
Maikel Lázaro Pérez Gort- PhD
- Assistant Professor (Non-Tenure) at Ca' Foscari University of Venice
Maikel Lázaro Pérez Gort
- PhD
- Assistant Professor (Non-Tenure) at Ca' Foscari University of Venice
About
17
Publications
941
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
117
Citations
Introduction
I am an assistant professor at Università Ca’ Foscari, with an M.Sc. in Applied Informatics from Universidad Tecnológica de La Habana and a Ph.D. in Computer Sciences from INAOE, México. My research focuses on relational database theory, information security, privacy, and data authenticity. I have contributed to international projects on watermarking algorithms and IoT security, with results published in leading venues in cybersecurity and data protection.
Current institution
Additional affiliations
May 2021 - present
Publications
Publications (17)
Watermarking techniques aim to protect relational databases by embedding on them a copyright signal known as the watermark without imposing additional restrictions. However, unlike other digital assets, such as multimedia data, relational data are often subject to frequent updates that may dramatically compromise the quality of the embedded waterma...
Volumes of data generated from remote sensing activities have grown larger in the last years due to the increasing number of satellites orbiting the earth and the development of drones and their sensors. Multiple online providers allow obtaining the data of a geographical location from a given time period. Furthermore, free downloading of data sets...
Accessing relational databases through web services increases risks of piracy and tampering. Watermarking guarantees data protection without constraining their access and management. Researchers traditionally compare the extracted watermark with the embedded one after simulating attacks to analyze its robustness. However, the literature has not add...
Cite this paper as:
Martina Olliaro, Maikel Lázaro Pérez Gort, Agostino Cortesi:
"Empirical Analysis of the Impact of Queries on Watermarked Textual Relational Databases".
Expert Systems with Applications.
Volume 204, 15 October 2022, 117491. Elsevier publ.
https://doi.org/10.1016/j.eswa.2022.117491 .
Abstract:
Robust relational database watermar...
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteeing watermark persistence despite aggressive attacks. Nevertheless, attackers cannot compromise watermark detection to their will since they must ensure the usability of the stolen data. Attacks that constitute a potential master-key for false ownershi...
Contrary to multimedia data watermarking approaches, it is not recommended that relational data watermarking techniques consider sequential selection for marks in the watermark and embedding locations in the digital asset being protected. Indeed, considering the database relations’ elements, i.e., tuple and attributes, when watermarking techniques...
Robust relational database watermarking techniques aim to preserve the watermark in the protected assets despite daily updates and malicious attacks. Nevertheless, most techniques do not analyze the root of operations that can degrade the embedded watermark signal, being that the case of Structured Query Language (SQL) queries for relational data....
Distortion-based watermarking techniques embed the watermark by performing tolerable changes in the digital assets being protected. For relational data, mark insertion can be performed over the different data types of the database relations’ attributes. An important goal for distortion-based approaches is to minimize as much as possible the changes...
In relational database watermarking, the semantic consistency between the original database and the distorted one is a challenging issue which is disregarded by most watermarking proposals, due to the well-known assumption for which a small amount of errors in the watermarked database is tolerable. We propose a semantic-driven watermarking approach...
Relational data watermarking techniques using virtual primary key schemes try to avoid compromising watermark detection due to the deletion or replacement of the relation’s primary key. Nevertheless, these techniques face the limitations that bring high redundancy of the generated set of virtual primary keys, which often compromises the quality of...
Relational data watermarking techniques using virtual primary key schemes try to avoid compromising watermark detection due to the deletion or replacement of the relation’s primary key. Nevertheless, these techniques face the limitations that bring high redundancy of the generated set of virtual primary keys, which often compromises the quality of...
False ownership claims are carried on through additive and invertibility attacks and, as far as we know, current relational watermarking techniques are not always able to solve the ownership doubts raising from the latter attacks. In this paper, we focus on additive attacks. We extend a conventional image-based relational data watermarking scheme b...
Most of the watermarking techniques designed to protect relational data often use the Primary Key (PK) of relations to perform the watermark synchronization. Despite offering high confidence to the watermark detection, these approaches become useless if the PK can be erased or updated. A typical example is when an attacker wishes to use a stolen re...
In this paper, a new multi-attribute and high capacity image-based watermarking technique for relational data is proposed. The embedding process causes low distortion into the data considering the usability restrictions defined over the marked relation. The conducted experiments show the high resilience of the proposed technique against tuple delet...