1 Watermarking Relational Databases Acknowledgement: Mohamed Shehab from Purdue Univ.

Slides:



Advertisements
Similar presentations
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Advertisements

Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Digital Signatures and Hash Functions. Digital Signatures.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Watermarking Relational Databases Rakesh Agrawal and Jerry Kiernan.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY CMPT 820 : Error Mitigation Schaar and Chou, Multimedia over IP and Wireless Networks: Compression,
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Watermarking Relational Databases CSC 574/474 Information System Security.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Image Watermarking For Tampering Protection and Self-Recovery
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Chapter 11 Message Authentication and Hash Functions.
Detection of Image Alterations Using Semi-fragile Watermarks
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Intro to Cryptography Lesson Introduction
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Watermarking Relational Databases
Cryptographic Hash Function
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking with Side Information
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
A Watermarking Scheme for Categorical Relational Databases
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Spread Spectrum Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Theoretical Analysis of Digital Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Watermarking with Side Information
Digital Watermarking Lecture 2
Presentation transcript:

1 Watermarking Relational Databases Acknowledgement: Mohamed Shehab from Purdue Univ.

2 Outline Introductory Material General Watermarking Model & Attacks WM Technique 1 (Agrawal et al.) WM Technique 2 (Sion et al.) Future Challenges and References

3 What is Watermarking ? A “watermark” is a signal that is securely, imperceptibly, and “robustly” embedded into original content such as an image, video, or audio signal, producing a watermarked signal. The watermark describes information that can be used for proof of ownership or tamper proofing.

4 What is Watermarking ? (Cont.) Robust Watermark: for proof of ownership, copyrights protection. Fragile Watermark: for tamper proofing, data integrity. Robust Fragile Watermark

5 Why Watermarking ? Digital Media (Video, Audio, Images, Text) are easily copied and easily distributed via the web. Database outsourcing is a common practice:  Stock market data  Consumer Behavior data (Walmart)  Power Consumption data  Weather data Effective means for proof of authorship.  Signature and data are the same object. Effective means of tamper proofing.  Integrity information is embedded in the data.

6 Why is Watermarking Possible ? Real-world datasets can tolerate a small amount of error without degrading their usability  Meteorological data used in building weather prediction models, the wind vector and temperature accuracies in this data are estimated to be within 1.8 m/s and 0.5 ºC.  Such constraints bound the amount of change or alteration to that can be performed on the data.

7 What defines the usability constraints ? Usability constraints are application dependent.  Alterations performed by the watermark embedding should be unidentifiable by the human visual system in images/video.  For consumer behavior data: watermarking should preserve periodicity properties of the data.

8 Courtesy of What defines the usability constraints ? (Cont.)

9 Watermark Desirable Properties Detectability (Key-Based System)  Can be easily detected only with the knowledge of the secret key. Robustness  Watermark cannot be easily destroyed by modifying the watermarked data. Imperceptibility  Presence of the watermark is unnoticeable. Blind System  Watermark detection does not require the knowledge of the original data.

10 Outline Introductory Material General Watermarking Model & Attacks WM Technique 1 (Agrawal et al.) WM Technique 2 (Sion et al.) Future Challenges and References

11 Watermarking Model Attacker Channel Watermark Decoder Watermark Encoder Secret Key, Ks Data, D Watermarked Data, D W Attacked Data, D’ W Watermark W=( ….) Decoded Watermark W D =( ….)

12 Relational and multimedia data A multimedia object consists of a large number of bits, with considerable redundancy. Thus, the large watermark hiding bandwidth. The relative spatial/temporal positioning of various pieces of a multimedia object typically does not change. Tuples of a relation on the other hand constitute a set and there is no implied ordering between them. Portions of a multimedia object cannot be dropped or replaced arbitrarily without causing perceptual changes in the object. However, a pirate of a relation can simply drop some tuples or substitute them with tuples from other relations.

13 Attacker Model Attacker has access to only the watermarked data set. The attacker’s goal is to weaken or even erase the embedded watermark and at the same time keep the data usable. “Attacker’s Dilemma” Possible Attacks  Tuple deletion  Tuple alteration  Tuple insertion

14 Outline Introductory Material General Watermarking Model & Attacks WM Technique 1 (Agrawal et al.) WM Technique 2 (Sion et al.) Future Challenges and References

15 WM Technique 1 (Agrawal et. al.) Watermarking of numerical data. Technique dependent on a secret key. Uses markers to locate tuples to hide watermark bits. Hides watermark bits in the least significant bits.

16 WM Technique 1: Encoder Attacker Channel Watermark Decoder Watermark Encoder Secret Key, Ks Data, D Watermarked Data, D W Attacked Data, D’ W Watermark W=( ….) Decoded Watermark W D =( ….) Instead: Watermark is a function of the data and the secret key

17 WM Technique 1: Encoder Assumptions  K, e, m and v are selected by the data owner and are kept secret.  “K” is the secret key.  “e” least significant bits can be altered in a number without affecting its usability. Example, e=3,  “m” used for marker selection and 1/m is fraction of tuples marked  “v” is the number of attributes used in the watermarking process.

18 Message Authentication Code One way hash function H operates on an input message M of arbitrary length and returns a fixed length of has value h. Three characteristics  Given M, it is easy to compute h  Given h, it is hard to compute M  Give M, it is hard to find another message M’ such that H(M) = H(M’) A message authentication code (MAC) is a one-way has function that depends on a key. MAC(r.P) = MAC(r.P) = H(K || MAC(K||r.P) r.P is the primary key attribute of relation r, K is a secret key known only to owner, and output is an integer value in a wide range.

19 WM Technique 1: Encoder For all tuples r in D  MAC(r.P) = MAC(r.P) = H(K || MAC(K||r.P)  if(MAC(r.P) mod m == 0) // Marker Selection i = (MAC(r.P) mod v// Selected Attribute b = (MAC(r.P) mod e// Selected LSB index if((MAC(r.P) mod 2 == 0)// MAC is even  Set bit b of r.A i Else  Clear bit b of r.A i

20 WM Technique 1 : Encoder MAC mod m (MAC mod v=1 PKey Attribute 0 Attribute 1 ……….Attribute v MAC mod e MAC is MAC(K || MAC(K || r.P))

21 WM Technique 1 : Decoder Attacker Channel Watermark Decoder Watermark Encoder Secret Key, Ks Data, D Watermarked Data, D W Attacked Data, D’ W Watermark W=( ….) Decoded Watermark W D =( ….)

22 WM Technique 1 : Decoder Match = Total_Count = 0 For all tuples r in D  r.MAC = H(K||r.P||K)  if(r.MAC mod m == 0) // Marker Selection Total_Count++ i = r.MAC mod v// Selected Attribute b = r.MAC mod e// Selected LSB index if(r.MAC mod 2 == 0)// MAC is even  if bit b of r.A i is Set  Match++ Else  If bit b of r.A i is Clear  Match++ Compare (Match/Total_count) > Threshold

23 WM Technique 1 : Decoder MAC mod m MAC mod v PKey Attribute 0 Attribute 1 ……….Attribute v MAC mod e MAC is MAC(K || MAC (K || r.P))

24 WM Technique 1 : Strengths Computationally efficient O(n)  Tuple sorting not required. Incremental Updatability

25 WM Technique 1 : Weaknesses No provision of multi-bit watermark, all operations are dependent only on the secret key. Not resilient to alteration attacks. Least Significant Bit (LSB) can be easily manipulated by simple numerical alterations  Shift LSB bits to the right/left. Requires the presence of a primary key in the watermarked relation. Does not handle other usability constraints such as:  Category preserving usability constraints.

26 Outline Introductory Material General Watermarking Model & Attacks WM Technique 1 (Agrawal et al.) WM Technique 2 (Sion et al.) Future Challenges and References

27 WM Technique 2 :(Sion et. al.) Watermarking of numerical data. Technique dependent on a secret key. Instead of primary key uses the most significant bits of the normalized data set. Divides the data set into partitions using markers. Varies the partition statistics to hide watermark bits.

28 WM Technique 2 : Encoder Attacker Channel Watermark Decoder Watermark Encoder Secret Key, Ks Data, D Watermarked Data, D W Attacked Data, D’ W Watermark W=( ….) Decoded Watermark W D =( ….)

29 WM Technique 2: How to hide a single bit in a number set ? Problem: “ Given a number set S i = {s 1,…,s n }, how to vary their statistics to embed bit b i. Subject to the provided usability constraints.”

30 Paper 2: How to hide a single bit in a number set ? ref Definitions   = mean(S i )   = stdev(S i ).  ref =  + c , c is a confidence factor  Vc(S i ) = number of points greater than ref. We refer to them as ”positive violators”.

31 Paper 2: How to hide a single bit in a number set ? 0 |S i |*V false |S i |*V true |S i | Bit = 0 Bit = 1 Invalid ref Insert b i = 0 Insert b i = 1

32 WM Technique 2: How to avoid using the primary key ? Given a number set S i = {s 1,…,s n }, generate Norm(Si) = S i / max(S i ). For each number in s k in Norm(Si) use the first n most significant bits (MSB) as the primary key for s k.

33 WM Technique 2 : Encoder Step 1: (Sorting)  Compute the MAC of each tuple: r.MAC = H(K || r.P || K) // r.P = MSB(r.A)  Sort tuples in ascending order using the computed MAC. Step 2: (Partitioning)  Locate markers: tuples with r.MAC mod m = 0  Tuples between two markers are in the same partition. Step 3: (Bit Embedding):  Embed a watermark bit in each partition using the bit embedding technique discussed earlier.

34 WM Technique 2 : Encoder Step 1 Sort Ascending According to MAC Step 2 Locate Markers r.MAC mod m = 0 Step 3 Bit Embedding

35 WM Technique 2 : Decoder Attacker Channel Watermark Decoder Watermark Encoder Secret Key, Ks Data, D Watermarked Data, D W Attacked Data, D’ W Watermark W=( ….) Decoded Watermark W D =( ….)

36 WM Technique 2 : Decoder Step 1: (Sorting & Partitioning)  Partition data set using the same approach used in the encoding phase. Step 2: (Bit Detection)  For each partition S i compute V c (S i ) and decode the embedded bit. Step 3: (Majority Voting):  Watermark bits are embedded in several partitions use majority voting to correct for errors.

37 WM Technique 2 : Decoder Watermarked Data Set |S i |*V false |S i |*V true |S i | Bit = 0 Bit = 1 Invalid ref Majority Voting

38 WM Technique 2 : Strengths Bit embedding technique honors usability constraints. Embeds watermark in data statistics which makes technique more resilient to alteration attacks compared with Least Significant Bits (LSB).

39 WM Technique 2 : Watermark Synchronization Error (Tuple Addition) W0W0 W1W1 W2W W result Watermarked Data Set W0W0 W1W1 W2W W result

40 WM Technique 2 : Watermark Synchronization Error (Tuple Deletion) W0W0 W1W1 W2W W result W0W0 W1W1 W2W x00 101x01 Watermarked Data Set

41 Paper 2: Weaknesses Watermark suffers badly from watermark synchronization error cause by  Tuple deletion attacks.  Tuple addition attacks. No optimality criteria when choosing the decoding thresholds  Errors even in absence of attacker. No clear systematic approach for manipulating data  Only a very small space of the feasible data manipulations investigated.

42 Outline Introductory Material General Watermarking Model & Attacks WM Technique 1 (Agrawal et al.) WM Technique 2 (Sion et al.) Future Challenges and References

43 Challenges Investigate watermarking other types of data. Such as data streams. Design robust watermarking techniques that are resilient to watermark synchronization errors. Design a fragile watermarking technique for relational databases.

44 References J. Kiernan, R. Agrawal, "Watermarking Relational Databases," Proc. 28th Int'l Conf. Very Large Databases VLDB, Radu Sion, Mikhail Atallah, Sunil Prabhakar, "Rights Protection for Relational Data," IEEE Transactions on Knowledge and Data Engineering, Volume 16, Number 6, June 2004

45 Questions?