Chaining Watermarks for Detecting Malicious Modifications to Streaming Data

Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP layer and ensuring the robustness of the verification. These schemes usually incur large communications overhead, which...

Full description

Saved in:
Bibliographic Details
Main Authors: GUO, Huiping, LI, Yingjiu, Jajodia, Sushil
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2007
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1184
http://dx.doi.org/10.1016/j.ins.2006.03.014
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2183
record_format dspace
spelling sg-smu-ink.sis_research-21832010-12-22T08:24:06Z Chaining Watermarks for Detecting Malicious Modifications to Streaming Data GUO, Huiping LI, Yingjiu Jajodia, Sushil Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP layer and ensuring the robustness of the verification. These schemes usually incur large communications overhead, which is not desirable in applications with limited bandwidth. In this paper, we propose a novel fragile watermarking algorithm which verifies the integrity of streaming data at the application layer. The data are divided into groups based on synchronization points, so each group can be synchronized and any modifications made to one group only affect up to two groups. A unique watermark is embedded directly into each group to save communications bandwidth. The embedded watermark can detect as well as locate any modifications made to a data stream. To ensure the completeness of the data stream, watermarks are chained across groups so that no matter how many data are deleted, these deletions can be correctly detected. Security analysis and experimental results show that the proposed scheme can efficiently detect and locate modifications and ensure the completeness of data streams. 2007-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/1184 info:doi/10.1016/j.ins.2006.03.014 http://dx.doi.org/10.1016/j.ins.2006.03.014 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Fragile watermarking Streaming data Integrity Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Fragile watermarking
Streaming data
Integrity
Information Security
spellingShingle Fragile watermarking
Streaming data
Integrity
Information Security
GUO, Huiping
LI, Yingjiu
Jajodia, Sushil
Chaining Watermarks for Detecting Malicious Modifications to Streaming Data
description Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP layer and ensuring the robustness of the verification. These schemes usually incur large communications overhead, which is not desirable in applications with limited bandwidth. In this paper, we propose a novel fragile watermarking algorithm which verifies the integrity of streaming data at the application layer. The data are divided into groups based on synchronization points, so each group can be synchronized and any modifications made to one group only affect up to two groups. A unique watermark is embedded directly into each group to save communications bandwidth. The embedded watermark can detect as well as locate any modifications made to a data stream. To ensure the completeness of the data stream, watermarks are chained across groups so that no matter how many data are deleted, these deletions can be correctly detected. Security analysis and experimental results show that the proposed scheme can efficiently detect and locate modifications and ensure the completeness of data streams.
format text
author GUO, Huiping
LI, Yingjiu
Jajodia, Sushil
author_facet GUO, Huiping
LI, Yingjiu
Jajodia, Sushil
author_sort GUO, Huiping
title Chaining Watermarks for Detecting Malicious Modifications to Streaming Data
title_short Chaining Watermarks for Detecting Malicious Modifications to Streaming Data
title_full Chaining Watermarks for Detecting Malicious Modifications to Streaming Data
title_fullStr Chaining Watermarks for Detecting Malicious Modifications to Streaming Data
title_full_unstemmed Chaining Watermarks for Detecting Malicious Modifications to Streaming Data
title_sort chaining watermarks for detecting malicious modifications to streaming data
publisher Institutional Knowledge at Singapore Management University
publishDate 2007
url https://ink.library.smu.edu.sg/sis_research/1184
http://dx.doi.org/10.1016/j.ins.2006.03.014
_version_ 1770570889957474304