Open Access Open Access  Restricted Access Subscription or Fee Access

A Semi Blind Reversible Watermarking On Numerical Relational Database

M. Pooja, M. Poornima, T. Priyanka, K.L. Shanthi Priya

Abstract


Watermarking method is to recognizable pattern used to identify authenticity. Intentionally introduced pattern in the data is hard to find and destroy, robust again malicious attack. WATERMARKING, without any exception ,has been used for ownership protection of a number of data format-images, videos, audio, software, XML documents, geographic information system(GIS) related data, text document, relational databases and  so on-that are used in  different application domains. Recently, intelligent mining  techniques are being used on data, extracted from relational databases, to detect interesting pattern(generally hidden in the data) that provide significant support to decision makers in making effective, accurate and relevant decisions; as a result, sharing of data between its owners and legitimate users. the owners of relational database embeds the watermark data, the distortion in the original data are kept within certain limits, which are defined by the usability constraints, to preserve the knowledge contained in the data. The proposed algorithm embeds every bit of a multi bit water mark (generated from date/time).In each selected row(in a numeric attribute)with a objective of  having maximum robustness even if an attacker is somehow able to successfully corrupt the watermark in some selected part of the data set.


Keywords


Reversible Watermarking, md5 Algorithm, Data Recovery, Data Quality, Robustness, Numerical Data

Full Text:

PDF

References


G. Gupta and J. Pieprzyk, “Database relation watermarking resilient against secondary watermarking attacks,” in Information Systems and Security. New York, NY, USA: Springer, 2009, pp. 222–236

I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.

P. W. Wong, “A public key watermark for image verification and authentication,” in Proc. IEEE Int. Conf. Image Process., 1998, vol. 1, pp. 455–459.

K. Huang, H. Yang, I. King, M. R. Lyu, and L. Chan, “Biased minimax probability machine for medical diagnosis,” AMAI, 2004.

M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen, and M. K. Khan, “A blind reversible method for watermarking relational databases based on a time-stamping protocol,” Expert Syst. Appl., vol. 39, no. 3, pp. 3185–3196, 2012.

P. E. Gill, W. Murray, and M. A. Saunders, “Snopt: An sqp algorithm for large-scale constrained optimization,” SIAM Rev., vol. 47, no. 1, pp. 99–131, 2005.

Y.-C. Liu, Y.-T. Ma, H.-S. Zhang, D.-Y. Li, and G.-S. Chen, “method for trust management in cloud computing: Data coloring by cloud watermarking,” Int. J. Autom. Comput., vol. 8, no. 3, pp. 280–285, 2011

D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process.,


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.