Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 31, Issue 3 (2020)
  4. A Reversible Hiding Technique Using LSB ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • Cited by
  • More
    Article info Full article Related articles Cited by

A Reversible Hiding Technique Using LSB Matching for Relational Databases
Volume 31, Issue 3 (2020), pp. 481–497
Min-Shiang Hwang   Ming-Ru Xie   Chia-Chun Wu  

Authors

 
Placeholder
https://doi.org/10.15388/20-INFOR411
Pub. online: 6 May 2020      Type: Research Article      Open accessOpen Access

Received
1 July 2018
Accepted
1 March 2020
Published
6 May 2020

Abstract

Data hiding technique is an important multimedia security technique and has been applied to many domains, for example, relational databases. The existing data hiding techniques for relational databases cannot restore raw data after hiding. The purpose of this paper is to propose the first reversible hiding technique for the relational database. In hiding phase, it hides confidential messages into a relational database by the LSB (Least-Significant-Bit) matching method for relational databases. In extraction and restoration phases, it gets the confidential messages through the LSB and LSB matching method for relational databases. Finally, the averaging method is used to restore the raw data. According to the experiments, our proposed technique meets data hiding requirements. It not only enables to recover the raw data, but also maintains a high hiding capacity. The complexity of our algorithms shows their efficiencies.

References

 
Adam, N.R., Worthmann, J.C. (1989). Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21, 515–526.
 
Agrawal, R., Kiernan, J. (2002). Watermarking relational databases. In: Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 155–166.
 
Bhesaniya, M., Rathod, J.N., Thanki, K. (2014). Various approaches for watermarking of relational databases. International Journal of Engineering Science and Innovative Technology, 3, 215–220.
 
Camara, L., Li, J., Li, R., Xie, W. (2014). Distortion-free watermarking approach for relational database integrity checking. Mathematical Problems in Engineering, 2014, 10.
 
Chen, H.F., Chang, C.C., Chen, K.M. (2020). Reversible data hiding schemes in encrypted images based on the paillier cryptosystem. International Journal of Network Security, 22, 523–533.
 
Chen, X., Guo, W. (2020). Reversible data hiding scheme based on fully exploiting the orientation combinations of dual stego-images. International Journal of Network Security, 22, 126–135.
 
Chen, Y., Lin, J.Y., Chang, C.C., Hu, Y.C. (2020). Low-computation-cost data hiding scheme based on turtle shell. International Journal of Network Security, 22, 296–305.
 
Dwivedi, A.K., Sharma, B.K., Vyas, A.K. (2014). Watermarking techniques for ownership protection of relational databases. International Journal of Emerging Technology and Advanced Engineering, 4, 368–375.
 
Franco-Contreras, J., Coatrieux, G., Cuppens, F., Cuppens-Boulahia, N., Roux, C. (2014). Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Transactions on Information Forensics and Security, 9, 397–410.
 
Gupta, G., Pieprzyk, J. (2009). Database relation watermarking resilient against secondary watermarking attacks. In: International Conference on Information Systems Security. Springer, Berlin, Heidelberg, pp. 222–236.
 
Hanyurwimfura, D., Liu, Y., Liu, Z. (2010). Text format based relational database watermarking for non-numeric data. In: 2010 International Conference On Computer Design And Appliations, ICCDA 2010. IEEE, pp. V4-312–V4-316.
 
Iftikhar, S., Kamran, M., Anwar, Z. (2015). RRW - a robust and reversible watermarking technique for relational data. IEEE Transactions on Knowledge and Data Engineering, 27, 1132–1145.
 
Kamran, M., Suhail, S., Farooq, M. (2013). A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Transactions on Knowledge and Data Engineering, 25, 2694–2707.
 
Ke, C.H., Wang, M.S. (2006). A Study of Watermarking in Relational Database. Department of Engineering Science. National Cheng Kung University, Taiwan.
 
Khanna, S., Zane, F. (2000). Watermarking maps: hiding information in structured data. In: Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, San Francisco, California, USA, pp. 596–605.
 
Li, Y., Swarup, V., Jajodia, S. (2003). Constructing a virtual primary key for fingerprinting relational data. In: Proceedings of the 3rd ACM Workshop on Digital Rights Management, Washington, DC, USA. ACM pp. 133–141.
 
Li, Y., Guo, H., Jajodia, S. (2004). Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, Washington DC, USA, ACM, pp. 73–82.
 
Lu, T.C., Tseng, C.Y., Wu, J.H. (2015a). Dual imaging-based reversible hiding technique using lsb matching. Signal Processing, 108, 77–89.
 
Lu, T.C., Wu, J.H., Huang, C.C. (2015b). Dual-image-based reversible data hiding method using center folding strategy. Signal Processing, 115, 195–213.
 
Mehta, B.B., Rao, U.P. (2011). A novel approach as multi-place watermarking for security in database. In: Int’l Conf. Security and Management, San Diego, California, USA, SAM, pp. 703–707.
 
Melkundi, S., Chandankhede, C. (2015). A robust technique for relational database watermarking and verification. In: 2015 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, India. IEEE, pp. 1–7.
 
Mielikainen, J. (2006). LSB matching revisited. IEEE Signal Processing Letters, 13, 285–287.
 
Mohanpurkar, A.A., Joshi, M.S. (2011). Applying watermarking for copyright protection, traitor identification and joint ownership: A review. In: 2011 World Congress on Information and Communication Technologies (WICT). IEEE, pp. 1014–1019.
 
Sudhan, S.H., Kalaiarasan, C. (2017). Study on sorting algorithm and position determining sort. International Research Journal of Engineering and Technology (IRJET), 4(7),
 
Taneja, S., Khanna, S., Tilwalia, H. (2014). A review on privacy preserving data mining: techniques and research challenges. International Journal of Computer Science and Information Technologies, 5, 2310–2315.
 
Tendick, P., Matloff, N. (1994). A modified random perturbation method for database security. ACM Transactions on Database Systems, 19, 47–63.
 
Xie, M.R., Wu, C.C., Shen, J.J., Hwang, M.S. (2016). A survey of data distortion watermarking techniques for relational databases. International Journal of Network Security, 18, 1022–1033.
 
Zhang, Y., Yang, B., Niu, X.M. (2006). Reversible watermarking for relational database authentication. Journal of Computers, 17, 59–66.

Biographies

Hwang Min-Shiang
mshwang@asia.edu.tw

M.-S. Hwang received MS in industrial engineering from National Tsing Hua University, Taiwan in 1988; and PhD degree in computer and information science from National Chiao Tung University, Taiwan in 1995. He was a professor and chairman of the Department of Management Information Systems, NCHU, during 2003–2009. He was also a visiting professor at the University of California (UC), Riverside and UC. Davis (USA) during 2009–2010. He was a distinguished professor of Department of Management Information Systems, NCHU, during 2007–2011. He obtained the 1997, 1998, 1999, 2000, and 2001 Excellent Research Award of National Science Council (Taiwan). Dr. Hwang was a dean of College of Computer Science, Asia University (AU), Taichung, Taiwan. He is currently a chair professor with Department of Computer Science and Information Engineering, AU. His current research interests include information security, electronic commerce, database and data security, cryptography, image compression, and mobile computing. Dr. Hwang has published over 300+ articles on the above research fields in international journals.

Xie Ming-Ru

M.-R. Xie received his MS in management information systems from National Chung Hsing University, Taiwan in 2016. He had worked in IT industry in Taiwan for ten years. He is currently a PhD degree student at the Department of Computer Science, National Chiao Tung University, Taiwan. His current research interests include database security, information security, and digital image techniques.

Wu Chia-Chun
ccwu0918@nqu.edu.tw

C.-C. Wu received a PhD degree from the Department of Computer Science and Engineering, National Chung-Hsing University, Taichung, Taiwan, in 2011. He is currently an associate professor at the Department of Industrial Engineering and Management, National Quemoy University, Kinmen County, Taiwan. His current research interests include database security, secret image sharing, mobile applications development, and digital image techniques.


Full article Related articles Cited by PDF XML
Full article Related articles Cited by PDF XML

Copyright
© 2020 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
reversible data hiding database security right protection ownership protection

Funding
This study was supported by the National Science Council of Taiwan under grant MOST 108-2410-H-468-023 and MOST 108-2622-8-468-001-TM1.

Metrics
since January 2020
1629

Article info
views

783

Full article
views

893

PDF
downloads

290

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy