Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

General Research Article

IDR Privacy Protection Based on Database Digital Watermarking

Author(s): Yuancheng Li*, Longqiang Ma and Xiang Li

Volume 13, Issue 1, 2020

Page: [110 - 118] Pages: 9

DOI: 10.2174/2352096511666181119125538

Price: $65

Abstract

Background: In smart grid, a flexible demand response management mechanism is used to achieve the purpose of stabilizing the power grid, optimizing the power market, and rationally allocating resources. There are two types of demand response management in the demand response management mechanism: Price-based Demand Response (PDR) and Incentive-based Demand Response (IDR).

Methods: The paper studied the problem of privacy protection in IDR, and proposed a method based on database digital watermark to protect user privacy. Segment the time, and then embed watermarks in the user’s consumption data of each time segment. At the end of each billing period, extract the watermarks from the data of each segment time, and then send the total consumption data of the user of this billing period to the power supply company. The power supply company only knows the total consumption data of the user, the company does not have any information regarding the users consumption data which can prevent them from snooping the user privacy. The proposed digital watermarking algorithm is based on K-Means clustering and wavelet transform, the K-Means algorithm is used to cluster the database tuple data, and then wavelet transform is carried out on the available attribute values within the clusters, and the watermark is embedded in the transformed attribute values.

Results: The experimental results show that the proposed method is more robust when the database is under subset deletion attacks, subset substitution attacks and subset addition attacks. Besides, the computational cost is very low.

Conclusion: The proposed digital watermark algorithm can embed the watermarks more decently and overcome the burden of watermark embedding caused by statistical feature control. Besides, the proposed method can protect the user privacy better than the other two methods.

Keywords: Digital watermarking, error control, IDR, K-Means, privacy protection, wavelet transform.

Graphical Abstract
[1]
H. Zhao, H. Zhao, J. Hou, and H. Liu, Effect of demand response on supply reliability of distribution network., Electric Power Automat. Equip, 2017.
[2]
J. Zhao, J. Liu, Z. Qin, and K. Ren, Privacy protection scheme based on remote anonymous attestation for trusted smart meters. " IEEE Transact. Smart Grid, Vol. no. 99, pp. 1-1, 2016
[3]
K.L. Gong, and X.P. Zhang, Research of digital watermarking technology for relational database., Comput. Technol. Develop, 2013.
[4]
R. Sion, M. Atallah, and S. Prabhakar, "Watermarking relational databases", Proceedings of SPIE The International Society for Optical Engineering Vol. 8349, no. 1, pp. 79, 2011
[5]
R. Sion, M. Atallah, and S. Prabhakar, "Rights protection for relational data", IEEE Trans. Knowl. Data Eng., vol. 16, no. 12, pp. 1509-1525, 2004.
[6]
X. Bai, and J. Ling, "Dynamic watermarking scheme based on chinese remaindering theorem", Comput. Eng., vol. 32, no. 16, pp. 155-156, 2006.
[7]
K. Liu, J. Liu, and S.L. Liu, "A RS Error Correcting Coding based Watermarking Algorithm for Relational Database", Communications Technology, 2016.
[8]
W. Xinwei, Y. Yanzhong, P. Renliang, and L. Jianhua, "Image watermarking algorithm based on error control", Comput. Eng., 2003..
[9]
J. Sun, and J. Liu, "Blind video watermarking scheme based on independent component analysis", Acta Electronica Sinica. Vol. 32, no. 9, pp. 1507-1510, 2004.
[10]
M. Kamran, and M. Farooq, "A formal usability constraints model for watermarking of outsourced datasets", IEEE Transact. Inform. Foren. Secur., vol. 8, no. 6, pp. 1061-1072, 2013.
[11]
K. Unnikrishnan, and K.V. Pramod, "Robust optimal position detection scheme for relational database watermarking through HOLPSOFA algorithm", J. Inform. Secur. Appl., vol. 35, pp. 1-12, 2017.
[12]
Q. Su, and B. Chen, "A novel blind color image watermarking using upper Hessenberg matrix", AEU Int. J. Electron. Commun., vol. 78, pp. 64-71, 2017.
[13]
U.P. Rao, D.R. Patel, and P.M. Vikani, "Relational database watermarking for ownership protection", Procedia Technol., vol. 6, no. 4, pp. 988-995, 2012.
[14]
K. Jawad, and A. Khan, "Genetic algorithm and difference expansion based reversible watermarking for relational databases", J. Syst. Softw., vol. 86, no. 11, pp. 2742-2753, 2013.
[15]
X. Luo, and Q. Cheng, "Health information integrating and size reducing- 2003 IEEE nuclear science symposium, 'medical imaging conference, and workshop of room-temperature semiconductor detectors In:", Nuclear Science Symposium Conference Record, vol. 4, 2003pp. 3014-3018
[16]
X. Luo, Q. Cheng, and J. Tan, "A lossless data embedding scheme for medical images in application of e-diagnosis , In: Engineering in Medicine and Biology Society, 2003", Proceedings of the International Conference of the IEEE 2003, Vol. 1, pp. 852-855.
[17]
M.E. Farfoura, S.J. Horng, J.L. Lai, R.S. Run, R.J. Chen, and M.K. Khan, "A blind reversible method for watermarking relational databases based on a time-stamping protocol", Expert Syst. Appl., vol. 39, no. 3, pp. 3185-3196, 2012.
[18]
X.M. Zhao, L.L. Li, and Q.T. Wu, "A novel multiple watch marking for relational databases using multi-media", Phys. Procedia, vol. 25, pp. 687-692, 2012.
[19]
J. Sang, X. Wu, C. Song, and S. Sudirman, "Multiparty multilevel watermarking protocol for digital secondary market based on iris recognition technology", Rec. Adv. Elec. Electron. Eng.. Vol. 10, no. 1, 2017.
[20]
B. Zhou, J. Sang, and C. Song, "A high security buyer-seller watermark protocol based on Iris Biometric", Recent Adv. Electr. Electron. Eng., vol. 9, no. 2, pp. 124-131, 2016.
[21]
Y. Gong, Y. Cai, Y. Guo, and Y. Fang, "A privacy-preserving scheme for incentive-based demand response in the smart grid", IEEE Trans. Smart Grid, vol. 7, no. 3, pp. 1304-1313, 2017.
[22]
I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia", IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, 1997.
[23]
G.V. Oliveira, F.P. Coutinho, R.J.G.B. Campello, and M.C. Naldi, "Improving k-means through distributed scalable metaheuristics", Neurocomputing, vol. 246, pp. 45-57, 2017.
[24]
J. Shi, X. Liu, X. Sha, Q. Zhang, and N. Zhang, "A sampling theorem for fractional wavelet transform with error estimates", IEEE Trans. Signal Process., vol. 65, no. 18, pp. 4797-4811, 2017.
[25]
C.P. Yan, and C.M. Pun, "Multi-scale difference map fusion for tamper localization using binary ranking hashing", IEEE Transact. Inform. Foren. Secur., vol. 12, no. 9, pp. 2144-2158, 2017.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy