Teacher : Hsien-Chu Wu Student : Hsiao-yun Tseng, Chen-ying Lai Speaker : Hsiao-yun Tseng Date : May 10, 2006 Database Temper Detection Techniques Based.

Slides:



Advertisements
Similar presentations
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Advertisements

1 Watermarking Relational Databases Acknowledgement: Mohamed Shehab from Purdue Univ.
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
CSCE101 –Chapter 8 Thursday, November 30, Compression MP3 players – MP3 is a compression technology that reduces the size of an audio file to 1/10.
Data at the Core of the Enterprise. Objectives  Define of database systems  Introduce data modeling and SQL  Discuss emerging requirements of database.
Overview of SQL Server Alka Arora.
Reading Workshop in the Middle School Classroom BY Haley Walter Webb Bridge Middle School Alpharetta, Georgia.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
11 3 / 12 CHAPTER Databases MIS105 Lec15 Irfan Ahmed Ilyas.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia.
ITGS Databases.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Modeling MongoDB with Relational Model Proposed by Christopher Polanco.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Introduction to Database Management System 電機三 趙上鋒.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Setting Up Your Journal. Front of first page Table of Contents DateSubject/ItemPage # 2/16/05 Journal Entries 1.
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes Authors : I-Shi Lee and.
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend:
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
A Secret Information Hiding Scheme Based on Switching Tree Coding
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Information needed for citing sources:
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
Mean value based reversible data hiding in encrypted images
An efficient reversible data hiding method for AMBTC compressed images
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
High Capacity Data Hiding for Grayscale Images
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Digital Watermarking for Image Authentication with Localization
Efficient Huffman Decoding
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Title Introduction: Discussion & Conclusion: Methods & Results:
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Source : Digital Signal Processing. Vol. 73, pp , Feb
Lossless Data Hiding in the Spatial Domain for High Quality Images
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Hiding Information in VQ Index Tables with Reversibility
Authors:Bijan G. Mobasseri、Domenick Cinalli
Presentation transcript:

Teacher : Hsien-Chu Wu Student : Hsiao-yun Tseng, Chen-ying Lai Speaker : Hsiao-yun Tseng Date : May 10, 2006 Database Temper Detection Techniques Based on Digital Watermarking

2 Outline Introduction Two proposed Methods Method I – for binary watermarks Method II – for grey watermarks Experimental results Conclusions

3 Introduction Data warehouse Market analysis innocent victim payment Stop The purposes of database watermarking: avoid data destroyed and tort malicious damage

4 Produce the certification code Database P Att. A 1 Att. A 2 … Att. A N 1A 11 A 12 …A 1N 2A 21 A 22 …A 2N 3A 31 A 32 …A 3N …………… feature C watermark WM' ⊕ certification code S Key DB SD + Internet SD P Key certification code P Att. A 1 Att. A 2 … Att. A N 1A 11 A 12 …A 1N 2A 21 A 22 …A 2N 3A 31 A 32 …A 3N …………… T T feature C' ⊕ watermark WM'' verification process

5 Method I – for binary watermarks Produce the certification code(1/4) WM WM = ECC(WM,S ) WM S=M×N M : Total tuples of the database N : Total attributes of the database

6 Method I – for binary watermarks Produce the certification code(2/4) group NO.B_nameDateamountprice 1 Harry potter 11/ The Da Vince Code 12/ Digital fortess 12/ Little women 12/ The world is Flat 12/ …………… = 5 × 200 mod 2 = 1000 mod 512 = ANS. A i,j = A i,j =P i A i,j mod 2 fetch the feature C i,j

7 Method I – for binary watermarks Produce the certification code(3/4) C i,j (A i,j ) C i,j (A i,j ) = ( 不成立 ) ( 成立 ) ANS. C i,j (A i,j ) = 1 NO.B_nameDateamountprice 1Harry potter11/ The Da Vince Code 12/ Digital fortess 12/ Little women 12/ The world is Flat 12/ …………… Feature 1

8 Method I – for binary watermarks Produce the certification code(4/4) WM feature C ⊕ certification code AK S Key Database SD + Internet

9 Method I – for binary watermarks The verification process of database integrity Database SD + Internet SD P Key certification code AK T group fetch the feature feature C ⊕ WM  A i,j * =P i * A i,j  mod 2 C i,j (A i,j * )

10 Method I – for binary watermarks Experimental results(1/2) NO.B_nameDateamountprice 1 Harry potter 11/ The Da Vince Code 12/ Digital fortess 12/ Little women 12/ The world is Flat 12/ Emulation experiment  Database : the trade of the network bookstore  table : Book  tuples :  attributes : Book (NO., B_name, Date, amount, price) ‧ the amount of values :  4 =40000

11 Method I – for binary watermarks Experimental results(2/2) original watermark Exp. 1 : revise the front 500 B_name Exp. 2 : revise the last 500 price Result : find out 390 values to be destroyed Result : find out 498 values to be destroyed The accuracy rate is 78%. The accuracy rate is 99%.

12 Method II – for grey watermarks Produce the certification code(1/3) watermark WM with size   ×   N : total tuples of the database original watermark P Att. A 1 Att. A 2 … Att. A N 1A 11 A 12 …A 1N 2A 21 A 22 …A 2N 3A 31 A 32 …A 3N …………… tuples N =   = 100

13 Method II – for grey watermarks Produce the certification code(2/3) P Att. A 1 Att. A 2 … Att. A N 1A 11 A 12 …A 1N 2A 21 A 22 …A 2N 3A 31 A 32 …A 3N …………… T M i = MD5 (t i ) … … Mi =Mi = … … ⊕ b i = {0 ~ 63 bits of M i } … XiXi X i mod 256 C i f i = {64 ~127 bits of M i }

14 Method II – for grey watermarks Produce the certification code(3/3) feature C ⊕ certification image R SD Database SD + Internet S Key

15 Method II – for grey watermarks The verification process of database integrity Database SD + Internet SD P Key certification image R T fetch the feature C feature C ⊕

16 Method II – for grey watermarks Experimental results(1/4) Emulation experiment  Database Source : ProQuest Digital Dissertations (PQDD)  Build a table in Microsoft SQL 2000 Sever  Attributes : (Index, Publication number, Title, Author, Degree, School, Pages, Date, Digital formats) original watermark (30 × 30) designed watermark ( 100 × 100 )

17 Method II – for grey watermarks Experimental results(2/4) Exp. 1 : revise 30 Publication numbers Result : find out 3 clear hashes and 30 tuples to be destroyed The accuracy rate is 100%. Exp. 2 : revise the front 2000 Author Result : find out the clear hashes on the top half fetched watermark and 1,991 tuples to be altered The accuracy rate is 99.55%.

18 Method II – for grey watermarks Experimental results(3/4) Exp. 3 : revise the last 3000 Pages Result : find out the clear hashes on the foot half fetched watermark and 2,991 tuples to be altered The accuracy rate is 99.7 %. Exp. 4 : delete Digital Formats attribute and replace with Degree attribute Result : find out the clear hashes on the whole fetched watermark and 9,965 tuples to be altered The accuracy rate is %.

19 Method II – for grey watermarks Experimental results(4/4) AttackAccuracy rate small alteration100% character alteration99.55% numerical alteration99.7% huge alteration99.65%. Average99.725%

20 The proposed methods prove the integrity of the database and preserve a lossless database In the future, we can hide SD in the database and restore an lossless database. It means to design a reversible database watermarking technique. Conclusions

21 ~ Thank You ~