Database watermarking is considered one of the active research fields, where best trade-off between: robustness, reversibility, and capacity, to protect sensitive data’s: integrity, ownership, and copyright, is needed in any watermarking scheme. As for database security, developing a persistent and robust watermarking system, is the ultimate objective for securing the databases. Accordingly, in our suggested method, we have studied various works suggested by other authors with a focus on determining their strengths and weaknesses. Eventually, we came with a new idea for protecting RDB by means of reversible
watermarking, where better results in comparison with previous researchers’ methods are gained.
Relational Database, Reversible Watermarking, RRW, Attacks on Relational Database, Relational Database Protection
Ali, Y. H. and Mahdi, B. S., 2011. Watermarking for Relational Database by using Threshold Generator, Eng. & Tech. Journal, Vol. 29(1), (pp. 33-43).
Alqassab A. and Alanezi M., 2022. Reversible Watermarking Approach for Ensuring the Integrity of Private Databases, Springer, Lecture Notes in Networks and System (LNNS), (pp. 1-8).
Alqassab, A. and Alanezi, M., 2021. Relational Database Watermarking Techniques: A Survey. Journal of Physics: Conference Series, (pp. 1-9).
Al-Qassab, A.M. and Nori, A.S., 2014. Steganographic Technique using Fractal Image. JITBM & ARF International Journal of Information Technology and Business Management, Vol. 23(1), (pp. 52-59).
Begum, M. and Uddin, M. S., 2020. Digital Image Watermarking Techniques: A Review, MDPI, Information, (pp. 1-38).
Chang, J. and Wu H., 2012. Reversible Fragile Database Watermarking Technology using Difference Expansion based on SVR Prediction, IEEE, International Symposium on Computer, Consumer and Control, (pp. 690-693).
Duan, S., Wang, H., Liu, Y., Huang, L. and Zhou, X., 2020. A Novel Comprehensive Watermarking Scheme for Color Images, WILEY/Hindawi, Security and Communication Networks, (pp. 1-12).
Fazli, S. and Moeini, M., 2016). A Robust Image Watermarking Method based on DWT, DCT, and SVD using a New Technique for Correction of Main Geometric Attacks, Elsevier GmbH, Vol. 127(2), (pp. 964-972).
Gaur, P. and Manglani, N., 2015. Image Watermarking using LSB Technique, International Journal of Engineering Research and General Science, Vol. 3(3), (pp. 1424-1433).
Hemani and Mandoria, H. L., 2017. Digital Watermarking Approaches and its Applications: A Review, International Journal of Control Theory and Applications, Vol. 10(18), (pp. 343-350).
Kamran, M. and Farooq, M., 2018. A Comprehensive Survey of Watermarking Relational Databases Research, Cornell University, arXiv:1801.08271v1 [cs.CR], (pp. 1-20).
Kumar, H. B. B., 2016. Digital Image Watermarking: An Overview, Oriental Journal of Computer Science & Technology, Vol. 9(1), (pp. 7-11).
Mukherjee, S. and Jana, B., 2019. A Novel Method for High-Capacity Reversible Data Hiding Scheme using Difference Expansion, International Journal of Natural Computing Research, Vol. 8(4), (pp. 13-27).
Murugan, R., Abraham, J. T. and Salim, I., 2019. A Robust Watermarking Technique for Copyright Protection for Relational Databases, International Journal of Recent Technology and Engineering (IJRTE), Vol. 8(3), (pp. 4040-4046).
Murugan, R., Jaseena, K. U. and Abraham, J. T., 2017. An Invisible Watermarking Technique for Integrity and Right Protection of Relational Databases, International Journal of Applied Engineering Research, Vol. 12(24), (pp. 15754-15758).
Ramani, S. V., 2013. Watermark Based Copyright Protection for Relational Database, International Journal of Computer Applications, Vol. 78(2), (pp. 22-28).
Shyamala, G., kanimozhi, C. and kavya, S. P., 2015. An Efficient Distortion Minimizing Technique for Watermarking Relational Databases, International Journal of Scientific Engineering and Technology Research, Vol. 4(11), (pp. 2050-2054).
Singh, N., Nagpal, B. and Kamal, P., 2016. Analysis between Various Digital Watermarking Tools and Techniques, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6(6), (pp. 364-370).
Singh, P. and Chadha, R. S., 2013. A Survey of Digital Watermarking Techniques, Applications and Attacks, International Journal of Engineering and Innovative Technology (IJEIT), Vol. 2(9), (pp. 165-175).
Tzouramanis, T., 2011. A Robust Watermarking Scheme for Relational Databases, IEEE, 6th International Conference on Internet Technology and Secured Transactions, (pp. 783-790).
Unnikrishnan, K. and Pramod, K. V., 2017. Robust Optimal Position Detection Scheme for Relational Database Watermarking through HOLPSOFA Algorithm, Elsevier, Journal of Information Security and Applications 35, (pp. 1-12).
Wang, W., 2019. A Reversible Data Hiding Algorithm based on Bidirectional Difference Expansion, Springer Science+Business Media, LLC, Multimedia Tools and Applications, (pp. 5965-5988).
Asmaa Alqassab a lecturer at College of Education, University of Mosul, Iraq. Her M.Sc. degree was in Computer Science in the field of Computer Security from University of Mosul, Iraq in 2012.
Mafaz Alanezi is a faculty member at the Department of Computer Science, University of Mosul, Iraq. She obtained her Ph.D. degree in Computer Science in the field of Computer and Network Security from University of Mosul / Iraq in 2012. Her M.Sc. degree was also in Computer Science in the field of Image Processing from the University of Mosul/ Iraq in 2003. Her current scientific degree Prof. Dr in Cybersecurity and Information Security.