
In many fields, such as medicine and the computer industry, databases are vital in the process of information sharing. However, databases face the risk of being stolen or misused, leading to security threats such as copyright disputes and privacy breaches. Reversible watermarking techniques ensure the ownership of shared relational databases, protect the rights of data owners and enable the recovery of original data. However, most of the methods modify the original data to a large extent and cannot achieve a good balance between protection against malicious attacks and data recovery. In this paper, we proposed a robust and reversible database watermarking technique using a hash function to group digital relational databases, setting the data distortion and watermarking capacity of the band weight function, adjusting the weight of the function to determine the watermarking capacity and the level of data distortion, using firefly algorithms (FA) and simulated annealing algorithms (SA) to improve the efficiency of the search for the location of the watermark embedded and, finally, using the differential expansion of the way to embed the watermark. The experimental results prove that the method maintains the data quality and has good robustness against malicious attacks.
Citation: Chuanda Cai, Changgen Peng, Jin Niu, Weijie Tan, Hanlin Tang. Low distortion reversible database watermarking based on hybrid intelligent algorithm[J]. Mathematical Biosciences and Engineering, 2023, 20(12): 21315-21336. doi: 10.3934/mbe.2023943
[1] | Yan Li, Junwei Wang, Shuangkui Ge, Xiangyang Luo, Bo Wang . A reversible database watermarking method with low distortion. Mathematical Biosciences and Engineering, 2019, 16(5): 4053-4068. doi: 10.3934/mbe.2019200 |
[2] | Hongyan Xu . Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection. Mathematical Biosciences and Engineering, 2021, 18(5): 6771-6789. doi: 10.3934/mbe.2021336 |
[3] | Shaozhang Xiao, Xingyuan Zuo, Zhengwei Zhang, Fenfen Li . Large-capacity reversible image watermarking based on improved DE. Mathematical Biosciences and Engineering, 2022, 19(2): 1108-1127. doi: 10.3934/mbe.2022051 |
[4] | Shanqing Zhang, Xiaoyun Guo, Xianghua Xu, Li Li, Chin-Chen Chang . A video watermark algorithm based on tensor decomposition. Mathematical Biosciences and Engineering, 2019, 16(5): 3435-3449. doi: 10.3934/mbe.2019172 |
[5] | Qiuling Wu, Dandan Huang, Jiangchun Wei, Wenhui Chen . Adaptive and blind audio watermarking algorithm based on dither modulation and butterfly optimization algorithm. Mathematical Biosciences and Engineering, 2023, 20(6): 11482-11501. doi: 10.3934/mbe.2023509 |
[6] | Qichao Ying, Jingzhi Lin, Zhenxing Qian, Haisheng Xu, Xinpeng Zhang . Robust digital watermarking for color images in combined DFT and DT-CWT domains. Mathematical Biosciences and Engineering, 2019, 16(5): 4788-4801. doi: 10.3934/mbe.2019241 |
[7] | Wenfa Qi, Wei Guo, Tong Zhang, Yuxin Liu, Zongming Guo, Xifeng Fang . Robust authentication for paper-based text documents based on text watermarking technology. Mathematical Biosciences and Engineering, 2019, 16(4): 2233-2249. doi: 10.3934/mbe.2019110 |
[8] | Xiangyang Ren, Shuai Chen, Kunyuan Wang, Juan Tan . Design and application of improved sparrow search algorithm based on sine cosine and firefly perturbation. Mathematical Biosciences and Engineering, 2022, 19(11): 11422-11452. doi: 10.3934/mbe.2022533 |
[9] | Shuang Tan, Shangrui Zhao, Jinran Wu . QL-ADIFA: Hybrid optimization using Q-learning and an adaptive logarithmic spiral-levy firefly algorithm. Mathematical Biosciences and Engineering, 2023, 20(8): 13542-13561. doi: 10.3934/mbe.2023604 |
[10] | Diego G. Rossit, Adrián A. Toncovich, Matías Fermani . Routing in waste collection: A simulated annealing algorithm for an Argentinean case study. Mathematical Biosciences and Engineering, 2021, 18(6): 9579-9605. doi: 10.3934/mbe.2021470 |
In many fields, such as medicine and the computer industry, databases are vital in the process of information sharing. However, databases face the risk of being stolen or misused, leading to security threats such as copyright disputes and privacy breaches. Reversible watermarking techniques ensure the ownership of shared relational databases, protect the rights of data owners and enable the recovery of original data. However, most of the methods modify the original data to a large extent and cannot achieve a good balance between protection against malicious attacks and data recovery. In this paper, we proposed a robust and reversible database watermarking technique using a hash function to group digital relational databases, setting the data distortion and watermarking capacity of the band weight function, adjusting the weight of the function to determine the watermarking capacity and the level of data distortion, using firefly algorithms (FA) and simulated annealing algorithms (SA) to improve the efficiency of the search for the location of the watermark embedded and, finally, using the differential expansion of the way to embed the watermark. The experimental results prove that the method maintains the data quality and has good robustness against malicious attacks.
In the era of exponential data growth, sharing information has become an important part of business, industry and academic research and these activities involve the trading of data. Examples include weather forecasting, medical data analysis and credit reports of financial institutions. Therefore, protecting data copyrights and preventing leakage of shared data have become challenging issues today [1], and database watermarking, as an important technique for database security, can stop the illegal dissemination of data.
At present, scholars for the database watermarking problem put forward the least significant bit (LSB), the use of histogram statistical analysis, text steganography, digital fingerprinting, optimization algorithms based on the reversible database watermarking, blockchain-based watermarking technology and other methods, which are simple and easy to implement. The hidden nature of the LSB is high, but the LSB is susceptible to a variety of attack means of destruction, limited watermarking capacity and poor robustness in practical applications. Embedded watermarking using histogram statistical analysis is reversible and has a large watermarking capacity, but it is susceptible to random noise interference and it is difficult to cope with attack analysis. Text steganography has a high degree of covertness and can cope with attack analysis but its capacity is limited, which restricts the application in large-capacity information transmission [2]. Digital fingerprints are robust and fast to recognize and retrieve, but the original data cannot be recovered after the data is converted into fingerprints. Blockchain technology utilizes distributed database technology, which is slow to process and requires complex operation and maintenance development for large databases [3]. Reversible database watermarking based on optimization algorithms inserts watermarks to protect data in the form of finding the optimal location for embedding watermarks, which can protect intellectual property rights, prove ownership and ensure authentication and security of the content [4], and has the advantages of watermarking capacity, robustness and recovery of the original data in large databases.
Addressing the shortcomings inherent in traditional watermarking schemes, which often encompass issues such as irreversibility, limited capacity, inadequate robustness and suboptimal optimization, this paper introduces an innovative approach to reversible database watermarking. Our principal objective is to bolster algorithmic robustness across a spectrum of database attack scenarios, while concurrently addressing the deficiencies that plague conventional watermarking techniques. The primary contributions of this paper can be summarized as follows:
● A new reversible database watermarking algorithm is proposed, and after a series of experimental evaluations, it is found that the method exhibits better performance than traditional algorithms while maintaining the watermark embedding tolerance. Experiments on the database with 50% attribute or tuple deletion still maintain the watermark extraction rate above 75% stably, and the extraction rate can be maintained at 100% under the attack of adding tuples and attributes. This result strongly proves that our method can better protect the integrity of the database watermark information.
● The weighting coefficients are introduced into the design of the optimization function (or brightness function) as an indicator of the performance of the algorithm. At the data embedding watermark preparation stage, the data copyright owner can change the weighting parameters in combination with the actual application requirements. It not only determines the capacity size of the watermark embedding, but also directly affects the degree of data distortion, further enhancing the autonomy and flexibility of the data owner to protect the intellectual property rights of the data.
● In order to cope with the problem of huge data distortion that can be caused by a large number of watermark embeddings, a differential extension technique is used to embed watermarks into individual tuples. The aim is to decentralize the embedding of the watermark information into various sub-parts of the tuple while keeping the data relatively stable. The problem of serious data distortion caused by centralized large-scale embedding is avoided, while the reversibility and integrity of data manipulation is also ensured. A symmetric encryption algorithm is used to realize fast watermark verification under the premise of protecting data security. Compared with the traditional large number judgment method, this strategy has significantly improved in efficiency and accelerated the watermark verification process.
In 2003, Kiernan et al. [5] proposed a database watermarking technique to protect relational database copyright issues. The approach is to embed the watermark data on the numeric fields of the database, classify each tuple using a message authentication code (MAC), thereby obtaining the embedding position of each watermark bit and embedding the watermark using LSB. The disadvantage of this approach is that the tuples are not uniformly categorized and, in extreme cases, there are many candidate tuples in some categorization groups and only a few tuples to choose from in other categorization groups. When an attacker attacks the lowest valid bit of a numeric field in a database, a large number of watermarks will be lost, and the watermarking capacity of this approach is also very small. In 2006, Zhang et al. [6] proposed a reversible database watermarking scheme based on the attribute difference to construct a histogram. In the same year, Zhang and Niu [7] proposed a reversible watermarking scheme based on heteroskedastic operation for relational databases. In 2008, Shehab et al. [8] proposed an optimization algorithm based on the genetic algorithm in order to reduce the distortion of the data caused by embedded watermarks, which turns the search for the location of the watermark to be embedded into an optimization problem. Gupta et al. [9] proposed a database watermarking embedding technique based on differential extension watermarking (DEW) in 2009, because of the DEW in this scheme is based on MAC and is randomly selected to be embedded in a watermark location, so this embedding watermarking technique will make the data distortion too large; in practical use it will be selected by setting a threshold to insert or not, resulting in the reduction of watermarking capacity. In 2013, Chang et al. [10] proposed histogram transform based on the blind reversible robust watermarking (BRRW) technique, which realizes the insertion of reversible watermarks against relational databases. In 2015, Iftikhar et al. [11] proposed a new scheme for selecting the basis of watermark embedding location based on the concept of information according to the characteristics of genetic algorithm (GA). In 2017, Imamoglu et al. [12] used the one way hash function Secure Hash Algorithm (SHA) to sort the tuple of the database according to the primary key as well as the input key, the firefly optimization algorithm (FA) based on the database to find the best location for embedding the watermark, the DEW technique to achieve the embedding of the watermark and recovery of the data and finally stored the location of the watermark and extracted the watermark location in the extraction phase. In 2019, Hu et al. [13] used the genetic algorithm to select the best key for grouping of the database and embedded the watermark after offsetting the histogram of prediction error.
In the process of reversible watermarking, the distortion constraint ensures the imperceptibility of the watermark and avoids a large amount of data quality loss. The severe loss of data quality makes it an easy target for attacks, which deteriorates the robustness of watermarking. Therefore, there may be a potential conflict between robustness and distortion constraints [14]. Although genetic algorithm differential extension watermarking (GADEW) and firefly algorithm differential extension watermarking (FADEW) also use optimization methods to select the best location to minimize watermark embedding distortion, the distortion caused by the embedded watermark is still significant. In order to maximize the robustness and minimize the distortion and seek the optimal solution as much as possible within the required distortion range, so as to determine the appropriate watermark embedding location [15,16,17], this paper proposes a combination of the FA and the SA to solve this problem.
Differential extension (DE) technology was initially widely used in the field of audio decoding and audio processing to improve audio compression, transmission and quality. Later, DE technology gradually migrated to the field of database watermarking to form DEW, which protects data in databases by embedding almost imperceptible digital signals to ensure that copyrighted information is not illegally exploited, in addition to authenticating the source of the data. After embedding watermarks in databases, distortions are usually difficult to recognize by observation, but in certain application scenarios with high-precision data, even small data variations may lead to undesirable results. In order to preserve the robustness of data usage, reversible database watermarking techniques based on differential extensions have emerged. These techniques not only allow watermarking to be extracted during the data validation phase, but also enable full recovery of the original data. For a deeper understanding of the transformation and recovery process of differential expansion, some sample data demonstrations are provided below:
Suppose x, y are the data of some tuple in the database where x = 206, y = 201, and the bit of information to be embedded b = 1.
Step 1: Calculate the average of x and y, avg=⌊x+y2⌋=203, difference: d=x−y=5.
Step 2: Defining the new margin ˜d=2d+b=11, calculate the new ˜x and ˜y, ˜x=avg+⌊˜d+12⌋=209, ˜y=avg−⌊˜d2⌋=198
Above is the forward step of DE. After getting ˜x and ˜y, use them to replace the original x and y to get the data containing watermark. The method to recover the original data and the corresponding bit b is as follows:
Step 1: Calculate the average of ˜x and ˜y, ~avg=⌊˜x+˜y2⌋=203. Calculate the difference ˜d=˜x−˜y=11
Step 2: Extract a watermark bits b=˜d−⌊˜d2⌋×2=1
Step 3: The original data can be recovered from d and b obtained from steps one and two, x=avg+⌊⌊˜d/2⌋+12⌋=206, y=avg−⌊⌊˜d/2⌋2⌋=201.
Biologically inspired algorithms have become popular in solving global optimization problems such as the traveling salesman problem (TSP), also known as swarm intelligence (SI)-based algorithms due to their simulation of the group characteristics of living organisms. A particle swarm optimization algorithm was proposed in 1995 based on the swarming behaviors of birds and fish[18]. Subsequently, ant colony optimization [19] and artificial bee colony optimization [20] were proposed. In 2008, Yang et al.[21] proposed the FA to solve the nondeterministic polynomial (NP) problem based on the glowing behavior of fireflies in nature. The algorithm, as a stochastic algorithm, cannot guarantee an optimal solution in a certain time, but it can converge to a value in a certain time, so as to find the local optimal embedding location of the watermark in the database. Set the firefly population in a certain spatial range S as F, the attraction function is A if two fireflies are attracted to each other, then A=1; otherwise, A=0, the brightness function is I, the attraction is β, the movement function is M, then the FA algorithm has the following three properties:
∀f1,f2∈F,A(f1,f2)=1 | (1) |
∀f1,f2∈F,M(f1,f2)={f1tof2,I(f1)<I(f2)f1,f2¬move,I(f1)=I(f2)f2tof1,I(f1)>I(f2) | (2) |
ifI(f)=max,M(f)=random(S). | (3) |
In the FA, the two fireflies' relative brightness is determined by initial brightness and light absorption coefficient as well as distance, assuming the light absorption coefficient is γ, the distance of any pair of fireflies is rji and the brightness of selected fireflies is I0. The firefly's relative brightness is calculated by the formula:
I=I0e−γrji. | (4) |
The mutual attraction between fireflies determines the flight direction of fireflies, in the space region. Suppose there are three fireflies F1,F2,F3; the attraction of F1 to F2 is greater than the attraction of F3 to F2 and F2 tends to fly to F1. The mutual attraction of the fireflies is directly proportional to the relative luminance of the fireflies, and the attraction is determined by the maximum attraction (attraction when the distance is zero) with the light absorption function and the distance, assuming that the maximum attraction is β0, the light absorption coefficient is γ and the distance of the two fireflies is rji, then the formula of the mutual attraction of the fireflies is as follows:
β(r)=β0e−γrji2. | (5) |
Different moments correspond to different positions of the same firefly, and their position is not only determined by mutual attraction, but also by the random movement of fireflies. Assuming that the position of firefly i at time t is Xi(t) and the random movement of firefly i is αϵi, then the position function of firefly i at time t+1 can be expressed as follows:
Xi(t+1)=Xi(t)+β(Xj(t)−Xi(t))+αεi, | (6) |
where α is a randomization parameter and ϵi is a random number generator. xj(t)−Xi(t) denotes the distance between the best firefly and the current firefly at time t, i.e. rji is defined as follows:
rji=∣xj−xi∣=√d∑k=1(xj,k−xi,k)2. | (7) |
The earliest idea of the simulated annealing algorithm (SA) was proposed in 1953 by Metropolis et al. It is a stochastic optimization algorithm based on the Monte-Carlo iterative solution strategy, and its starting point is based on the similarity between the annealing process of solids in physics and general combinatorial optimization problems. The essence of the SA is to randomly search for a globally optimal solution of the objective function in the solution space, accepting the new solution if it is better than the current one or else accepting the poor solution with a certain probability. Let the initial temperature be T0, the solution be x, the objective function be E and the cooling coefficient be k. The steps are as follows:
Step 1: Initialize t, x0, and E, t=0, x0=random(x), E=E(x0).
Step 2: x1=random(x), E1=E(x1), ΔE=E(x1)−E(x0).
Step 3: If ΔE>0,x=x1. Otherwise, accept the new solution with probability e−ΔE/kT and lower the temperature T = kT, k∈[0,1].
Step 4: Repeat steps one to three until the temperature reaches the set threshold or the temperature drops to zero.
This section describes the use of firefly algorithm and simulated annealing differential extension watermarking (FASADEW) to embed reversible watermarks in relational databases. FASADEW improves the robustness of watermarks while reducing data distortion. The main architecture of FASADEW is shown in Figure 1. The algorithm consists of three modules: (1) Data preprocessing; (2) watermark embedding; (3) watermark extraction.Data preprocessing consists of two parts: Reordering tuples based on tuple primary key with key and determining the distortion range of attribute columns. The key is used for watermark embedding and extraction.
The watermark embedding phase, which is the focus of this research, is concerned with maintaining a balance between watermark capacity and data distortion prior to embedding and ensuring database availability and watermark imperceptibility.
The extraction phase and the data recovery phase include the efficient extraction of the watermark and the reversible recovery of the data. This study examines the security of embedding watermarks into a database and analyzing the proof of FASADEW through robustness experiments, assuming the presence of an insecure computer network. The possible error rates in extracting watermarks against common attacks, such as tuple insertion and deletion and attribute insertion and deletion, are analyzed. For readers' convenience, we list the notations used in this paper in Table 1.
Symbol | Description |
Di | Group i grouped using the MAC function |
τ | Total number of subgroups |
ATminx | The minimum value in attribute x |
ATmaxx | The maximum value in the attribute x |
w | watermark collection |
roww | Number of attribute pairs in Firefly that can be embedded in watermarks |
Fij | The i-th element in the j-th firefly |
n | Customize the number of firefly attribute pairs |
M | Number of attributes |
tupleUnit | Number of tuples in Firefly |
M_ATx | Value of Atx after embedding watermarks |
Distort_f | Total distortion of fireflies after embedding watermarks |
Ts | brightness threshold |
E | A collection of the brightest fireflies in the game |
D′ | Databases with embedded watermarks |
len | Length of watermark |
Data preprocessing in the database is used as the first step in embedding the watermark, in order to better distribute the watermark randomly in different tuples with different attributes in the database, to prevent a large number of watermarks from being lost due to tuple attacks and to ensure that the insertion of the watermark is independent of the way the watermark is stored in the database. The primary key is extracted to reorder the database tuples using MAC, and the attributes are reordered according to the attribute name. This approach ensures that the database watermark is robust to the reordering attack on tuple and attribute columns and effectively improves the efficiency of the subsequent creation of the initial population. The tuple grouping operation creates non-repeating groups{Di}(i=1,⋯,τ), and the group number num is determined by the primary key S and the user-defined private key:
num=H(S∥H(Sk∥S))modτ, | (8) |
where ∥ is the concatenation notation and H is the secure hash function algorithm such as (Message-Digest Algorithm 5) MD5, SHA-1, SHA-2, SHA-512 etc. In this paper, scheme SHA-512 is used to be applied to the grouping to ensure secure grouping.
The reordering groups the tuples, the tuples with the same computation result are put into the set D, the tuples with different computation results are separated and one bit of the watermark needs to be inserted into each set so the length of the watermark determines the size of the symbol τ. Define the distortion tolerance range of each attribute, which is decided by the user. If no distortion tolerance range is set, the algorithm automatically selects the minimum and maximum values of the attribute as the corresponding distortion tolerance range, and the default distortion tolerance range DT is in the interval [ATminx,ATmaxx].
This module uses the FA to create an initial population for the set screened in the preprocessing stage and customizes the firefly brightness function, moves the fireflies iteratively through the brightness function and the SA and, ultimately, the fireflies are gathered in a cluster and are selected by their high brightness, which is the optimal solution given by the algorithm, i.e., the optimal embedding location of the watermark.
Algorithm 1 Creating the initial population method |
Input: Di, w[i] |
Output: Initial population F |
Step 1: Loop the method j of step 2, j∈[1,⋯,P]. |
Step 2: Method k times of steps 2.1-2.3 of the cycle, k∈[1,⋯,M]. |
Step 2.1: Number of user-defined firefly attribute columns n. |
Step 2.2: Randomly select the nth attribute Atx in the jth row, ensuring that the selection is not |
the same each time. |
Step 2.3: Loop the method of steps 2.3.1-2.3.3 N times. |
Step 2.3.1: Atx requires a DEW operation with all attributes except it, (M_Atx,M_Aty) |
=DEW(Atx,Aty,w[i]), y∈[1,⋯,A],x≠y. |
Step 2.3.2: Calculate the distortion after applying DEW algorithm, |
distort=∣M−Atx−Atx∣+∣M−Aty−Aty∣. |
Step 2.3.3: Select the attribute pair with the least distortion to add to Fj. |
Step 3: Getting the initial population F in Di. |
Create an initial population F={F1,F2,⋯,Fp} using P fireflies. The size of P is equalized by the number of tuples in the grouping Di and each firefly uses a floating point number to represent the position of each firefly F1=3.2 represents the third attribute of the first firefly and the second attribute of the first firefly, and the steps to create the initial population are as follows.
The initial population of fireflies in a set Di is given in Figure 2, and a random element in the tuple is selected, assuming a watermark of one. This element is embedded with other attribute values using the DEW algorithm, as shown in Figure 3. After embedding, each attribute pair distortion is calculated as shown in Figure 4 and, finally, a least distorted one is selected to be added to Fij. The loop is repeated n times. The randomized algorithm selects some attribute values that are not the global minimum distortion but the local minimum distortion, so it cannot be used to embed the watermark.
The previous step creates the initial population and selects an attribute pair with the smallest distortion as an element in the firefly. In this step the luminance function needs to be defined to ensure the moving direction of the firefly. The luminance function is defined as the sum of the watermark capacity and the weight of the average attribute distortion, i.e., Bri=(roww/n)w1+∣tupleUnit/All_Distort∣w2. The weight can be adjusted appropriately by the specific engineering requirements and the calculation of the brightness function is shown in Figures 3 and 4. The sum of the weights of the brightness function Bri weights w1 and w2 is one. The higher value of w1 indicates that a higher watermarking capacity is needed in the project, and the higher value of w2 indicates that a normalized distortion is more important in the project.
The brightest firefly in each group is judged before moving, and if the brightness of the brightest firefly is greater than the set brightness threshold Ts, then the firefly can be directly added to the set E. In the original FA, the distance between two fireflies is calculated based on Cartesian coordinates, which are not available in the database, so the distance of fireflies needs to be redefined. In this paper, we use the number of different attribute pairs to define the distance between two fireflies. The movement of fireflies is the movement of ordinary fireflies toward the brightest fireflies. The main purpose of the movement of fireflies is to reduce the differences between fireflies. The movement process needs to be guided by the distance of fireflies to be complete. Since there are m attribute pairs in each firefly, we define the distance of fireflies as follows:
D(Fi,Fbest)=M∑k=1(Fik≠Fbestk). | (9) |
How to move to the brightest firefly is very important. You can use a random number to move the firefly and if the firefly contains m attribute pairs, it is different from the brightest firefly in the attribute pairs of t; that is, it is the distance of t with the brightest firefly, then in the firefly to select the range [1, t] attribute pairs for replacement, panning to replace into the attribute pairs of the brightest firefly, the specific steps are shown in Figure 5.
The random movement of the firefly in the algorithm is done by taking a random value for a part of the remaining attribute pairs so that it ensures the randomness of the movement. Next, we use the SA to update the movement of the firefly, set an initial temperature T and the cooling coefficient dT in the firefly after a movement to calculate its brightness value. If the brightness value of the firefly is greater than the brightness value before the movement, then accept the value and then drop the temperature once and use the SA to move again on a randomly moving attribute pairs to move and repeat the firefly's movement operation. Finally, the cycle stops when the temperature drops to the lowest value of the set temperature.
After all non-brightest fireflies use simulated annealing to complete the move, the SA is applied to the brightest fireflies. After moving the brightest fireflies once, the brightest fireflies in the group are re-judged and the brightest fireflies are iterated until the global optimal solution is found, and the non-brightest fireflies are also moved to the location of the brightest fireflies in a similar position through the hybrid algorithm of fireflies and simulated annealing to form a cluster. The brightest fireflies in the found clusters are added into the set E.
The brightest fireflies from all groups are added to the set E by a hybrid firefly and SA, and each firefly in the set E specifies the attribute position of the watermark embedding. The first firefly in the set E represents the first group computed by the MAC function, which contains the best embedding position of the watermark. Each watermark bit is embedded into the database by traversing the set E. The following pseudo-code specifically demonstrates embedding the watermark information into the corresponding set of the database.
Algorithm 2 Watermark Embedding Algorithm |
Input: Database D, E, watermark set w, watermark length len_w |
Output: Database with watermarked values D′ |
Step 1: Repeat steps 2-4 len_w times. |
Step 2: Extract the ith element (xi,yi) in the set E and the ith element in the watermark set, |
and embed the watermark w[i] on all attribute pairs of the ith element. |
Step 3: Embed the watermark into Atx and Aty using DEW algorithm to get M−Atx and M−Aty. |
Step 4: Re-write M−Atx and M−Aty back to the database. |
Step 5: Getting a new database D′. |
Eventually, the set E is encrypted and saved locally using the symmetric encryption algorithm advanced encryption standard (AES) to ensure the covertness and security of the watermark embedding.
The encrypted set E is decrypted, the tuples are grouped using the MAC function to obtain a series of tuples, the best fireflies in the set E are extracted and each firefly points to an attribute of the current row used for watermark embedding. Next, the watermark information is extracted by applying the DEW inverse operation to the specified attribute through E and the reconstruction restores the original value of the attribute. The pseudo-code of the watermark extraction algorithm is as follows.
Algorithm 3 Watermark Extraction Algorithm |
Input: Embedded watermark in database D′, encrypted file K_doc, private key sk |
Output: Original database D and watermark |
Step 1: Use sk to decrypt K_doc to get the best firefly set E. Get the number of elements of set |
set E E_num. |
Step 2: Use sk with D′ to reorder the database tuples into groups, aligning the watermark array |
with the reordered tuples. |
Step 3: Repeat step 4 for E_num times. |
Step 4: The ith reordered tuple and the ith firefly in E are selected, and the watermark is extracted |
by performing the inverse operation of DEW on all attribute pairs in the fireflies. |
Step 5: Obtaining the original database D and watermark. |
In this paper, we use the University of California Forest Coverage dataset to conduct experimental tests on the dataset, which includes 581,012 tuples and 54 attributes, most of which have the value of zero. Therefore, only 10 attributes in the dataset are used in the actual experiments to test the watermarking capacity, the degree of distortion and the robustness under some attacks, as well as to determine whether the method of this paper is adaptable to the database with an arbitrary number of tuples by varying the use of the tuples in the experiments. Any number of tuples of the database are adapted. With comparison experiments with the algorithms in [12,16,22,23,24,25,26], set the watermark length to 96, and all the experiments are carried out under the same embedded watermarking conditions. The experimental environment is Intel core i5-13400 processor, 16GB DDR4 memory and the operating system is windows 11 host, database mysql. The experiment is divided into four parts. The first part analyzes the watermarking capacity between each algorithm, the second part analyzes the distortion of each algorithm after completing the embedding of the watermark, the third part is the comparison of the classical algorithm and the proposed algorithm in this paper under the comparison of robustness under some known attacks.
As the size of the population in this paper is decided based on the number of tuples in the MAC function grouping, the number of population is constant in the experiment. In the experiment, the number of custom attributes n is taken in the interval [2,8], respectively, for testing the proposed method in this paper, which is randomly taken in the database 10176 for testing. The performance of this paper's method for the value of n is shown in Figure 7, where the x-axis is the number of customized attributes n and the y-axis in (a) denotes the total database distortion using the FASADEW method. The y-axis in (b) is the watermark capacity using the FASADEW method.
The results show that when n = 5, the watermarking capacity is the largest and the data distortion is low, so we set n to five. After determining n, keep n unchanged to change with dT to find the most suitable dT, and do not change T in the experiment because we can determine the annealing rate with dT as the condition. At this time, n = 5, T = 2,000, the method in this paper adjusts the dT value and the watermarking performance is shown in Figure 8. The x-axis in Figure 8 is the cooling factor dT, the y-axis in (a) is the watermarking capacity, the y-axis in (b) is the total distortion of the data and the y-axis in (c) is the time required by the algorithm.
From Figure 8 it can be seen that in the testing process the dT = 0.98 watermark capacity reaches the highest, dT = 0.99 when the minimum data distortion, dT = 0.96 when the algorithm takes the least amount of time and dT = 0.99 when the time required is the longest. At this time, to calculate the average of data distortion, we found that the average distortion of dT = 0.99 and dT = 0.98 is not much of a difference considering the efficiency of the algorithm in this paper, so we choose dT = 0.98.
Next, we test the influence of two weight parameters w1 and w2 in the luminance function corresponding to the watermark capacity and data distortion weights, and the sum of the two weights is one. The higher value of w1 in the luminance function indicates that the capacity of embedded watermarks in each group is more important and relative to the distortion, and the higher value of w2 indicates that the capacity of embedded watermarks in each group is more important and relative to the distortion. Keeping the previous n = 5, T = 2,000, dT = 0.98, the size of data distortion and watermark capacity of w1 at 0.3, 0.4, 0.5, 0.6 and 0.7 (w2 = 1-w1) were calculated and the results are shown in Figure 9, where the highest embedded watermark was produced by w1 = 0.6 among the 5 w1 tested, while the lowest distortion was produced. Therefore, n = 5, T = 2,000, dT = 0.98, w1 = 0.6 and w2 = 0.4 were used in the next experiments.
Watermark capacity is the maximum number of watermarks or the maximum amount of information that can be embedded in a given database or dataset. A higher watermark capacity means that more watermarks can be embedded or a larger amount of watermark information can be embedded. The higher the capacity, the more robust and stealthy the watermark is, which is very useful for protecting data integrity, tracking the origin of data and resisting malicious tampering [27,28,29]. In this paper, the watermark capacity is defined as:
Pcapacity=rowwM. | (10) |
To evaluate the performance of the algorithm, we conducted experiments using 214,756, 1478, 3986, 5769 and 10176 tuples in the dataset and compared the results with FADEW, particle swarm optimization (PSODEW), DEW and GADEW.
The experimental results show that the watermarking capacity of the FASADEW algorithm is comparable to that of the FADEW algorithm when faced with small datasets. However, in larger datasets (>1478), the watermarking capacity of the FASADEW algorithm has a large boost compared to the FADEW algorithm. This boost is due to the fact that the FASADEW algorithm, guided by the SA, accepts fireflies with a brightness less than the original brightness with some probability. The watermarking capacity using the FASADEW algorithm shows a significant improvement compared to the PSODEW and DEW algorithms, which is mainly due to the fact that the FASADEW algorithm has more embeddable locations.
![]() |
214 | 756 | 1478 | 3986 | 5769 | 10176 |
FASADEW | 32.7% | 33.6% | 34.9% | 37.1% | 38.3% | 38.5% |
FADEW [12] | 32.5% | 33.4% | 33.2% | 34.6% | 35.3% | 36.0% |
PSODEW [22] | 31.1% | 32.1% | 32.4% | 31.8% | 31.7% | 32.4% |
DEW [23] | 29.0% | 30.1% | 30.4% | 31.2% | 31.3% | 31.2% |
GADEW [16] | 32.1% | 33.5% | 34.4% | 36.5% | 37.2% | 37.4% |
Watermarking causes distortion of data after embedding, which can be harmful in subsequent use by the authorizer, and when the data is very different from the original data, it can lead to some wrong prediction results or the obtained data not being in line with the expectation[30,31]. In this paper, the experiments take the average distortion method to calculate the distortion. The formula is as follows:
Distort=∑Di=0∣M_Atx−Atx∣+∣M_Aty−Aty∣DataNum. | (11) |
where D represents the tuple to be embedded in the watermark and DataNum represents the number of all tuples in the database. Since the DEW algorithm is too long, it is not comparable in the distortion value analysis. The watermark distortion of each algorithm is shown in Table 3 and it can be found that the distortion using in the FASADEW algorithm is less than using FADEW, PSODEW, GADEW algorithms.
![]() |
214 | 756 | 1478 | 3986 | 5769 | 10176 |
FASADEW | 16.3 | 17.2 | 16.9 | 18.4 | 20.3 | 25.4 |
FADEW [12] | 25.6 | 26.2 | 29.4 | 31.3 | 31.6 | 32.9 |
PSODEW [22] | 24.6 | 36.1 | 35.6 | 37.3 | 37.6 | 39.8 |
DEW [23] | 31.5 | 35.7 | 35.5 | 37.1 | 38.3 | 40.7 |
GADEW [16] | 21.8 | 25.3 | 25.9 | 27.2 | 29.7 | 30.9 |
The robustness of watermarking is mainly shown in some attacks, such as anti-tuple deletion and modification attacks, addition attacks, attribute deletion attacks, tuple reordering attacks, bit reversal, etc., and the main purpose of the attacks is to destroy the watermarking message w or embedding their own watermarks[32,33]. Under these attacks, whether the watermark can be extracted correctly or not is a critical issue. In this paper, scheme experiments on some common attacks observe whether the watermark can be extracted correctly under these common attacks. Before this paper, we defined the watermark extraction rate
Pdetect=NumwNumtuple, | (12) |
where Numw is the number of watermarks detected in each type of experiment and Numtuple is the total number of successfully embedded watermarks. The robustness experiments include the cases in which the degree of attack is 10, 20, 30, 40 and 50% of the common attack methods, the watermarks are embedded for 10176 tuples in the experiments and the average value is taken after running 10 times. As shown in Figure 10, the experimental results show that FASADEW has the best performance in the case of tuple reordering attack and tuple addition attack, which can keep all the watermarks extractable, but in the case of attribute deletion attack, the results are not satisfactory. This is due to the fact that the watermarks are embedded in different attributes of a tuple. When the attribute deletion is too much, it will lead to, the watermarks being unable to be extracted.
In the following, the FASADEW algorithm of this paper is compared with FADEW, PSODEW, DEW and GADEW to compare the robustness under tuple deletion attack, attribute deletion attack and tuple reordering attack. Figures 11 demonstrate the detection rate of each algorithm watermark under both attacks.
Experimental results from (a) show that the FASADEW anti-tuple deletion attack is better than FADEW, PSODEW, DEW, GADEW algorithms. In the deletion of 50% of the tuples under the original DEW algorithm, the FASADEW algorithm improves the watermark extraction rate by 5%, where the enhancement comes from the use of a MAC function to pick out tuples are randomly selected. With the use of a different MAC function, randomly selected tuples are also different and in the end, it will affect the tuple deletion of the watermark extraction rate, so the choice of a good MAC function is also very important.
Attribute deletion is a more serious attack that deletes all the watermarks on the attribute columns while deleting the attribute columns, which is a disastrous way of embedding watermarks using the DEW algorithm. In this regard, in the FASADEW algorithm, in order to increase the capacity of watermark in the attribute values, it is proposed to use fireflies to find the optimal location for embedding the watermark. The optimal location has more than one attribute that can be embedded with the watermark, and we embed all of the multiple locations so as to achieve the effect of defending against attribute deletion attacks. From Figure 11(b), comparing the FADEW, PSODEW, DEW and GADEW algorithms, it can be found that when the proportion of attribute deletion is large, the FASADEW algorithm has strong robustness.
The tuple adding attack is to add tuples to the database using a certain amount of data. Since all the above schemes use DEW for watermark embedding in the embedding phase of the watermark, this approach takes into account the synchronization of the watermark embedding and extracting, so in the tuple adding attack, the watermark extracting rate of these schemes is 100%.
The reordering attack of tuple means that the tuple is disrupted and reordered in a certain way, while for the MAC used by the FASADEW algorithm for tuple filtering, the reordering did not disrupt the sorting of the subsequent MAC function, so the FASADEW algorithm has a watermark extraction rate of 100% under the attack of the reordering of the tuple. This means that the FASADEW is able to ensure that it is completely resistant to the attack of the tuple reordering to ensure the safety of the watermark.
In this paper, we proposed a reversible and robust digital data watermarking technique for relational databases. We combined the FA with the SA method to reduce distortion and improve the robustness of database watermarking. FASADEW is characterized by selecting the initial population by the FA and using the SA to find the optimal embedding location of the watermark, which guarantees the quality of the watermarked database. Experimental results show that FASADEW has less distortion and improves the robustness of watermarking. Because of the grouping mechanism, the method can extract most of the watermark information and recover most of the data, even if it is maliciously attacked. A large number of experiments are conducted for different attack scenarios. The experimental results show that FASADEW recovers the embedded watermark and the original data well, no matter what percentage of tuples the attacker adds. FASADEW is compared with recently proposed techniques such as DEW, GADEW, FADEW, PSODEW, GADEW etc. and the results show that FASADEW outperforms all of them. Future work is to develop reversible and robust watermarking for non-digital data and to propose watermarking schemes for shared databases in a distributed environment.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This work was supported in part by the State's Key Project of Research and Development Plan under Grant2022YFB2701400, in part by the National Natural Science Foundation of China under Grant 62272124.62002080.62361010, in part by The Natural Science Researching Program of D.o.E. of Guizhou (No.Qian Edu. & Tech. [2023] 065), in part by The Research Project of Guizhou University for Talent Introduction (No.[2020]61), in part by the Cultivation Project of Guizhou University(No.[2019]56) and in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology, Ministry of Education(GZUAMT2021KF[01]).
The authors declare there is no conflict of interest.
[1] | X. Tang, Z. Cao, X. Dong, J. Shen, PKMark: a robust zero-distortion blind reversible scheme for watermarking relational databases, in 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), (2021), 72–79. https://doi.org/10.1109/BigDataSE53435.2021.00020 |
[2] |
M. L. P. Gort, M. Olliaro, A. Cortesi, C. F. Uribe, Semantic-driven watermarking of relational textual databases, Expert Syst. Appl., 167 (2021), 114013. https://doi.org/10.1016/j.eswa.2020.114013 doi: 10.1016/j.eswa.2020.114013
![]() |
[3] |
A. S. Alghamdi, S. Naz, A. Saeed, E. Al Solami, M. Kamran, M. S. Alkatheiri, , A novel database watermarking technique using blockchain as trusted third party, Comput. Mater. Con., 70 (2022), 1585–1601. https://doi.org/10.32604/cmc.2022.019936 doi: 10.32604/cmc.2022.019936
![]() |
[4] | K. E. Drandaly, W. Khedr, A. M. Mostafa, I. Mohamed, A digital watermarking for relational database: state of Art techniques, Int. J. Adv. Sci. Tech., 29 (2020), 870–883. |
[5] |
R. Agrawal, P. J. Haas, J. Kiernan, Watermarking relational data: framework, algorithms and analysis, VLDB J., 12 (2003), 157–169. https://doi.org/10.1007/s00778-003-0097-x doi: 10.1007/s00778-003-0097-x
![]() |
[6] | Y. Zhang, B. Yang, X. M. Niu, Reversible watermarking for relational database authentication, J. Comput., 17 (2006), 59–65. |
[7] | Y. Zhang, X. M. Niu, Reversible watermark technique for relational databases, Acta Electr. Sin., 34 (2006), 2425–2428. |
[8] |
M. Shehab, E. Bertino, A. Ghafoor, Watermarking relational databases using optimization-based techniques, IEEE Trans. Knowl. Data Eng., 20 (2008), 116–129. https://doi.org/10.1109/TKDE.2007.190668 doi: 10.1109/TKDE.2007.190668
![]() |
[9] |
G. Gupta, J. Pieprzyk, Reversible and blind database watermarking using difference expansion, Int. J. Digital Crime and Forensics, 1 (2009), 42–54. https://doi.org/10.4018/jdcf.2009040104 doi: 10.4018/jdcf.2009040104
![]() |
[10] | C. C. Chang, T. S. Nguyen, C. C. Lin, A blind reversible robust watermarking scheme for relational databases, Sci. World J., 2013 (2013). https://doi.org/10.1155/2013/717165 |
[11] |
S. Iftikhar, M. Kamran, Z. Anwar, RRW—A robust and reversible watermarking technique for relational data, IEEE Trans. Knowl. Data Eng., 27 (2014), 1132–1145. https://doi.org/10.1109/TKDE.2014.2349911 doi: 10.1109/TKDE.2014.2349911
![]() |
[12] | M. B. Imamoglu, M. Ulutas, G. Ulutas, A new reversible database watermarking approach with firefly optimization algorithm, Math. Probl. Eng., 2017 (2017). https://doi.org/10.1155/2017/1387375 |
[13] |
D. Hu, D. Zhao, S. Zheng, A new Robust approach for reversible database watermarking with distortion control, IEEE Trans. Knowl. Data Eng., 3 (2019), 1024–1037. https://doi.org/10.1109/TKDE.2018.2851517 doi: 10.1109/TKDE.2018.2851517
![]() |
[14] |
S. Rani, R. Halder, Comparative analysis of relational database watermarking techniques: an empirical study, IEEE Access, 10 (2022), 27970–27989. https://doi.org/10.1109/ACCESS.2022.3157866 doi: 10.1109/ACCESS.2022.3157866
![]() |
[15] | S. Xiang, G. Ruan, H. Li, J. He, Robust watermarking of databases in order-preserving encrypted domain, Front. Comput. Sci., 16 (2022) 162804. https://doi.org/10.1007/s11704-020-0112-z |
[16] |
K. Jawad, A. Khan, Genetic algorithm and difference expansion based reversible watermarking for relational databases, J. Syst. Softw., 86 (2013), 2742–2753. https://doi.org/10.1016/j.jss.2013.06.023 doi: 10.1016/j.jss.2013.06.023
![]() |
[17] | K. E. Parsopoulos, M. N. Vrahatis, Particle swarm optimization method for constrained optimization problems, in Intelligent Technologies: From Theory to Applications, IOS Press, (2002), 214–220. |
[18] | J. Kennedy, R. Eberhart, Particle swarm optimization, in Proceedings of ICNN'95 - International Conference on Neural Networks, 4 (1995), 1942–1948. https://doi.org/10.1109/ICNN.1995.488968 |
[19] | A. Colorni, M. Dorigo, V. Maniezzo, and others, Distributed optimization by ant colonies, in Proceedings of the first European conference on artificial life, (1991), 134–142. |
[20] | D. Karaboga, An idea based on honey bee swarm for numerical optimization, in Technical report-tr06, Erciyes university, engineering faculty, computer engineering department, 2005. |
[21] |
K. Unnikrishnan, K. V. Pramod, Prediction-based robust blind reversible watermarking for relational databases, Int. J. Inform. Comput. Secur., 14 (2021), 211–228. https://doi.org/10.1504/IJICS.2021.114702 doi: 10.1504/IJICS.2021.114702
![]() |
[22] | X. S. Yang, Nature-inspired Metaheuristic Algorithms, Luniver Press, Frome, 2008. |
[23] |
A. M. Alattar, Reversible watermark using the difference expansion of a generalized integer transform, IEEE Trans. Image Process., 13 (2004), 1147–1156. https://doi.org/10.1109/TIP.2004.828418 doi: 10.1109/TIP.2004.828418
![]() |
[24] | Y. Li, J. Wang, X. Luo, A reversible database watermarking method non-redundancy shifting-based histogram gaps, Int. J. Distrib. Sens. Netw., 16 (2020). https://doi.org/10.1177/1550147720921769 |
[25] | A. Khan, S. A. Husain, A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations, Sci. World J., 2013 (2013). https://doi.org/10.1155/2013/796726 |
[26] | L. Camara, J. Li, R. Li, W. Xie, Distortion-free watermarking approach for relational database integrity checking, Math. Probl. Eng., 2014 (2014). https://doi.org/10.1155/2014/697165 |
[27] |
Y. Li, J. Wang, S. Ge, X. Luo, B. Wang, A reversible database watermarking method with low distortion, Math. Biosci. Eng., 16 (2019), 4053–4068. https://doi.org/10.3934/mbe.2019200 doi: 10.3934/mbe.2019200
![]() |
[28] |
S. Xiao, X. Zuo, Z. Zhang, F. Li, Large-capacity reversible image watermarking based on improved DE, Math. Biosci. Eng., 19 (2022), 1108–1127. https://doi.org/10.3934/mbe.2022051 doi: 10.3934/mbe.2022051
![]() |
[29] |
A. Alqassab, M. Alanezi, Relational database watermarking techniques: A survey, J. Phys.: Conf. Ser., 1818 (2021), 012185. https://doi.org/10.1088/1742-6596/1818/1/012185 doi: 10.1088/1742-6596/1818/1/012185
![]() |
[30] | X. Shen, Y. Zhang, T. Wang, Y. Sun, Relational database watermarking for data tracing, in 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), (2020), 224–231. https://doi.org/10.1109/CyberC49757.2020.00043 |
[31] | H. M. Sardroudi, S. Ibrahim, A new approach for relational database watermarking using image, in 5th International Conference on Computer Sciences and Convergence Information Technology, (2010), 606–610. https://doi.org/10.1109/ICCIT.2010.5711126 |
[32] |
A. Phadikar, S. P. Maity, B. Verma, Region based QIM digital watermarking scheme for image database in DCT domain, Comput. Electr. Eng., 37 (2011), 339–355. https://doi.org/10.1016/j.compeleceng.2011.02.002 doi: 10.1016/j.compeleceng.2011.02.002
![]() |
[33] | S. Melkundi, C. Chandankhede, A robust technique for relational database watermarking and verification, in 2015 International Conference on Communication, Information and Computing Technology (ICCICT), (2015), 1–7. https://doi.org/10.1109/ICCICT.2015.7045676 |
1. | Jong Hyuk Park, Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities, 2024, 21, 1551-0018, 7012, 10.3934/mbe.2024307 |
Symbol | Description |
Di | Group i grouped using the MAC function |
τ | Total number of subgroups |
ATminx | The minimum value in attribute x |
ATmaxx | The maximum value in the attribute x |
w | watermark collection |
roww | Number of attribute pairs in Firefly that can be embedded in watermarks |
Fij | The i-th element in the j-th firefly |
n | Customize the number of firefly attribute pairs |
M | Number of attributes |
tupleUnit | Number of tuples in Firefly |
M_ATx | Value of Atx after embedding watermarks |
Distort_f | Total distortion of fireflies after embedding watermarks |
Ts | brightness threshold |
E | A collection of the brightest fireflies in the game |
D′ | Databases with embedded watermarks |
len | Length of watermark |
![]() |
214 | 756 | 1478 | 3986 | 5769 | 10176 |
FASADEW | 32.7% | 33.6% | 34.9% | 37.1% | 38.3% | 38.5% |
FADEW [12] | 32.5% | 33.4% | 33.2% | 34.6% | 35.3% | 36.0% |
PSODEW [22] | 31.1% | 32.1% | 32.4% | 31.8% | 31.7% | 32.4% |
DEW [23] | 29.0% | 30.1% | 30.4% | 31.2% | 31.3% | 31.2% |
GADEW [16] | 32.1% | 33.5% | 34.4% | 36.5% | 37.2% | 37.4% |
Symbol | Description |
Di | Group i grouped using the MAC function |
τ | Total number of subgroups |
ATminx | The minimum value in attribute x |
ATmaxx | The maximum value in the attribute x |
w | watermark collection |
roww | Number of attribute pairs in Firefly that can be embedded in watermarks |
Fij | The i-th element in the j-th firefly |
n | Customize the number of firefly attribute pairs |
M | Number of attributes |
tupleUnit | Number of tuples in Firefly |
M_ATx | Value of Atx after embedding watermarks |
Distort_f | Total distortion of fireflies after embedding watermarks |
Ts | brightness threshold |
E | A collection of the brightest fireflies in the game |
D′ | Databases with embedded watermarks |
len | Length of watermark |
![]() |
214 | 756 | 1478 | 3986 | 5769 | 10176 |
FASADEW | 32.7% | 33.6% | 34.9% | 37.1% | 38.3% | 38.5% |
FADEW [12] | 32.5% | 33.4% | 33.2% | 34.6% | 35.3% | 36.0% |
PSODEW [22] | 31.1% | 32.1% | 32.4% | 31.8% | 31.7% | 32.4% |
DEW [23] | 29.0% | 30.1% | 30.4% | 31.2% | 31.3% | 31.2% |
GADEW [16] | 32.1% | 33.5% | 34.4% | 36.5% | 37.2% | 37.4% |
![]() |
214 | 756 | 1478 | 3986 | 5769 | 10176 |
FASADEW | 16.3 | 17.2 | 16.9 | 18.4 | 20.3 | 25.4 |
FADEW [12] | 25.6 | 26.2 | 29.4 | 31.3 | 31.6 | 32.9 |
PSODEW [22] | 24.6 | 36.1 | 35.6 | 37.3 | 37.6 | 39.8 |
DEW [23] | 31.5 | 35.7 | 35.5 | 37.1 | 38.3 | 40.7 |
GADEW [16] | 21.8 | 25.3 | 25.9 | 27.2 | 29.7 | 30.9 |