Chaining watermarks for detecting malicious modifications to streaming data

被引:60
作者
Guo, Huiping
Li, Yingjiu
Jajodia, Sushil
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
[2] Singapore Management Univ, Sch Informat Syst, Singapore 259756, Singapore
关键词
fragile watermarking; streaming data; integrity;
D O I
10.1016/j.ins.2006.03.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP layer and ensuring the robustness of the verification. These schemes usually incur large communications overhead, which is not desirable in applications with limited bandwidth. In this paper, we propose a novel fragile watermarking algorithm which verifies the integrity of streaming data at the application layer. The data are divided into groups based on synchronization points, so each group can be synchronized and any modifications made to one group only affect up to two groups. A unique watermark is embedded directly into each group to save communications bandwidth. The embedded watermark can detect as well as locate any modifications made to a data stream. To ensure the completeness of the data stream, watermarks are chained across groups so that no matter how many data are deleted, these deletions can be correctly detected. Security analysis and experimental results show that the proposed scheme can efficiently detect and locate modifications and ensure the completeness of data streams. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:281 / 298
页数:18
相关论文
共 21 条
[1]  
Agrawal R, 2003, VLDB J, V12, P157, DOI [10.1007/s00778-003-0097-x, 10.1007/s000778-003-0097-x]
[2]  
And JF, 1999, INT C IM PROC
[3]  
Carney D., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P215
[4]  
CHEN M, 2003, IEEE T MULTIMEDIA, V7, P315
[5]  
DIFER D, 2004, P VLDB C, P180
[6]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[7]  
Gennaro R, 1997, LECT NOTES COMPUT SC, V1294, P180
[8]  
Golle P., 2001, P ISOC NETW DISTR SY, V1, P13
[9]   A fragile watermarking scheme for detecting malicious modifications of database relations [J].
Guo, HP ;
Li, YJ ;
Liu, AY ;
Jajodia, S .
INFORMATION SCIENCES, 2006, 176 (10) :1350-1378
[10]  
Kerschberg L, 1996, EIGHTH INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE SYSTEMS, PROCEEDINGS, P226, DOI 10.1109/SSDM.1996.506065