Database Reference
In-Depth Information
they work on structured or at most semi-structured data and that the whole database has
to be watermarked. By contrast, our approach aims at watermarking unstructured data
sets that are only a subset of the whole database. In the same way as with database wa-
termarking, digital watermarking is an active field of research that aims at information
hiding in digital data such as image or audio data. Numerous watermark systems exist
for embedding the watermark in subject data, depending on different requirements to
the watermarked data (e.g., capacity, robustness or confidentiality) [9,19]. Furthermore,
different applications can be supported by different watermarking approaches such as
proof of ownership or content authentication. However, to the best of our knowledge, no
approach exists where digital watermarking is integrated in a database system, neither
for data protection nor provenance reliability issues.
7Conluion
Data Provenance gained more and more attention in the recent past and is expected to do
so in future. In this paper, we proposed to apply data provenance even for unstructured
data, which represents a new field of research. Moreover, we suggest to put the focus
on the trustworthiness of provenance information. We presented a real-world scenario
where trustworthy source provenance information is an important aspect. Subsequently,
we proposed an approach how watermarking could be used to achieve both, provenance
of unstructured data and its trustworthiness. Finally, we pointed out possible advantages
and disadvantages of such an approach.
In the near future, we focus on finding solutions for some of the mentioned dis-
advantages. In detail, we search for mechanisms that increase performance for insert-
ing/updating the watermark. Furthermore, alternative approaches (w.r.t. the current so-
lution) for making the provenance information accessible via SQL are subject to future
research.
References
1. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proc. Int. Conf. on Very
Large Data Bases, pp. 155-166 (2002)
2. Ashbaugh, D.: Ridgeology - modern evaluative friction ridge identification. Journal of
Forensic Identification 41(1), 16-64 (1991)
3. Buneman, P., Chapman, A., Cheney, J.: Provenance management in curated databases. In:
Proc. Int. Conf. on Management of Data, pp. 539-550. ACM, New York (2006)
4. Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data prove-
nance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316-330.
Springer, Heidelberg (2000)
5. Buneman, P., Khanna, S., Tan, W.C.: On propagation of deletions and annotations through
views. In: Proc. Symp. on Principles of Database Systems, pp. 150-158. ACM, New York
(2002)
6. Celik, M., Sharma, G., Tekalp, A., Saber, E.: Lossless generalized-lsb data embedding. IEEE
Transactions on Image Processing 14(2), 253-266 (2005)
7. Cheney, J., Chiticariu, L., Tan, W.C.: Provenance in databases: Why, how, and where. Foun-
dations and Trends in Databases 1(4), 379-474 (2009)
Search WWH ::




Custom Search