首页    期刊浏览 2025年12月05日 星期五
登录注册

文章基本信息

  • 标题:A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS
  • 本地全文:下载
  • 作者:ABD. S. ALFAGI ; A. ABD. MANAF ; B. A. HAMIDA
  • 期刊名称:Journal of Theoretical and Applied Information Technology
  • 印刷版ISSN:1992-8645
  • 电子版ISSN:1817-3195
  • 出版年度:2016
  • 卷号:84
  • 期号:3
  • 出版社:Journal of Theoretical and Applied
  • 摘要:In this paper, we present a new zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. Most existing fragile watermarking schemes introduce errors or permanent distortion into the original database content. These distortions violate the integrity of the database consequently the database quality and usability are degraded. Although, some fragile schemes are able to authenticate the database integrity and detect the malicious modifications made on the database but they are either tuples or attributes ordering based and unable to characterize the attack, identify the type of attack, identify the tampered data and locating the tampered tuples. In addition, most existing fragile schemes are based on LSB or MSB in generating the watermark unlike to this scheme, which is based on local characteristics of the relation itself such as frequencies of characters and text length in generating the watermark. This scheme is serviceable for sensitive and insensitive textual relational database since it does not introduce any error into the original contents. In addition, this scheme overcomes the weaknesses of data integrity violate, data usability and data quality degradation. The experimental results show the ability of proposed scheme in authenticating the database relation as well as the ability of characterize the attack, identifying the changed data and locating the text that affected by the malicious modification without depend on tuples and attributes ordering.
  • 关键词:Database Watermarking; Fragile Watermarking Scheme; Robust Watermarking Scheme; Tamper Detection; and Authentication
国家哲学社会科学文献中心版权所有