In relational data watermarking, several virtual primary key (VPK) schemes have been proposed to address threats such as primary key (PK) deletion. These schemes face significant challenges and are often evaluated under heterogeneous assumptions and criteria. This paper provides a systematic qualitative and quantitative evaluation of existing VPK schemes, as well as alternative solutions that avoid relying on PKs for watermark synchronization. We standardize notation and terminology, organize the design space according to VPK generation and management strategies, and compare major scheme families using consistent criteria covering duplication behavior, deletion resilience, attribute involvement, and computational overhead. The analysis highlights progress achieved, remaining limitations, and open research challenges. Finally, the paper distills practical selection guidelines for PK-unavailable data-sharing and processing pipelines and motivates future work on realistic threat models and reproducible benchmarks.

A qualitative and quantitative comparative study of VPK schemes for relational data watermarking

Perez Gort M. L.;Cortesi A.
2026

Abstract

In relational data watermarking, several virtual primary key (VPK) schemes have been proposed to address threats such as primary key (PK) deletion. These schemes face significant challenges and are often evaluated under heterogeneous assumptions and criteria. This paper provides a systematic qualitative and quantitative evaluation of existing VPK schemes, as well as alternative solutions that avoid relying on PKs for watermark synchronization. We standardize notation and terminology, organize the design space according to VPK generation and management strategies, and compare major scheme families using consistent criteria covering duplication behavior, deletion resilience, attribute involvement, and computational overhead. The analysis highlights progress achieved, remaining limitations, and open research challenges. Finally, the paper distills practical selection guidelines for PK-unavailable data-sharing and processing pipelines and motivates future work on realistic threat models and reproducible benchmarks.
2026
743
File in questo prodotto:
File Dimensione Formato  
InformationSciences2026.pdf

accesso aperto

Tipologia: Versione dell'editore
Licenza: Creative commons
Dimensione 4.42 MB
Formato Adobe PDF
4.42 MB Adobe PDF Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/5115080
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact