Abstract
People pay much attention to the technology of data mining recently and more and more research institutions begin to buy the databases to analyze. If it doesn't concern customer's secrets the enterprises would also like to sell their data warehouse to do the research. Therefore, it becomes an important subject to prove the integrity of the database. This paper discusses about using the digital watermarking and the public authentication mechanism to strengthen the verification of integrity of the database. First, MD5 hash algorithm is used to fetch a database feature. Second, making XOR operation of database feature and digital watermarking gets a certification number. At last, using the secret key encrypts the certification number and makes public in the network with the database. Before using this database, user needs to use database owner's public key to decrypt the ciphertext to get the certification number. Then making XOR operation of database feature fetched by MD5 algorithm and certification number gets a watermark. Finally, user can rely on the integrity of fetched watermark to understand whether the database is destroyed or not.
Author supplied keywords
Cite
CITATION STYLE
Tsai, M. H., Tseng, H. Y., & Lai, C. Y. (2006). A database watermarking technique for temper detection. In Proceedings of the 9th Joint Conference on Information Sciences, JCIS 2006 (Vol. 2006). https://doi.org/10.2991/jcis.2006.206
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.