İlişkisel veri tabanlarında XML veriler için Homoglif dönüşüm tabanlı damgalama

Bilgi Teknolojilerindeki hızlı gelişim son zamanlarda İnternet üzerinden veri paylaşımını kolaylaştırmıştır. Dijital verilerin izinsiz olarak kopyalanması veya değiştirilmesi telif hakkı koruma sorununu beraberinde getirmiştir. Kriptografi hassas bilgileri güvenli bir şekilde paylaşmak için kullanılsa bile şifrelenmiş bilgiler orijinal veri ile ilişkilendirilemediğinden telif hakkı koruma sürecinde kullanılamazlar. Dijital haklar yönetiminde son zamanlarda sayısal damgalama yöntemleri kullanılmaktadır. Özel hazırlanmış gizli bilgileri veya damgayı sayısal ortama gizleme yöntemleri verilerin korunmasında ve sahiplik bilgilerinin belirlenmesinde ek güvenlik mekanizması sağlamaktadırlar. Çoklu ortam dosyalarındaki hak yönetimi için önerilen algoritmalar, veri tabanları üzerinde doğrudan uygulanamamaktadır. Veri tabanı damgalama için kullanılan yöntemlerden bazıları, ilişkide yer alan XML veri alanlarından faydalanmaktadır. Bu çalışmada XML alanlar üzerinde Homoglif Dönüşüm tabanlı yeni bir algoritma önerilmektedir. Birincil anahtar ve özüt fonksiyonu veri tabanında damgalanacak satırların seçiminde kullanılmıştır. Sonuçlar, önerilen yöntemin literatürdeki diğer yöntemlerle karşılaştırıldığında yüksek damgalama kapasitesinde çeşitli ataklara karşı iyileştirilmiş sağlamlık elde ettiğini göstermektedir.

Homoglyph transformation based watermarking for XML data in relational databases

Rapid developments in Information Technologies have eased data sharing through the Internet recently. Copying or modification of digital data without permission and sharing by unauthorized users have brought copyright protection problem. Even though cryptography can be used to share sensitive information securely, it cannot be used to protect copyright since encrypted information cannot be associated with the original. Digital watermarking methods are used lately in digital rights management. Methods to hide specially crafted secret information or watermark into digital media provide additional security mechanism in protecting the data and determining the ownership information. Algorithms recommended for right management in multimedia files cannot be applied directly on databases. Some methods used for watermarking databases take advantage of Extensible Markup Language (XML) data fields attached. A new method based on Homoglyph Transformation in XML fields is proposed in this manuscript. Primary key and hash algorithm are used together in the selection of lines to be watermarked in the database. Results indicate improved robustness against various attacks in high watermarking capacity by the proposed method compared to other methods reported in the literature.

___

  • Agrawal R, Haas PJ, Kiernan J. “Watermarking relational data: framework, algorithms and analysis”. The International Journal on Very Large Data Bases, 12(2), 157-169, 2003.
  • Gupta G, Pieprzyk J. “Database relation watermarking resilient against secondary watermarking attacks”. 5th International Conference on Information Systems Security, Kolkata, India, 14-18 December 2009.
  • Zhang Y, Niu X, Zhao D. “A method of protecting relational databases copyright with cloud watermark”. International Journal of Information and Communication Engineering, 1, 337-341, 2005.
  • Guo F, Wang J, Zhang Z, Ye X, Li D. “An improved algorithm to watermark numeric relational data”. 6th International Workshop on Information Security Applications, Jeju Island, Republic of Korea, 22-24 August 2005.
  • Huang M, Cao J, Peng Z, Fang Y. “A new watermark mechanism for relational data”. 4th International Conference on Computer and Information Technology, Wuhan, China, 16 September 2004.
  • Hu T, Chen G, Chen K, Dong J. “Garwm: towards a generalized and adaptive watermark scheme for relational data”. 6th International Conference in Advances in Web-Age Information Management, Hangzhou, China, 11-13 October 2005.
  • Sion R. “Proving ownership over categorical data”. 20th International Conference on Data Engineering, Mass, USA, 30 March-2 April 2004.
  • Sion R, Atallah M, Prabhakar S. “Rights protection for categorical data”. IEEE Transactions on Knowledge and Data Engineering, 17(7), 912-926, 2005.
  • Wang C, Wang J, Zhou M, Chen G, Li D. “Atbam: an arnold transform based method on watermarking relational data”. International Conference on Multimedia and Ubiquitous Engineering, Beijing, China, 24-26 April 2008.
  • Zhou X, Huang M, Peng Z. “An additive-attack-proof watermarking mechanism for databases copyrights protection using image”. ACM Symposium on Applied Computing, Seoul, Republic of Korea, 11-15 March 2007.
  • Al-Haj A, Odeh A. “Robust and blind watermarking of relational database systems”. Journal of Computer Science, 4(12), 1024-1029, 2008.
  • Wang H, Cui X, Cao Z. “A speech based algorithm for watermarking relational databases”. International Symposiums on Information Processing, Moscow, Russia, 23-25 May 2008.
  • Li Y, Guo H, Jajodia S. “Tamper detection and localization for categorical data using fragile watermarks”. 4th ACM Workshop on Digital Rights Management, Washington, DC, USA, 25 October 2004.
  • Kamel I. “A schema for protecting the integrity of databases”. Computers and Security, 28(7), 698-709, 2009.
  • Khataeimaragheh H, Rashidi H. “A novel watermarking scheme for detecting and recovering distortions in database tables”. International Journal of Database Management Systems, 2(3), 1-11, 2010.
  • Hamadou A, Sun X, Gao L, Shah SA. “A fragile zero-watermarking technique for authentication of relational databases”. International Journal of Digital Content Technology and its Applications, 5(5), 189-200, 2011.
  • Rizzo SG, Bertini F, Montesi D. “Content-preserving Text watermarking through unicode homoglyph substitution”. 20th International Database Engineering & Applications Symposium, Montreal, Canada, 11-13 July 2016
  • The Unicode Consortium. “Unicode Security Mechanisms for UTR”. http://www.unicode.org/Public/security/10.0.0/confusables.txt (20.06.2018).
  • Guo F, Wang J, Zhang Z, Li D. “A new scheme to fingerprint XML data”. International Workshop on Knowledge Discovery from XML Documents, 9 April 2006.
  • Inoue S, Makino K, Murase I, Takizawa O, Matsumoto T, Nakagawa H. “A proposal on information hiding methods using XML”. First NLP and XML Workshop, Tokyo, Japan, 30 November 2001.
  • Wilfred Ng, Ho-Lam L. “Effective approaches for watermarking XML data”. International Symposium on Database Systems for Advanced Applications, Beijing, China, 17-20 April 2005.
  • Fellbaum C. WordNet: An Electronic Lexical Database. Cambridge, Massachusetts, The MIT Press, 1998.
  • Wen Q, Wang Y, Li P. “Two zero-watermark methods for XML documents”. Journal of Real-Time Image Processing, 14(1), 183-192, 2016.
  • Saad M. “An optimized fingerprinting system for tamper proof and copy control of XML documents”. International Conference of Soft Computing and Pattern Recognition, Paris, France, 7-10 December 2010.
  • Saad M. “New system to fingerprint extensible markup language documents using winnowing theory”. The Institution of Engineering and Technology Signal Processing, 6(4), 348-357, 2012.
  • Ronghua Y, Qijun Z, Hongtao L. "A novel watermark algorithm for integrity protection of XML documents". International Journal of Computer Science and Network Security, 6(2), 202-207, 2006.
  • Tchokpon R, Nadia B. “Robust XML watermarking using fuzzy queries”. Institute of Electrical and Electronics Engineers 36th International Conference on Computer Software and Applications Workshops, 16-20 July 2012.