – 28 July, 2011, p. 181-184 (2011).

Gupta, G., J. Pieprzyk, & L. Hamey. Bucket attack on numeric set watermarking model and safeguards. Information Security Technical Report 16.2: 59-66 (2011).

Sion, R., M. Atallah, & S. Prabhakar. On watermarking numeric sets. In: Digital Watermarking, Springer, Berlin, p. 130-146 (2003).

Pournaghshband, V. A new watermarking approach for relational data. In: Proceedings of the 46th Annual Southeast Regional Conference (ACM), United States, 28 March, 2008, p. 127-131 (2008).

Zhang, L., W. Gao, N. Jiang, L. Zhang, & Y.Zhang. Relational databases watermarking for textual and numerical data. In: Mechatronic Science, Electric Engineering and Computer (MEC), International Conference IEEE, Jilin, China, 19 August - 22 August, 2011, p. 1633-1636 (2011).

Khadim, U., A. Khan, B. Ahmad & A. Khan Information Hiding in Text to Improve Performance for Word Document. International Journal of Technology and Research 3(3): 50 (2015).

Maheshwari, J. Prasad, M. Kumar, G. Mathur, R.P. Yadav, & R.K. Kakerda. Robust digital image watermarking using DCT based pyramid transform via image compression. In: Communications and Signal Processing (ICCSP), International Conference IEEE, Melmaruvathur, India, 02 April – 04 April, 2015, p. 1059-1063 (2015).

Munesh C., S. Pandey,& R. Chaudhary. Digital watermarking technique for protecting digital images. In: Computer Science and Information Technology (ICCSIT), Third IEEE International Conference on, Beijing, China, 09 July - 11 July, 2010, vol. 7, p. 226-233 (2010).

Kavipriya, R., & S. Maheswari. Statistical quantity based reversible watermarking for copyright protection of digital images. In: Green Computing Communication and Electrical Engineering (ICGCCEE). International Conference IEEE, Coimbatore, India, 06-08 March, 2014, p. 1-6 (2014).

Hu, H.Tsu, & L.Y.Hsu. Robust, transparent and high-capacity audio watermarking in DCT domain. Signal Processing 109: 226-235 (2015).

Patra, J. C., A. Karthik, & C. Bornand. A novel CRT-based watermarking technique for authentication of multimedia contents. Digital Signal Processing 20.2: 442-453 (2010).

Iwakiri, M. & T. M. Thanh. Fragile watermarking based on incomplete cryptography for copyright protection. Applied Informatics 2(1): 1-20 (2015).

Hoang, T., D. Tran, & D. Sharma. Remote multimodal biometric authentication using bit priority-based fragile watermarking. In: Pattern Recognition. 19th International Conference, IEEE, Tampa, FL, USA, 08 Dec - 11 Dec, 2008, p. 1-4 (2008).

Wang, J.-T., W.-H. Yang, P.C. Wang, &.-T. Chang. A novel chaos sequence based 3D Fragile Watermarking Scheme. In: Computer, Consumer and Control (IS3C), International Symposium, IEEE, Taichung, Taiwan, 10 Jun - 12 Jun, 2014, p.745-748 (2014).

Qian, Q., H.X. Wang, Y. Hu, L.N. Zhou, & J.F. Li. A dual fragile watermarking scheme for speech authentication. Multimedia Tools and Applications 75: 1-20 (2015).

Fu, Y., T. Ye, Z. Qu, X. Niu, & Y. Yang. A Novel Relational Database Watermarking Algorithm for Joint Ownership. In: Intelligent Information Hiding and Multimedia Signal Processing. International Conference, IEEE, Harbin, China, 15August -17 August, 2008, p. 985-988 (2008).

Singh, A., M. K. Dutta, C. M. Travieso, & K. M. Soni. Digital right management control for joint ownership of digital images using biometric features. In: Signal Processing and Integrated Networks (SPIN), International Conference. IEEE, Noida, India, 20 February - 21 February, 2014, p.164-167 (2014).

Field, A. Discovering statistics Using SPSS. Sage Publications, Los Angeles (2009).

https://archive.ics.uci.edu/ml/datasets/Covertype.

Published

2021-04-30

How to Cite

Rehman, W. ., Khan, A. ., & Ahmad, B. . (2021). Analysis of Vulnerability of Keys in a Watermarking System for Attack Susceptibility: Vulnerability of Keys in a Watermarking System. Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, 54(1), 55–70. Retrieved from http://ppaspk.org/index.php/PPAS-A/article/view/256

Issue

Section

Articles