Abstract
Data watermarking technology is an effective means to protect the copyright of big data. In order to embed robust and highly available data watermarks, firstly, based on the game theory, a Nash equilibrium model between watermark robustness and data quality is established to solve the optimal number of data group. Then, the mapping relationship between data group and watermark bit is established by using secure hash algorithm.Finally, under the constraint of data usability, the improved particle swarm optimization algorithm is used to solve the optimal solution of data change for each data group, and then the data is changed accordingly to complete the embedding of watermark bit. In order to verify the copyright ownership of big data, the corresponding watermark extraction method is also given in this paper. Watermark extraction is the inverse process of watermark embedding. First, it traverses all the groups and extracts the bits that might be embedded in each group. Then, the actual embedded watermark bit is finally determined by most election strategies. The experimental results show that the proposed method can not only detect watermarks under different attack conditions, ensure the robustness of big data watermarks, but also achieve better data quality, and the comprehensive effect of data watermarks is better than the existing methods.
Similar content being viewed by others
References
Abourezq M, Idrissi A (2016) Database-as-a-service for big data: an overview. Int J Adv Comput Sci Appl 7(1):157–177
Agrawal R, Kiernan J (2002) Watermarking relational databases. In: VLDB’02: Proceedings of the 28th international conference on very large databases, pp 155–166
Anand S, Singh J (2015) A watermarking relational database based on 5-level dwt using genetic algorithm & pso. Int J Eng Sci Res Technol 4(3):554–559
Cao Z, Shi G, Wu Q (2019) Research on database watermarking based on independent component analysis and multiple rolling. Int J Distrib Sens Netw 15(4):1–11. https://doi.org/10.1177/1550147719841004
Fan M, Li J, Lin Z (2015) A new relational database watermarking algorithm. Comput Appl Softw 32(6):249–251
Ghogare GR, Junnarkar AA (2017) Genetic algorithm based reversible watermarking approach for relational data. Int J Emerging Trends Technol (IJETT) 4:8245–8250
Iftikhar S, Kamran M, Anwar Z (2015) RRW—A robust and reversible watermarking technique for relational data. IEEE Trans Knowl Data Eng 27(4):1132–1145
Imamoglu MB, Ulutas M, Ulutas G (2017) A new reversible database watermarking approach with firefly optimization algorithm. Math Probl Eng. https://doi.org/10.1155/2017/1387375
Jose N (2016) Securing numerical relational dataset using robust and reversible watermarking approach based on genetic algorithm. Asian J Eng Technol Innov 2016(2):170–174
Kamran M, Farooq M (2013) A formal usability constraints model for watermarking of outsourced datasets. IEEE Trans Inf Forens Sec 8(6):1061–1072
Kamran M, Farooq M (2018) A comprehensive survey of watermarking relational databases research. arXiv:180108271
Li RYM, Li HCY (2018) Have housing prices gone with the smelly wind? big data analysis on landfill in hong kong. Sustainability 10(2):341
Luo L, Chang J, Li C (2015) Research on relational database watermarking technology based on genetic algorithm. Theory Alg 1:72–74
Niu X, Zhao L, Huang W, Zhang H (2003) Copyright protection of database by using digital watermarking technology. Electron J 31(12A):2050–2053
Sardroudi HM, Ibrahim S (2010) A new approach for relational database watermarking using image. 5th International Conference on Computer Sciences and Convergence Information Technology, pp 606–610
Shehab M, Bertino E, Ghafoor A (2008) Watermarking relational databases using optimization-based techniques. IEEE Trans Knowl Data Eng 20(1):116–129
Sion R, Atallah M, Prabhakar S (2004) Rights protection for relational data. IEEE Trans Knowl Data Eng 16(12):1509–1525
Tzouramanis T (2016) A robust watermarking scheme for relational databases. International Conference for Internet Technology and Secured Transactions, pp 783–790
Zhang A, Li J (2016) An improved particle swarm optimization algorithm. J Hangzhou Dianzi Univ (Natural Science) 36(6):10–14
Acknowledgements
This research is supported by Beijing Key Laboratory of Internet Culture and Digital Dissemination Research (No.ICDDXN004), Beijing Advanced Innovation Center for Materials Genome Engineering, Beijing Information Science and Technology University and Key Lab of Information Network Security of Ministry of Public Security (No.C18601).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Privacy-Preserving Computing
Guest Editors: Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan and David S.L. Wei
Rights and permissions
About this article
Cite this article
Xu, Y., Shi, B. Copyright protection method of big data based on nash equilibrium and constraint optimization. Peer-to-Peer Netw. Appl. 14, 1520–1530 (2021). https://doi.org/10.1007/s12083-021-01096-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-021-01096-4