Database relation watermarking resilient against secondary watermarking attacks

Gaurav Gupta*, Josef Pieprzyk

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

30 Citations (Scopus)


There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

Original languageEnglish
Title of host publicationInformation Systems Security - 5th International Conference, ICISS 2009, Proceedings
EditorsAtul Prakash, Indranil Sen Gupta
Place of PublicationBerlin; Heidelberg
PublisherSpringer, Springer Nature
Number of pages15
Volume5905 LNCS
ISBN (Print)3642107710, 9783642107719
Publication statusPublished - Dec 2009
Event5th International Conference on Information Systems Security, ICISS - 2009 - Kolkata, India
Duration: 14 Dec 200918 Dec 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5905 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349


Other5th International Conference on Information Systems Security, ICISS - 2009


Dive into the research topics of 'Database relation watermarking resilient against secondary watermarking attacks'. Together they form a unique fingerprint.

Cite this