FUNDAMENTALS OF RELATIONAL DATA WATERMARKING
- Academic year
- 2024/2025 Syllabus of previous years
- Official course title
- FUNDAMENTALS OF RELATIONAL DATA WATERMARKING
- Course code
- PHD208 (AF:545154 AR:311538)
- Modality
- On campus classes
- ECTS credits
- 6
- Degree level
- Corso di Dottorato (D.M.226/2021)
- Educational sector code
- INF/01
- Period
- Annual
- Course year
- 1
- Where
- VENEZIA
- Moodle
- Go to Moodle page
Contribution of the course to the overall degree programme goals
This course offers students a valuable tool for analyzing different scenarios and determining more convenient protection methods outside traditional security approaches. Moreover, given the main threats presented in a particular scenario, the students will be able to design a technique prioritizing some requirements over others to overcome attacks focused on damaging data quality or compromising digital assets' copyright.
Expected learning outcomes
In particular, the student should know:
1. How to set up the development and execution environment of a watermarking scheme for relational databases.
2. How to ensure data protection, even outside the data deployment controlled environment.
3. How to design and implement a watermarking scheme for relational databases containing different attributes and considering diverse threats and challenges.
4. How to ensure data usability preservation, particularly in terms of semantics and statistics.
Pre-requirements
- to master the English language well enough to comprehend the course content and communicate with classmates and the professor.
- to know the basics of set theory, linear algebra, and mathematical logic, as well as the basics for the design and programming of algorithms.
While a basic understanding of relational database theory is desirable, this is not a mandatory requirement, considering that a brief introduction to relational databases is included in the course.
Contents
Lesson 2: Robust and fragile watermarking techniques
Lesson 3 (laboratory 1): Protection based on the digital asset type
Lesson 4: The relational data. Types of carriers
Lesson 5 (laboratory 2): Relational database management
Lesson 6: Basic watermarking architecture
Lesson 7 (laboratory 3): Setting up the development environment
Lesson 8: The Agrawal & Kiernan (AHK) algorithm
Lesson 9 (laboratory 4): Development of a simple watermarking scheme
Lesson 10: Watermark properties and requirements
Lesson 11 (laboratory 5): Implementation of watermark properties
Lesson 12: Natural degradation of the watermark
Lesson 13 (laboratory 6): Implementing the incremental watermarking
Lesson 14: The adversary model
Lesson 15 (laboratory 7): Simulation of first-degree attacks
Lesson 16: Virtual Primary Key (VPK) based synchronization
Lesson 17 (laboratory 8): Implementation and evaluation of VPK schemes
Lesson 18: Pseudo-random selection and majority voting
Lesson 19 (laboratory 9): Implementing sequential selection, pseudo-random selection, and majority voting.
Lesson 20: Management of capacity
Lesson 21 (laboratory 10): Implementation of a practical study case for increasing capacity
Lesson 22: Management of distortion
Lesson 23 (laboratory 11): Implementation of a practical study case for reducing distortion
Lesson 24: Robustness vs. security
Lesson 25: False ownership claims
Lesson 26 (laboratory 12): Adding resiliency to false ownership claims
Lesson 27: Brute force attacks
Lesson 28 (laboratory 13): Implementation of a practical study case to face brute force attacks
Lesson 29: Advanced approaches
Lesson 30: Advanced and interdisciplinary topics
Referral texts
- Stefan K. and Fabien A. P., 2000. Information Hiding Techniques for Steganography and Digital Watermarking (1st. ed.). Artech House, Inc., USA.
- C.J. Date. 2003. An Introduction to Database Systems (8th. ed.). Addison-Wesley Longman Publishing Co., Inc., USA.
Assessment methods
Teaching methods
Students will have the opportunity to consolidate new content through practice.
In addition, group activities will help students consolidate their roles in the class, provide constructive criticism of their work, and improve its quality.