TY - JOUR T1 - İlişkisel veri tabanlarında XML veriler için Homoglif dönüşüm tabanlı damgalama TT - Homoglyph transformation based watermarking for XML data in relational databases AU - İmamoğlu, Mustafa Bilgehan AU - Ulutaş, Mustafa PY - 2019 DA - October JF - Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi PB - Pamukkale Üniversitesi WT - DergiPark SN - 2147-5881 SP - 586 EP - 595 VL - 25 IS - 5 LA - tr AB - Bilgi Teknolojilerindekihızlı gelişim son zamanlarda İnternet üzerinden veri paylaşımınıkolaylaştırmıştır. Dijital verilerin izinsiz olarak kopyalanması veyadeğiştirilmesi telif hakkı koruma sorununu beraberinde getirmiştir. Kriptografihassas bilgileri güvenli bir şekilde paylaşmak için kullanılsa bile şifrelenmişbilgiler orijinal veri ile ilişkilendirilemediğinden telif hakkı korumasürecinde kullanılamazlar. Dijital haklar yönetiminde son zamanlarda sayısaldamgalama yöntemleri kullanılmaktadır. Özel hazırlanmış gizli bilgileri veyadamgayı sayısal ortama gizleme yöntemleri verilerin korunmasında ve sahiplikbilgilerinin belirlenmesinde ek güvenlik mekanizması sağlamaktadırlar. Çokluortam dosyalarındaki hak yönetimi için önerilen algoritmalar, veri tabanlarıüzerinde doğrudan uygulanamamaktadır. Veri tabanı damgalama için kullanılanyöntemlerden bazıları, ilişkide yer alan XML veri alanlarındanfaydalanmaktadır. Bu çalışmada XML alanlar üzerinde Homoglif Dönüşüm tabanlıyeni bir algoritma önerilmektedir. Birincil anahtar ve özüt fonksiyonu veri tabanındadamgalanacak satırların seçiminde kullanılmıştır. Sonuçlar, önerilen yönteminliteratürdeki diğer yöntemlerle karşılaştırıldığında yüksek damgalamakapasitesinde çeşitli ataklara karşı iyileştirilmiş sağlamlık elde ettiğinigöstermektedir. KW - Sayısal damgalama KW - Veri tabanı damgalama KW - Homoglif KW - XML N2 - Rapid developments inInformation Technologies have eased data sharing through the Internet recently.Copying or modification of digital data without permission and sharing byunauthorized users have brought copyright protection problem. Even thoughcryptography can be used to share sensitive information securely, it cannot beused to protect copyright since encrypted information cannot be associated withthe original. Digital watermarking methods are used lately in digital rightsmanagement. Methods to hide specially crafted secret information or watermarkinto digital media provide additional security mechanism in protecting the dataand determining the ownership information. Algorithms recommended for rightmanagement in multimedia files cannot be applied directly on databases. Somemethods used for watermarking databases take advantage of Extensible MarkupLanguage (XML) data fields attached. A new method based on HomoglyphTransformation in XML fields is proposed in this manuscript. Primary key andhash algorithm are used together in the selection of lines to be watermarked inthe database. Results indicate improved robustness against various attacks inhigh watermarking capacity by the proposed method compared to other methodsreported in the literature. CR - Agrawal R, Haas PJ, Kiernan J. “Watermarking relational data: framework, algorithms and analysis”. The International Journal on Very Large Data Bases, 12(2), 157-169, 2003. CR - Gupta G, Pieprzyk J. “Database relation watermarking resilient against secondary watermarking attacks”. 5th International Conference on Information Systems Security, Kolkata, India, 14-18 December 2009. CR - Zhang Y, Niu X, Zhao D. “A method of protecting relational databases copyright with cloud watermark”. International Journal of Information and Communication Engineering, 1, 337-341, 2005. CR - Guo F, Wang J, Zhang Z, Ye X, Li D. “An improved algorithm to watermark numeric relational data”. 6th International Workshop on Information Security Applications, Jeju Island, Republic of Korea, 22-24 August 2005. CR - Huang M, Cao J, Peng Z, Fang Y. “A new watermark mechanism for relational data”. 4th International Conference on Computer and Information Technology, Wuhan, China, 16 September 2004. CR - Hu T, Chen G, Chen K, Dong J. “Garwm: towards a generalized and adaptive watermark scheme for relational data”. 6th International Conference in Advances in Web-Age Information Management, Hangzhou, China, 11-13 October 2005. CR - Sion R. “Proving ownership over categorical data”. 20th International Conference on Data Engineering, Mass, USA, 30 March-2 April 2004. CR - Sion R, Atallah M, Prabhakar S. “Rights protection for categorical data”. IEEE Transactions on Knowledge and Data Engineering, 17(7), 912-926, 2005. CR - Wang C, Wang J, Zhou M, Chen G, Li D. “Atbam: an arnold transform based method on watermarking relational data”. International Conference on Multimedia and Ubiquitous Engineering, Beijing, China, 24-26 April 2008. CR - Zhou X, Huang M, Peng Z. “An additive-attack-proof watermarking mechanism for databases copyrights protection using image”. ACM Symposium on Applied Computing, Seoul, Republic of Korea, 11-15 March 2007. CR - Al-Haj A, Odeh A. “Robust and blind watermarking of relational database systems”. Journal of Computer Science, 4(12), 1024-1029, 2008. CR - Wang H, Cui X, Cao Z. “A speech based algorithm for watermarking relational databases”. International Symposiums on Information Processing, Moscow, Russia, 23-25 May 2008. CR - Li Y, Guo H, Jajodia S. “Tamper detection and localization for categorical data using fragile watermarks”. 4th ACM Workshop on Digital Rights Management, Washington, DC, USA, 25 October 2004. CR - Kamel I. “A schema for protecting the integrity of databases”. Computers and Security, 28(7), 698-709, 2009. CR - Khataeimaragheh H, Rashidi H. “A novel watermarking scheme for detecting and recovering distortions in database tables”. International Journal of Database Management Systems, 2(3), 1-11, 2010. CR - Hamadou A, Sun X, Gao L, Shah SA. “A fragile zero-watermarking technique for authentication of relational databases”. International Journal of Digital Content Technology and its Applications, 5(5), 189-200, 2011. CR - Rizzo SG, Bertini F, Montesi D. “Content-preserving Text watermarking through unicode homoglyph substitution”. 20th International Database Engineering & Applications Symposium, Montreal, Canada, 11-13 July 2016 CR - The Unicode Consortium. “Unicode Security Mechanisms for UTR”. http://www.unicode.org/Public/security/10.0.0/confusables.txt (20.06.2018). CR - Guo F, Wang J, Zhang Z, Li D. “A new scheme to fingerprint XML data”. International Workshop on Knowledge Discovery from XML Documents, 9 April 2006. CR - Inoue S, Makino K, Murase I, Takizawa O, Matsumoto T, Nakagawa H. “A proposal on information hiding methods using XML”. First NLP and XML Workshop, Tokyo, Japan, 30 November 2001. CR - Wilfred Ng, Ho-Lam L. “Effective approaches for watermarking XML data”. International Symposium on Database Systems for Advanced Applications, Beijing, China, 17-20 April 2005. CR - Fellbaum C. WordNet: An Electronic Lexical Database. Cambridge, Massachusetts, The MIT Press, 1998. CR - Wen Q, Wang Y, Li P. “Two zero-watermark methods for XML documents”. Journal of Real-Time Image Processing, 14(1), 183-192, 2016. CR - Saad M. “An optimized fingerprinting system for tamper proof and copy control of XML documents”. International Conference of Soft Computing and Pattern Recognition, Paris, France, 7-10 December 2010. CR - Saad M. “New system to fingerprint extensible markup language documents using winnowing theory”. The Institution of Engineering and Technology Signal Processing, 6(4), 348-357, 2012. CR - Ronghua Y, Qijun Z, Hongtao L. "A novel watermark algorithm for integrity protection of XML documents". International Journal of Computer Science and Network Security, 6(2), 202-207, 2006. CR - Tchokpon R, Nadia B. “Robust XML watermarking using fuzzy queries”. Institute of Electrical and Electronics Engineers 36th International Conference on Computer Software and Applications Workshops, 16-20 July 2012. UR - https://dergipark.org.tr/tr/pub/pajes/issue//635241 L1 - https://dergipark.org.tr/tr/download/article-file/834910 ER -