Survey on relational database watermarking techniques

Digital watermarking has been in multimedia data use over the past years. Recently it has become applicable in relational database system not only to secure copyright ownership but also to ensure data contents integrity. Further, it is used in locating tampered and modified places. However, the...

Full description

Bibliographic Details
Main Authors: Alfagi, abdalrahman, Manaf, Azizah, Hamida, Belal Ahmed, Khan, Sheroz, Elrowayati, Ali
Format: Article
Language:English
English
Published: Asian Research Publishing Network (ARPN) 2016
Subjects:
Online Access:http://irep.iium.edu.my/49746/
http://irep.iium.edu.my/49746/
http://irep.iium.edu.my/49746/1/SURVEY_ON_RELATIONAL_DATABASE_WATERMARKING_TECHNIQUES.pdf
http://irep.iium.edu.my/49746/4/49746_SURVEY%20ON%20RELATIONAL%20DATABASE%20WATERMARKING%20TECHNIQUES_Scopus.pdf
Description
Summary:Digital watermarking has been in multimedia data use over the past years. Recently it has become applicable in relational database system not only to secure copyright ownership but also to ensure data contents integrity. Further, it is used in locating tampered and modified places. However, the watermarkingrelational database has its own requirements, challenges, attacks and limitations. This paper, surveys recent database watermarking techniques focusing on the importance of watermarking relational database, the difference between watermarking relational database and multimedia objects, the issues in watermarking relational database, type of attacks on watermarked database, classifications, distortion introduced and the embedded information. The comparative study shows that watermarking relational database can be an effective tool for copyright protection, tampered detection, and hacker tracing while maintaining the integrity of data contents. In addition, this study explores the current issues in watermarking relational database as well as the significant differences between watermarking multimedia data and relational database contents. Finally, it provides a classification of database watermarking techniques according to the way of selecting the candidate key attributes and tuples, distortion introduced and decoding methods used.