• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party

    2022-11-09 08:16:36AhmedAlghamdiSurayyaNazAmmarSaeedEesaAlSolamiMuhammadKamranandMohammedSaeedAlkatheiri
    Computers Materials&Continua 2022年1期

    Ahmed S.Alghamdi,Surayya Naz,Ammar Saeed,Eesa Al Solami,Muhammad Kamran,*and Mohammed Saeed Alkatheiri

    1Department of Cybersecurity,College of Computer Science and Engineering,University of Jeddah,KSA

    2Abdul Wali Khan University,Mardan,Pakistan

    3Department of Computer Science,COMSATS University Islamabad,Wah Campus,Wah Cantt,Pakistan

    Abstract:With widespread use of relational database in various real-life applications,maintaining integrity and providing copyright protection is gaining keen interest of the researchers.For this purpose,watermarking has been used for quite a long time.Watermarking requires the role of trusted third party and a mechanism to extract digital signatures(watermark)to prove the ownership of the data under dispute.This is often inefficient as lots of processing is required.Moreover,certain malicious attacks,like additive attacks,can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting their own set of watermarks from the same data.To solve this problem,we propose to use blockchain technology—as trusted third party—along with watermarking for providing a means of rights protection of relational databases.Using blockchain for writing the copyright information alongside watermarking helps to secure the watermark as changing the blockchain is very difficult.This way,we combined the resilience of our watermarking scheme and the strength of blockchain technology—for protecting the digital rights information from alteration—to design and implement a robust scheme for digital right protection of relational databases.Moreover,we also discuss how the proposed scheme can also be used for version control.The proposed technique works with nonnumeric features of relational database and does not target only selected tuple or portion(subset)from the database for watermark embedding unlike most of the existing techniques;as a result,the chances of subset selection containing no watermark decrease automatically.The proposed technique employs zerowatermarking approach and hence no intentional error(watermark)is added to the original dataset.The results of the experiments proved the effectiveness of the proposed scheme.

    Keywords: Watermarking;blockchain;digital copyright protection;relational databases security

    1 Introduction

    Due to ever-improving availability and efficiency of the Internet,sharing of digital data such as text,databases,images,videos,and software has become very common across the globe.Data may also be outsourced for educational,commercial,or official purposes.Accordingly,it can be redistributed in an unauthorized manner.An attacker (Mallory) can make changes to that data and redistribute it using different channels pretending being the owner of that data.So,protecting the data from such kind of misuse and protecting ownership of actual owner becomes challenging.It may also affect the owner of digital products financially.Existing methods,like watermarking,offer a variety of ways for protecting the digital data from such breaches.Similarly,emerging technologies like blockchain are also finding their way for utilizing their strong features for providing a firewall for data breaches [1,2].New classes of utilization have emerged including blockchain and cooperative examination,including information forming,fork semantics,alter proof or any blend thereof.They present new open doors for capacity frameworks to productively support such applications [3,4].

    Database systems are being used in many real-life applications.Sometimes,authors need to outsource their databases across Internet or using other medium.The data in relational database is first stored and later evaluated and is prone to the problem of piracy and copyright violation and false ownership claims [5].As watermarking of multimedia objects is comparatively mature field and a lot of related work is available in this area,many techniques are available to deal with copyright issue of multimedia products efficiently including cryptography,steganography,blockchain,and watermarking.By using blockchain and watermarking,the actual owner of the data can be identified easily and efficiently [6,7].

    While there are many techniques proposed to deal with the digital rights (or ownership rights) protection of relational databases,the researchers of the database fields are also showing their interest recently to use the idea of watermarking and blockchain together for the copyright protection of the relational databases.The main scope of blockchain is to give value to Internet transactions.They can also be used to timestamp digitized documents so that it is not possible to tamper them [8].

    The watermarking and blockchain based techniques can be used for robust copyright marking that provided us the motivation for our proposed work.More specifically,the motivation behind our proposed work is that current techniques handle some of the attacks but with little probability of survival against strong subset attacks.Moreover,they often require the role of a trusted third party (TTP) to address the ownership dispute of the underlying data.For instance,consider a scenario where a userU1 is the owner of DataD.He embeds his WatermarkW1 inDto createD’and shares it with some other users.Now,if another userU2 acts as malicious attacker and inserts his watermarkWM2 inD’to createD”which is essentially a tampered copy ofD’.In case of ownership dispute overD”,the userU1 extracts his watermark from it and the userU2 can also extract his watermark fromD”because he has also inserted his watermark inD’to createD”.Now the dispute arises:who is the actual owner of data D”? To solve this issue,we get the motivation to use blockchain to store digital watermark information because blockchain can help to detect tampering and store time stamps.Accordingly,blockchain can be used to know who watermarked the data first and thus the actual owner of the data (D”in this case) can be identified.So,we use blockchains to act as TTP to store watermark (or ownership) information.

    Another challenge for enforcing right protection on digital data is to preserve the usability of the data that may be compromised while embedding the watermark as copyright information in the original data that brings distortions in the data [9-11].Furthermore,the extraction of watermark should neither require the original data or the embedded watermark to make it a blind system.In this context,this work presents a robust distortion-free blind database watermarking technique particularly targeting resilience against subset attacks while most of the algorithms presented in the literature for digital rights protection are distortion based and introduce errors to the original data while in some applications the maintenance of the quality is of high priority.Fig.1 shows a top-level architecture of a basic watermarking system.

    Figure 1:Basic watermarking system

    Blockchains (see Fig.2) are progressively perceived as an option in contrast to conventional information base frameworks for value-based information and dataset stockpiling.However,to be an achievable substitution to the,as of now,prevailing social information bases for the undertaking use,blockchains should likewise guarantee that honesty constraints hold for their put away information and for the interrelationships between such information passages [8].These trustworthiness limitations guarantee exactness and consistency of information over its life cycle and are significant parts of the plan,execution,and utilization of information base arrangements.For this,we use the strong security features of blockchain alongside watermarking for providing digital protection of relational data.

    Figure 2:Basic blockchain system

    The idea of using blockchain along with watermarking can also help in version control of the databases as the newly added block can facilitate making different versions of the data.Database version control is versioning of objects stored in the database using a snapshot.At first,a snapshot of these objects which contains information about parameters of object is stored in the database.To store next version of the database,first version of the database object is replaced by its newest version of and previous snapshot of database is replaced by the newest one [12].For this purpose,we propose to use blockchain to store time stamp information of latest copy (version) of the database.This is another contribution of the proposed work towards copyright protection of the database which can also be used for version control.Without the loss of generality,in our work,we use alpha numeric features as almost all the databases have at least one alpha numeric column in a table.However,since our technique does not bring any distortion to the original dataset;therefore,it can also be easily modified to use it with columns having other data types (for instance,numeric) as well.Moreover,certain malicious attacks like additive attacks can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting their own set of watermarks from the same data.To solve this problem,we take the advantage of the strength of use blockchain technology—as TTP—along with watermarking for providing a means of rights protection of relational databases.Adopting blockchain for writing the copyright information alongside watermarking helps to secure the watermark as changing the blockchain is very difficult.This way,we combined the resilience of our watermarking scheme and the strength of blockchain technology—for protecting the digital rights information from alteration—to design and implement a robust scheme for digital right protection of relational databases.

    In a nutshell,the major contributions of this paper are: (i) we propose a distortion-free relational database watermarking technique based for addressing dispute of digital rights while preserving the data quality;(ii) we store the watermark as digital rights information in blockchain to utilize its strength of protecting the watermark from tampering;(iii) we provide a mechanism for using the proposed technique for version control of the database;and (iv) we use various attacks to test the resilience of proposed scheme against malicious attacks.

    The rest of the paper is organized as follows.Section 2 discusses related work in the concerned domain.The proposed technique has been presented in Section 3 with Section 4 providing experimental details for showing the effectiveness of the proposed technique.Section 5 concludes the paper with some highlights to the future direction.

    2 Related Work

    Although the research on watermarking of relational databases started almost two decades ago in 2002,the application of same idea alongside blockchain technology is new.The idea of relational database watermarking was given for the first time in 2002 by Agrawal et al.[13] who suggested that the database copyright protection can be achieved by inserting hidden ‘marks’into the relational database.This research got the attention of the researchers all over the world.After the work of [13] idea for watermarking relational database for the first time and its extension in [14],many researchers proposed their various algorithms for preserving relational database integrity.For instance,Hu et al.[15] suggested the use of an image as watermarks by proposing a technique in which an image is embedded into the relational data as copyright information.The image is considered as a sequence of 0’s and 1’s.The given method of using image proved to be correct,feasible,and robust and it supported easy watermarking identification for ownership claim.Pournaghshband [16] proposed a technique which embeds watermark information in the form of fake tuples inserted into the database.Although this technique is robust against different forms of malicious attacks;however,it requires the use of TTP for solving the ownership dispute.Moreover,the authors did not consider the additive attack where the attacker can watermark the already watermark dataset to claim the ownership of the data.

    In a recent technique in [17],Farah et al.proposed a database watermarking technique that works for numeric as well as non-numeric databases.They provide their scheme as a service to provide robust ownership protection.However,they do not consider using the blockchain to reduce the role of TTP.Sahoo et al.[18] introduced a blockchain-technology based technique that uses the idea of controlling the number of users who can access the underlying data.However,this scheme does not itself focus on making the watermarking scheme robust enough to be robust against malicious attacks.Such techniques are not applicable in blockchain based database environment where the number of users is high and the watermarking scheme is required to provide robustness against malicious attacks.

    Some recent works like [1,4,19,20] using blockchain and watermarking for ownership rights management cannot be used on relational databases because the watermarking of relational databases itself is different from other data formats as the part of a database (subset of the original database) is often useful as opposed to other data formats like images etc.While on the other hand,our proposed work works for relational databases.In [21],authors proposed a method of database watermarking using image with a focus on preventing additive attacks that create an ownership dispute when an already watermarked database is watermarked again.But again,this technique does not provide any mechanism to reduce the role of TTP for resolving ownership dispute.The works presented in [22-24] also present various recent techniques for ownership protection and user identification.But none of them considered any requirement to reduce the role of TTP for resolving ownership dispute.Furthermore,they also do not focus on the requirement of version control of the database.This further strengthens our motivation for our work to fill these missing gaps.

    A technique in [25] uses blockchain for detecting tampering in the databases and does not provide any mechanism for solving ownership dispute for digital rights management.Another closely relevant technique in [26] uses blockchain technology for watermarking big data but it is focused on transfer of ownership and does not focus on version control of the underlying data.All the above techniques provide ownership protection mechanism for databases without using blockchain-based technology working both for: (i) digital right protection of the database;and (ii)version control of the database.On the other hand,the focus of the proposed technique is to use blockchain for enhancing the robustness of the database watermarking technique and also using the timestamp information stored in the blockchain to make versions of data after some new data is added into the databases.We believe that this is another novelty of the proposed scheme.

    3 Proposed Methodology

    In our proposed methodology,we present an algorithm that divides the whole database into groups (subsets) based on median occurred letter in the whole table.For the ease of the readers,we list the major symbols used in this paper in Tab.1.

    We generate a letter’s occurrence table (LOT) that shows the occurrence of each letter in the data.The median occurred letter is calculated from the table.This median occurred letter is used as group separator to divide the whole data into groups.Then the most occurred letters i.e.,1st,2nd,3rd,4th,and 5thMOLT (most occurred letters table) is created,and a secret key is generated using this MOLT.This key is also part of digital rights information and is stored in blockchain—thus reducing the use of CA (certifying authority) which usually acts the role of TTP—along with date and time stamp.If a suspicious database needs to be verified for data ownership rights,this digital rights information (secret key and watermark) can be used for addressing the dispute of data ownership.The overall architecture of the proposed technique has been presented in Fig.3.

    Table 1:Definitions of symbols used in the paper

    Figure 3:Architecture of proposed scheme

    Before going into the details of the proposed scheme,we define some basic parameters that we use at various stages of the proposed scheme.

    Watermark:It is security information which is being inserted in the original data to maintain the copyright protection.In the proposed technique,watermark is a string of letters provided as input to the algorithm which helps in generating secret key.

    Watermarking:It is the process of embedding the watermarks into the actual data.But here we are not actually embedding the watermarks into the data and we just use the watermark to generate the key.We use all the tuples of the database table to ensure the robustness of embedded watermark because if an attacker attacks a subset of the watermarked data,the rest of the data can be sued to extract the embedded watermark.

    TTP or CA:In traditional watermarking systems,it is a neutral third party with which an author (or data owner) can register his work with date and time stamp.The proposed technique minimizes the use of TTP by utilizing the strong security feature of blockchain technology by storing the data ownership related information in it.In this way,we ensure the robustness of the proposed scheme.

    LOT:It is the list that contains the number of times each letter occurs in a given string.By removing digits and special characters from the given string,it is converted to a string of English letters only.The frequency of each letter in this string is used to generate LOT.

    Groups Separator (GS):It is the median value of occurrence of letters which is calculated from the values in the LOT.GS is used as group separator to divide the whole data into groups.Suppose the median value of all the values in the list of letter occurrence is 155.We will see in the list which letter’s occurrence value is equal to 155.Suppose in the list ‘n’is the letter which occurred 155 in the whole data.So ‘n’is our GS,and the data will be partitioned based on value of ‘n’.

    MOLT:It keeps the most occurred values.After dividing the whole string data based on GS,the 1stmost occurred letter,2ndmost occurred letter and 3rdmost occurred letter is found.A table called MOLT (Most Occurred Letter Table) is created where the three most occurred letters for each group are stored.

    Secret Key:The Secret key is generated by logically inserting the watermark in the data during the watermark embedding process.

    Shifting:Shifting of a letter occurs when a specific letter in the watermark is not found in the MOLT.And after that,the shifted letter is searched for.

    The proposed technique consists of a two-phase process.First,in the Embedding phase,watermark is inserted in the table to generate the secret key while in the watermark extraction phase watermark is extracted watermarks from the watermarked data.

    3.1 Watermark Embedding Phase

    This phase involves various steps and uses the following parameters.A tableTthat contains at least one non-numeric columns,ann-character long watermark stringWM=WM1WM2...WMn,and shift sizeSSof length 2 to 6.The various steps involved in this phase have been discussed in the following.

    3.1.1 Preprocessing

    A database sample is converted to a string of letters by removing all special symbols;digits i.e.,make it a string of English letters.The occurrence of each letter in the string (i.e.,for a-z and A-Z) is calculated.The median occurred letter in the list is the formulated which will act as a group separator for the division of the string of table values.Similarly,the Mode,and Range among the list of letter occurrence is also found.The whole string is divided based on group separator letter,into separate groups.For each group,the most occurred values are found i.e.,1stmost occurred letter,2ndmost occurred letter and 3rdmost occurred letter in that group to obtain MOLT.Algorithm 1 lists the steps of this phase.

    3.1.2 Secret Key Generation

    The secret key is generated as follows:

    Step 1:First of all,searching is performed for the letters of the watermark (WM) one by one in MOLT in the relevant columns.Next step is to searchWM1(the first letter of watermark WM)in first column of MOLT.Wherever found,the algorithm (see Algorithm 2) returns the location to the key and skip the rest of the options;otherwise,search WM1 in the second column,if found then note this location and if it is not found go to next option.Search the WM in the 3rdcolumn and if it is found then return the location to the key else go to next option.In this option,shift the WM according to the SS,add the letter “i” to the key and repeat the above procedure for the shifted letter.

    Algorithm 1 Preprocessing Require: Database Table T Ensure: MOLT Generate LOT Mode=Compute Mode (LOT)Range=Compute Range (LOT)MOL= Mode Set GS= MOL Divide the string in groups based on GS for each group do Compute 1st,2nd,3rd MOL Construct MOLT using MOL end for return MOLT

    Step 2:If the letter of WM is not found in the whole MOLT,it is shifted according to the SS.After this shifting,the process given at Step 1 is repeated for this letter too.

    Step 3:Do the same for each letterWM1toWMnof the watermark WM and return the location,separating each entry with “-”,to the key and hence generate the secret key.

    Step 4: Store the generated secret key,the Shift Size (SS),and watermark (WM) in the blockchain along with the date and time stamp.This secret key is used to verify the ownership of the data and it does not bring any change to the original data;hence the proposed watermark embedding is distortion-free.Algorithm 2 lists the steps of watermark embedding phase.

    3.2 Watermark Extraction Phase

    This section explains the steps involved in watermark extraction phase.For watermark extraction,the following parameters are given as input to the algorithm.The table for which we want to extract the watermark,Shift Size (SS) which will be the same as given at the time of embedding of watermark process,and Secret key generated at the time of insertion of watermark.

    3.2.1 Preprocessing

    The preprocessing of data at the time of extraction of watermark is same as the embedding of watermarks.The table is converted to a string of letters by removing all special symbols;digits i.e.,make it a string of pure letters.Then we find the occurrence of each letter in the string (i.e.,for a-z and A-Z).The median occurred letter in the list is calculated.Similarly,the Mode,and Range among the list of letter occurrence is also found.The whole string obtained from the basis of group separator letter is divided into separate groups.For each group,the most occurred values are found out and hence MOLT for that group is obtained.

    3.2.2 Extraction of Watermark from Data

    The extraction of the watermark is nearly the reverse process of the generation of the key.For this,the proposed scheme first reads the first character from the key and goes to that specific location.Next,it stores the letter at that position.If it includes the letteriat the start of the key then shift-back the letter to its original one and store that letter in the extracted watermark.It continues the above two steps for finding all the letters of the key in the table and return the letter to form the extracted watermarkEWM.This extracted watermark is then compared with the watermark stored in the blockchain for identification of the data owner and hence solving the data ownership dispute.The steps of this algorithm have been listed in Algorithm 3.

    Algorithm 2 Watermark Embedding Require: Database Table T,W M,SS Ensure: Secret Key MOLT=Preprocessing(T)Search letters of WM in MOLT Set found=false for each letter l of WM do Search l in 1st column of MOLT if l is found then locationl=location of l else Search l in 2nd column of MOLT end if if l is found then locationl=location of l else Search l in 3rd column of MOLT end if if l is found then locationl=location of l else Shift W M according to SS and append i in Secret Key Repeat the above steps for shifted letter end if Append locationl in Secret Key end for return Secret Key

    4 Experiments and Results

    In this section,we illustrate the details of various experiments performed on different samples of data (blocks) and their results to demonstrate the effectiveness of our proposed scheme.First,the preprocessing of the data was performed using mainly PHP WampServer.For supporting PHP,JavaScript and CSS were also used running on a Windows 7 operating system with a core i3 processor,2.0 GB of memory,and 320-GB disk drive.Some experiments were also run in python using Matplotlib package.

    4.1 Dataset

    The database we used in the experiments DBLP-Citation-network V5 was taken from arnetminer.org [27].The computer science bibliography DBLP consists of more than 1 million records of publications of about 1 million authors.As our work will consider mainly non-numeric data,we have chosen the attributes “Authors” and “Title” and make three different block sizes as mentioned in Tab.2.

    4.2 Parameter Settings

    Before discussing the results of the experiments,we list the parameters that we used for the experiments in Tab.3.Please note that shift size SS can vary from 1 to 26 (the total number of letters) but for our experiments,we used SS=3.

    Algorithm 3: Watermark Extraction Require: Database Table T,Secret Key,SS Ensure: Extracted watermark EWM MOLT=Preprocessing(T)for each character s of Secret Key do Go to locations l=Letter at locations if l== i then Shift back l to its original position according to SS and append l in EWM end if Append l in EWM end for return EMW

    Table 2:Different block sizes used in the experiments

    4.3 Robustness Analysis

    For examining the advantages of blockchain-based database technology regarding watermark security by protecting it from tampering,we evaluated the robustness of proposed watermarking scheme against subset selection attacks because the attacker may try to attack particular block(or group) of the dataset by taking a subset of the data.In subset selection attack,the attacker selects a subset from the watermarked database hoping that the subset does not contain watermark information.But our technique virtually—not physically,as the technique is distortion-free-embeds watermark in the whole table uniformly;therefore,there is no chance that the attacker selects any subset from the table that would not have the watermark.Such type of attacks can include subset selection attack,subset deletion attack,subset addition attack.In the proposed technique,we are dealing with all these three attacks collectively and calling it “subset modification attack”.

    Table 3:Parameters used in the experiments

    For testing,we selected three samples of data i.e.,small,medium,and large.Each sample is evaluated against 10%,20%,30% and 50% tuples modification attacks.Following six scenarios were used for testing the effectiveness of the proposed algorithm.

    4.3.1 Scenario 1:Modification Attack on Small Dataset(Block)

    In this set of experiments,the watermark WM1 is selected to insert it in the small size dataset block while attacking 10%,20%,30%,50% of tuples as shown in Fig.4.It is evident from this figure that when up to 20% tuples were attacked,the embedded watermark was detected with 100% accuracy.However,the decoding accuracy decreases when higher percentage of records is attacked as the embedded watermark gets disturbed (or corrupted).To investigate this effect further,we design our next experiment using watermark WM2.

    Figure 4:Modification attack on small size block watermarked with WM1

    4.3.2 Scenario 2:Modification Attack on Small Dataset(Block)

    To investigate the effect of watermark length on small sized blocks,the watermark WM2 is inserted in the small size block with the same attacks as in previous set of experiments.The watermark decoding accuracy with same sized data with larger watermark was observed to be better as shown in Fig.5.We believe that this is due to the fact that the attacker could not attack the larger watermark when targeting larger number of tuples because he has to make sure that his attacks does not affect to the watermarked data to an extent where the data usability is affected.After this experiment,we performed the experiments with larger data size to observe the resilience of proposed watermarking scheme against malicious attacks.

    Figure 5:Modification attack on small size block watermarked with WM2

    4.3.3 Scenario 3:Modification Attack on Medium Dataset(Block)

    As stated earlier,we design the experiment to investigate the effect of data (block) size on the watermark decoding accuracy.In this experiment,the watermark WM1 is inserted in the medium size block.In this experimental setup again,10%,20%,40%,and 50% tuples were attacked.Here again,we observed (see Fig.6) that if higher number of tuples are attacked,the watermark decoding accuracy deteriorates.This gave us motivation to design our next experiment with large sized watermark WM2.

    4.3.4 Scenario 4:Modification Attack on Medium Dataset(Block)

    To investigate the resilience of larger watermark WM2,in this experiment,we chose to insert it in the medium size block.But here again,as evident from Fig.7,the decoding accuracy keeps on deteriorating when more number of tuples are attacked.So,in next set of experiments,we increase the block size more.

    4.3.5 Scenario 5:Modification Attack on Large Dataset(Block)

    In this set of experiment,large sized block is selected for watermark insertion using the small watermark WM1.A similar pattern was again observed here as reported in Fig.8.So,we moved further to our final set of experiment with large sized block and larger watermark WM2.

    Figure 6:Modification attack on medium size block watermarked with WM1

    Figure 7:Modification attack on medium size block watermarked with WM2

    4.3.6 Scenario 6:Modification Attack on Large Dataset(Block)

    The final set of experiment uses the larger watermark WM2 to be inserted in the large size blocks when attacking 10%,20%,30%,and 50% of the tuples.Like previous experiments with larger watermark (WM2),this experiment again showed a similar behavior as shown in Fig.9.Next,we analyze and discuss the results of our experiments.

    4.4 Discussion on Results

    In this section,we analyze and compare the experimental results and move towards generalization.The results are compared in Tab.4 based on small block,medium block,and large block with respect to modification attack and watermark decoding accuracy for each sample size with different watermark lengths.It is evident from this table that as more number of tuples are attacked,watermark decoding accuracy decreases.However,if larger sized block is selected for watermark embedding with a large sized watermark,better decoding accuracy is achieved.Therefore,we recommend using larger sized watermark with larger sized blocks to get better resilience of embedded watermark by keeping in view the data quality to make sure that watermark embedding does not affect the data usability.Thus,the experimental results proved the robustness of the proposed scheme.Also,in case of additive attacks where the attacker—Mallory—inserts his own watermark in the watermarked database of the original owner,the watermark information,along with time stamp,stored in the blockchain can solve the ownership dispute as the data stored in blockchains is tamper free.As a result,the actual owner of the data can be identified using the ownership information (watermark) and associated time stamp stored in the blockchain.

    Figure 8:Modification attack on large size block watermarked with WM1

    Figure 9:Modification attack on large size block watermarked with WM2

    Table 4:Result comparison

    As stated earlier.Recent works like [1,4,19,20] cannot be directly used for relational databases because the watermarking of relational databases itself is different from other data formats as the part of a database (subset of the original database) is often useful as opposed to other data formats like images etc.While on the other hand,our proposed work works for relational databases.However,a closely relevant technique [26] relies on the robustness of underlying watermarking technique but it does not itself present any mechanism to enhance the security of blockchainbased database watermarking technique against malicious attacks.Moreover,it neither focuses on version control of the underlying data nor on identification of owner of the data in case a database has been watermark by more than one user.On the other hand,our proposed technique itself uses the blockchain technology to enhance the security of database in such a way that helps to: (i) identify the owner of a particular of data in case of more than one user have watermarked the same data;and (ii) facilitate the version control process by using a different watermark when the data is updated by the insertion of a new block of data.Similarly,the technique presented in [18] recommends controlling the number of users for robustness of the scheme.However,our proposed scheme does not put any limitation for number of users and is yet robust.Similarly,the technique in [25] uses blockchain for detecting tampering in the databases and does not provide any mechanism for solving ownership dispute for digital rights management.Furthermore,to the best of our knowledge,the existing traditional database watermarking techniques consider the attacks that perform one type of data modification operation (insert,delete,update) at a time while the proposed technique considers them collectively as the attacker can also launch these attacks at the same time.

    Since the proposed technique uses the blocks of data for watermark embedding,it can be used to make versions of data after some new blocks are added into the databases.In this case,by using the hash-based feature of blockchain technology,the version information of the database can be stored.So,if,after a certain number of new records have been inserted in the database,the database can be again watermarked using watermarking embedding module of the proposed technique along with storing the digital rights information in blockchain after this update in the database.Consequently,this information stored in blockchains can be used to get information about the versions of the database.We believe that this is another novel contribution of our proposed scheme.

    5 Conclusions

    Watermarking of relational database is playing a vital role in maintaining authentication,copy right protection,privacy,and integrity from last two decades.However,for taking full advantages,the watermarking techniques have yet to undergo through more challenges particularly involving the role of TTP.For this purpose,this paper presented a new blockchain technology based watermarking technique.In the proposed scheme,all the tuples in the database are used during the watermark insertion process,reducing the chances of subset selection attack.Moreover,the proposed technique is 100% distortion-free technique because it virtually inserts the watermarks in the data,and no changes are brought in the original data during watermark embedding.The technique has been further strengthened for its robustness by incorporating the concept of blockchain technology for storing the digital rights information and reducing the role of TTP.The proposed technique is restricted to non-numeric data only.In future,we are expecting to extend it by combining the same method for numeric features.In this research,the most efficient and the root cause of other attacks i.e.,subset selection attack is considered but the proposed technique can be examined for resilience against other attacks as well.Similarly,the proposed technique can be extended to deal with the security issues of very large databases and using more than one secret keys.Furthermore,the proposed technique only considers pure English letters and can be extended for special character and symbols as well in the future.

    Funding Statement: This project was supported by University of Jeddah under the Grant Number(UJ-02-014-ICGR).

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    日韩欧美精品免费久久| 2022亚洲国产成人精品| av天堂中文字幕网| 97超碰精品成人国产| 国产av麻豆久久久久久久| 亚洲欧美日韩东京热| 少妇高潮的动态图| 久久亚洲国产成人精品v| 久久鲁丝午夜福利片| 国产午夜精品论理片| 精品久久久久久久人妻蜜臀av| 国产精品电影一区二区三区| 免费看光身美女| 波野结衣二区三区在线| 九九在线视频观看精品| 亚洲人成网站在线播放欧美日韩| 国产熟女欧美一区二区| 日本-黄色视频高清免费观看| 亚洲成人久久性| 男女啪啪激烈高潮av片| 色综合亚洲欧美另类图片| 成人美女网站在线观看视频| 最近最新中文字幕大全电影3| 免费看av在线观看网站| 性欧美人与动物交配| 亚洲不卡免费看| 日韩三级伦理在线观看| 精品少妇黑人巨大在线播放 | 精品久久久久久久末码| 国产黄片视频在线免费观看| 欧美精品国产亚洲| 婷婷六月久久综合丁香| 美女黄网站色视频| АⅤ资源中文在线天堂| 国国产精品蜜臀av免费| 国产亚洲91精品色在线| 天堂√8在线中文| 日韩三级伦理在线观看| 丰满乱子伦码专区| 狂野欧美激情性xxxx在线观看| 舔av片在线| 成人午夜高清在线视频| 99久国产av精品国产电影| 成年av动漫网址| 伦精品一区二区三区| 国产精品一区二区在线观看99 | 日韩精品有码人妻一区| 菩萨蛮人人尽说江南好唐韦庄 | 久久久久久久久久成人| 国产精品人妻久久久久久| 免费看光身美女| 国产欧美日韩精品一区二区| 大又大粗又爽又黄少妇毛片口| 国产在线精品亚洲第一网站| 亚洲三级黄色毛片| 国产亚洲精品av在线| 精品久久久久久久人妻蜜臀av| 特大巨黑吊av在线直播| 美女cb高潮喷水在线观看| 日韩亚洲欧美综合| 久久精品国产亚洲网站| 国产精品蜜桃在线观看 | 国产高清三级在线| 成年av动漫网址| 亚洲成a人片在线一区二区| 99久久精品国产国产毛片| 天天躁日日操中文字幕| 免费观看人在逋| 久久久久久大精品| 99在线人妻在线中文字幕| 国产成人91sexporn| 久久精品久久久久久噜噜老黄 | 亚洲欧美日韩无卡精品| 99久久久亚洲精品蜜臀av| 精品少妇黑人巨大在线播放 | 久久久久国产网址| 亚洲国产日韩欧美精品在线观看| 精品人妻一区二区三区麻豆| 免费在线观看成人毛片| 一级毛片我不卡| 成人午夜高清在线视频| 亚洲无线在线观看| 嫩草影院精品99| 色综合站精品国产| 日本免费a在线| 亚洲婷婷狠狠爱综合网| 国内精品宾馆在线| 少妇人妻精品综合一区二区 | 一级黄片播放器| 国产精品美女特级片免费视频播放器| 可以在线观看的亚洲视频| 女的被弄到高潮叫床怎么办| 国产高清三级在线| 搞女人的毛片| 女同久久另类99精品国产91| 网址你懂的国产日韩在线| 亚洲成人av在线免费| 12—13女人毛片做爰片一| 五月伊人婷婷丁香| 99在线人妻在线中文字幕| 岛国在线免费视频观看| 嫩草影院精品99| 亚洲综合色惰| 精华霜和精华液先用哪个| 国内揄拍国产精品人妻在线| 99热只有精品国产| 国产精品爽爽va在线观看网站| 成人午夜高清在线视频| 亚洲七黄色美女视频| 丰满的人妻完整版| 婷婷色综合大香蕉| 久久婷婷人人爽人人干人人爱| 高清日韩中文字幕在线| 国产精品一区二区三区四区久久| 综合色丁香网| 国内精品宾馆在线| 在现免费观看毛片| 久久精品国产99精品国产亚洲性色| 亚洲一区高清亚洲精品| 国产高清三级在线| 国产精品一区二区三区四区免费观看| 少妇熟女aⅴ在线视频| 成年女人看的毛片在线观看| 不卡一级毛片| 日韩精品青青久久久久久| 国产不卡一卡二| 国产黄a三级三级三级人| 女人十人毛片免费观看3o分钟| 一区二区三区免费毛片| 精品久久久久久久末码| 我要看日韩黄色一级片| 精品免费久久久久久久清纯| 97热精品久久久久久| 精品无人区乱码1区二区| 高清在线视频一区二区三区 | 久久精品国产亚洲av香蕉五月| 亚洲精品成人久久久久久| 成人三级黄色视频| 久久99蜜桃精品久久| 美女大奶头视频| 色噜噜av男人的天堂激情| 一区福利在线观看| 亚洲精品成人久久久久久| 久久精品国产清高在天天线| 日本av手机在线免费观看| 欧美xxxx黑人xx丫x性爽| 男女视频在线观看网站免费| 国产黄片视频在线免费观看| 在线观看美女被高潮喷水网站| 噜噜噜噜噜久久久久久91| 久久久久久久午夜电影| 麻豆国产97在线/欧美| 久久人人爽人人爽人人片va| 国产一区亚洲一区在线观看| 国产成年人精品一区二区| 国产一区亚洲一区在线观看| АⅤ资源中文在线天堂| 国产国拍精品亚洲av在线观看| 淫秽高清视频在线观看| 国产高清有码在线观看视频| 亚洲五月天丁香| 国产真实乱freesex| 久久久久久久久久久丰满| 精品久久久久久久人妻蜜臀av| 成人亚洲欧美一区二区av| 午夜福利在线观看免费完整高清在 | 赤兔流量卡办理| 亚洲经典国产精华液单| 国产极品天堂在线| 免费不卡的大黄色大毛片视频在线观看 | 亚洲精品影视一区二区三区av| 亚洲成人久久爱视频| 又爽又黄a免费视频| 国产亚洲精品av在线| 国产成人精品久久久久久| 久久99精品国语久久久| 九九久久精品国产亚洲av麻豆| 深夜精品福利| 淫秽高清视频在线观看| 欧美性猛交黑人性爽| 舔av片在线| 日韩高清综合在线| 又爽又黄无遮挡网站| 天堂av国产一区二区熟女人妻| 插逼视频在线观看| 亚洲精品成人久久久久久| 听说在线观看完整版免费高清| 国产精品爽爽va在线观看网站| 淫秽高清视频在线观看| 最近中文字幕高清免费大全6| 好男人视频免费观看在线| 亚洲成人久久爱视频| 午夜久久久久精精品| 亚洲最大成人中文| 男人舔奶头视频| 亚洲熟妇中文字幕五十中出| 91在线精品国自产拍蜜月| 免费观看的影片在线观看| 一级av片app| 欧美高清成人免费视频www| 久久精品国产亚洲av涩爱 | 亚洲七黄色美女视频| 午夜激情福利司机影院| 亚洲丝袜综合中文字幕| 久久精品91蜜桃| 精品久久久久久久久亚洲| 国产精品av视频在线免费观看| 精华霜和精华液先用哪个| 国产精品日韩av在线免费观看| 男女视频在线观看网站免费| 99热这里只有是精品在线观看| 99热这里只有是精品50| 国产成人一区二区在线| 老熟妇乱子伦视频在线观看| 国产精品一区二区性色av| av天堂在线播放| 久久久成人免费电影| 色综合站精品国产| 久久韩国三级中文字幕| 简卡轻食公司| 非洲黑人性xxxx精品又粗又长| 一级黄片播放器| 久久久久久久久久久丰满| 三级经典国产精品| 成人毛片a级毛片在线播放| 在线观看66精品国产| 国产女主播在线喷水免费视频网站 | 哪个播放器可以免费观看大片| 亚洲综合色惰| 色综合站精品国产| 岛国在线免费视频观看| 日本一二三区视频观看| 久久精品夜色国产| 成年av动漫网址| 99精品在免费线老司机午夜| 久久久久久久久久久免费av| 身体一侧抽搐| 色噜噜av男人的天堂激情| 激情 狠狠 欧美| 麻豆成人午夜福利视频| 黄色欧美视频在线观看| 久久精品91蜜桃| 在线观看av片永久免费下载| 成人三级黄色视频| av又黄又爽大尺度在线免费看 | 18禁黄网站禁片免费观看直播| 舔av片在线| 久久久久网色| 蜜桃久久精品国产亚洲av| 久久久久免费精品人妻一区二区| 亚洲真实伦在线观看| 精品久久国产蜜桃| 久久久国产成人免费| 国产大屁股一区二区在线视频| 免费av观看视频| 欧美不卡视频在线免费观看| 永久网站在线| eeuss影院久久| 久久久精品欧美日韩精品| 国产麻豆成人av免费视频| 国产激情偷乱视频一区二区| 午夜福利高清视频| 精品久久国产蜜桃| 一个人观看的视频www高清免费观看| 性插视频无遮挡在线免费观看| 最近的中文字幕免费完整| 又爽又黄a免费视频| 两性午夜刺激爽爽歪歪视频在线观看| 欧美+亚洲+日韩+国产| 久久久精品94久久精品| 亚洲人与动物交配视频| 国产激情偷乱视频一区二区| 日韩av不卡免费在线播放| 久久久久久久久大av| 日韩成人av中文字幕在线观看| 桃色一区二区三区在线观看| 熟妇人妻久久中文字幕3abv| www日本黄色视频网| 久久久久久久午夜电影| 在现免费观看毛片| 啦啦啦观看免费观看视频高清| 国产高潮美女av| 成年女人永久免费观看视频| 少妇人妻精品综合一区二区 | 亚洲经典国产精华液单| 国产三级在线视频| 日韩欧美三级三区| 色播亚洲综合网| 桃色一区二区三区在线观看| 日韩视频在线欧美| 色哟哟哟哟哟哟| 九色成人免费人妻av| av女优亚洲男人天堂| 午夜视频国产福利| 日本与韩国留学比较| 一边亲一边摸免费视频| 99久国产av精品国产电影| 久久精品国产亚洲av天美| 国产亚洲精品av在线| 亚洲精品亚洲一区二区| 亚洲av免费在线观看| 能在线免费看毛片的网站| 欧美一级a爱片免费观看看| 国产高潮美女av| 亚洲av免费在线观看| 亚洲精品影视一区二区三区av| 色视频www国产| 免费人成在线观看视频色| 黄色日韩在线| 深夜a级毛片| 一级毛片电影观看 | 自拍偷自拍亚洲精品老妇| 九色成人免费人妻av| 亚洲va在线va天堂va国产| 国内久久婷婷六月综合欲色啪| 日韩国内少妇激情av| 两个人的视频大全免费| 国产三级中文精品| 黄色视频,在线免费观看| 精品久久久久久久末码| 人妻久久中文字幕网| 两性午夜刺激爽爽歪歪视频在线观看| 日本免费一区二区三区高清不卡| 99热网站在线观看| 亚洲aⅴ乱码一区二区在线播放| 亚洲av电影不卡..在线观看| 成年版毛片免费区| 免费电影在线观看免费观看| 在线免费十八禁| 中文字幕久久专区| 日本-黄色视频高清免费观看| 有码 亚洲区| 国产精品一二三区在线看| 亚洲在久久综合| 久久99热这里只有精品18| 日本一二三区视频观看| 麻豆一二三区av精品| 99久久精品国产国产毛片| 久久久久性生活片| 99久久人妻综合| 少妇高潮的动态图| 日本色播在线视频| 嫩草影院新地址| 日韩欧美国产在线观看| 国产成人精品久久久久久| a级毛片a级免费在线| 青春草国产在线视频 | 国产精品乱码一区二三区的特点| 日本五十路高清| 18禁在线播放成人免费| 直男gayav资源| 人体艺术视频欧美日本| 国产精品一区二区三区四区久久| 人妻系列 视频| 一个人看的www免费观看视频| 爱豆传媒免费全集在线观看| 热99re8久久精品国产| 久久久久国产网址| www日本黄色视频网| 精品久久久久久久末码| 国产大屁股一区二区在线视频| 22中文网久久字幕| 狂野欧美激情性xxxx在线观看| 国产精品一区www在线观看| 欧美变态另类bdsm刘玥| 久久人人精品亚洲av| 在线观看午夜福利视频| 久久这里有精品视频免费| 欧美日韩在线观看h| 嫩草影院入口| 高清毛片免费看| 看免费成人av毛片| 国产三级中文精品| 一级毛片久久久久久久久女| 欧美另类亚洲清纯唯美| 亚洲第一区二区三区不卡| 成人特级av手机在线观看| 成熟少妇高潮喷水视频| 在线a可以看的网站| 亚洲第一区二区三区不卡| 亚洲欧美精品专区久久| 男女边吃奶边做爰视频| 99国产精品一区二区蜜桃av| 九九爱精品视频在线观看| 精品不卡国产一区二区三区| 亚洲国产欧美在线一区| 亚洲人与动物交配视频| 欧美日韩国产亚洲二区| 男女下面进入的视频免费午夜| 午夜福利在线观看吧| 日韩大尺度精品在线看网址| 又粗又爽又猛毛片免费看| 校园人妻丝袜中文字幕| av在线老鸭窝| 大型黄色视频在线免费观看| 久久久精品欧美日韩精品| 久久精品久久久久久久性| 内射极品少妇av片p| 美女大奶头视频| 国产成人a∨麻豆精品| 日本在线视频免费播放| 精品不卡国产一区二区三区| 精品一区二区免费观看| 男插女下体视频免费在线播放| 亚洲av成人精品一区久久| 男的添女的下面高潮视频| 狂野欧美激情性xxxx在线观看| 色视频www国产| 国产毛片a区久久久久| 男女做爰动态图高潮gif福利片| 插阴视频在线观看视频| 中文字幕久久专区| 波多野结衣高清无吗| 亚洲av一区综合| 成熟少妇高潮喷水视频| 国产高潮美女av| 69av精品久久久久久| 国产精品野战在线观看| 国产精品av视频在线免费观看| 狂野欧美白嫩少妇大欣赏| 亚洲经典国产精华液单| 亚洲18禁久久av| 婷婷色av中文字幕| 亚洲成人久久性| 91久久精品国产一区二区三区| 国产精品伦人一区二区| 国产白丝娇喘喷水9色精品| 国产高清视频在线观看网站| 成年免费大片在线观看| 精品熟女少妇av免费看| 亚洲av第一区精品v没综合| 欧美最黄视频在线播放免费| 久久精品国产自在天天线| 亚洲成人久久爱视频| 人人妻人人澡人人爽人人夜夜 | 亚洲婷婷狠狠爱综合网| 亚洲无线观看免费| 免费av毛片视频| 免费看日本二区| 一进一出抽搐gif免费好疼| 日韩av在线大香蕉| 欧美最黄视频在线播放免费| 亚洲乱码一区二区免费版| 天天躁日日操中文字幕| 日本一本二区三区精品| 波多野结衣高清无吗| 日日摸夜夜添夜夜爱| 国内精品久久久久精免费| 亚洲欧美成人综合另类久久久 | 国产片特级美女逼逼视频| 一级黄色大片毛片| 国产黄片视频在线免费观看| 久久精品久久久久久噜噜老黄 | 一级毛片久久久久久久久女| 九九爱精品视频在线观看| 成人毛片60女人毛片免费| 男女视频在线观看网站免费| 99热精品在线国产| 欧美+亚洲+日韩+国产| 亚洲精品久久国产高清桃花| 91精品一卡2卡3卡4卡| 黑人高潮一二区| 成人亚洲精品av一区二区| 午夜福利在线在线| 久久午夜亚洲精品久久| 三级经典国产精品| 欧美日韩乱码在线| 国产精品麻豆人妻色哟哟久久 | 毛片女人毛片| 大又大粗又爽又黄少妇毛片口| 18禁黄网站禁片免费观看直播| 国产真实乱freesex| .国产精品久久| 最近中文字幕高清免费大全6| 久久人妻av系列| 99国产极品粉嫩在线观看| 插阴视频在线观看视频| 成人永久免费在线观看视频| 97超视频在线观看视频| 国产亚洲欧美98| 亚洲中文字幕一区二区三区有码在线看| 国产精品女同一区二区软件| 国产色婷婷99| 草草在线视频免费看| 日本撒尿小便嘘嘘汇集6| 成人特级黄色片久久久久久久| 免费看美女性在线毛片视频| 国内精品久久久久精免费| 国产午夜精品久久久久久一区二区三区| 久久久久九九精品影院| 亚洲性久久影院| 久久精品综合一区二区三区| 久久久a久久爽久久v久久| 蜜臀久久99精品久久宅男| 少妇猛男粗大的猛烈进出视频 | 十八禁国产超污无遮挡网站| 黄片无遮挡物在线观看| 久久午夜亚洲精品久久| 人妻制服诱惑在线中文字幕| 精品久久国产蜜桃| 国内久久婷婷六月综合欲色啪| 国产午夜精品久久久久久一区二区三区| 亚洲va在线va天堂va国产| 亚洲欧美成人精品一区二区| 九色成人免费人妻av| 精品久久久久久久久久久久久| 男人舔女人下体高潮全视频| 欧美3d第一页| 免费看a级黄色片| 精品无人区乱码1区二区| 国内少妇人妻偷人精品xxx网站| 国产精品久久久久久av不卡| 尾随美女入室| 免费不卡的大黄色大毛片视频在线观看 | 中文字幕人妻熟人妻熟丝袜美| 哪个播放器可以免费观看大片| 成年免费大片在线观看| 亚洲精品自拍成人| 国产成人aa在线观看| 国产一级毛片七仙女欲春2| 六月丁香七月| 国产成人freesex在线| 黄色视频,在线免费观看| 18+在线观看网站| 欧美性猛交黑人性爽| 99精品在免费线老司机午夜| 国产男人的电影天堂91| av在线老鸭窝| 亚洲av免费在线观看| 国产精品麻豆人妻色哟哟久久 | 日韩一区二区视频免费看| 久久精品夜夜夜夜夜久久蜜豆| 日本黄色片子视频| 国产av在哪里看| 午夜激情福利司机影院| 亚洲精品乱码久久久久久按摩| 最近2019中文字幕mv第一页| 国产爱豆传媒在线观看| 久久久久性生活片| 日日啪夜夜撸| 免费看av在线观看网站| 91aial.com中文字幕在线观看| 99热全是精品| av在线观看视频网站免费| 国产成人aa在线观看| 日产精品乱码卡一卡2卡三| 性欧美人与动物交配| 婷婷色综合大香蕉| 高清毛片免费看| 日日撸夜夜添| 丝袜喷水一区| 国产精品久久久久久精品电影| 亚洲欧美精品综合久久99| 中文欧美无线码| 成年免费大片在线观看| 亚洲真实伦在线观看| 国产中年淑女户外野战色| 悠悠久久av| 中文字幕精品亚洲无线码一区| 一进一出抽搐gif免费好疼| 禁无遮挡网站| 国产一级毛片七仙女欲春2| 在线免费十八禁| 两个人的视频大全免费| 一区二区三区免费毛片| 九九在线视频观看精品| 18禁裸乳无遮挡免费网站照片| 九九在线视频观看精品| 男插女下体视频免费在线播放| 久久精品91蜜桃| 久久久久网色| ponron亚洲| 国产黄色视频一区二区在线观看 | 99久久九九国产精品国产免费| 夜夜爽天天搞| 美女脱内裤让男人舔精品视频 | 日韩视频在线欧美| 亚洲18禁久久av| 亚洲在线观看片| 国产精品一区二区三区四区久久| 中文字幕久久专区| 国产精品三级大全| 亚洲欧美成人精品一区二区| 一级毛片久久久久久久久女| 亚洲欧美日韩东京热| 久久韩国三级中文字幕| 精品不卡国产一区二区三区| 午夜精品在线福利| ponron亚洲| 亚洲成a人片在线一区二区| 日本五十路高清| 啦啦啦啦在线视频资源| 日本与韩国留学比较| 成人鲁丝片一二三区免费| 亚洲欧美精品专区久久| 久久精品国产99精品国产亚洲性色| www日本黄色视频网| 又爽又黄a免费视频| 波多野结衣高清作品| 国产在线男女| 一级毛片久久久久久久久女| 国产精品.久久久| 最后的刺客免费高清国语| 一区二区三区高清视频在线| 99热6这里只有精品| 亚洲真实伦在线观看| 欧美3d第一页| 黄片wwwwww| 99久久成人亚洲精品观看| 免费不卡的大黄色大毛片视频在线观看 | 国产精品99久久久久久久久| 国产高清有码在线观看视频| 网址你懂的国产日韩在线| 18禁裸乳无遮挡免费网站照片| 亚洲中文字幕一区二区三区有码在线看|