Filters








854 Hits in 3.7 sec

Survey on Robust and Reversible Watermarking for Relational Data

Udaya Rani, Shreedevi B., Vinayak Murthy
2016 International Journal of Computer Applications  
In the course of recent years, reversible watermarking systems for social databases have been proposed to give assurance of possession rights, information treating, and information trustworthiness.  ...  Nevertheless, such approaches are in general now not strong towards malicious assaults and what's more, don't supply any component to specifically watermark a one of a kind quality by means of considering  ...  OVERVIEW DATABASE WATERMARKING Now-a-days various data on the web is on hand on the type of databases.  ... 
doi:10.5120/ijca2016909282 fatcat:kzi3ywnmgbaibencvfk6tspzhi

Watermark based Copyright Protection for Relational Database

Ramani SagarV
2013 International Journal of Computer Applications  
Relational database is widely used in many information systems, as a tool for storing and managing a data. Major issue to protect the copyright of relational data.  ...  Keywords Database watermarking, image , relational database,MD5 algorithm Figure 1: CSI/FBI Computer Crime Security Survey  ...  desirable properties of a watermarking system for relational data.  ... 
doi:10.5120/13462-0713 fatcat:cydyp76w7fcd5ehqsknoyfkgu4

Reversible Fragile Watermarking Scheme for Relational Database Based on Prediction-Error Expansion

Ali Hamadou, Lanciné Camara, Abdoul Aziz Issaka Hassane, Harouna Naroua
2020 Mathematical Problems in Engineering  
Since such distortions are not tolerated in many applications, including banking, medical, and military data, reversible watermarking, primarily designed for multimedia content, has been extended to relational  ...  The protection of database systems content using digital watermarking is nowadays an emerging research direction in information security.  ...  Previous Work Several recent surveys have provided detailed discussion on relational database watermarking [1] [2] [3] [4] [5] .  ... 
doi:10.1155/2020/1740205 fatcat:f6btw7karfhkbn726ia3hofdlm

Literature Review On Watermarking Techniques Of Relational Databases

KANCHAN S. RAHINJ
2017 Zenodo  
These paper describe,History of watermarking,Applications of digital watermark for relational databases,Types of attacks on watermark database,and most important existing watermarking technique s .  ...  Watermarking is commonly used technique in which,information is enforced to prove ownership on different types of data such as image,audio,video,text and relational database.  ...  CONCLUSIONS In this paper we survey the current state of the different watermarking techniques for relational databases.  ... 
doi:10.5281/zenodo.1456454 fatcat:goxgtxcx7fewfa22fmamx34zxa

Distortion-Free Authentication Watermarking [chapter]

Sukriti Bhattacharya, Agostino Cortesi
2013 Communications in Computer and Information Science  
In this paper 1 we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism  ...  Techniques developed for multimedia data cannot be directly used for watermarking relational databases, because relational and multimedia data differ in a number of important respects [8] .  ...  Basic Watermarking Process The motivation for database watermarking is to protect databases, especially those published online as parametric specifications, surveys or life sciences biometric data, from  ... 
doi:10.1007/978-3-642-29578-2_13 fatcat:gagjocmrx5gcnmk34rkvns6kgy

Distortion Free Database Watermarking System Based on Intelligent Mechanism for Content Integrity and Ownership Control

Saad M. Darwish
2018 Journal of Computers  
a separate object so, the watermark is spread over these separate objects, (2) Out-of-Order Relational Data: The relative spatial/temporal positions of different parts of multimedia objects do not change  ...  Still, most of these database distortion free watermarking schemes are usually developed to protect specific types of data such as numeric or categorical attributes.  ...  Introduction While demand for the use of databases is growing, the piracy issue of relational data has become a serious problem.  ... 
doi:10.17706/jcp.13.9.1053-1066 fatcat:4g4eozfw4bfixb56nkmo7x2m74

An Effective Approach for Non-Numeric Relational Database Verification

Lancine Camara, Demba Coulibaly, Ali Hamadou, Junyi Li
2017 International Journal of Database Theory and Application  
In this paper, we present a distortion free approach to verify the integrity of a combined numeric and non-numeric relational database.  ...  With the large distribution of digital data, protecting their integrity becomes necessary and digital watermarking has been proposed as solution for protecting the content of relational database.  ...  This paper presents a group-based distortion free watermarking technique for tampering detection in relational database without caring about the data type.  ... 
doi:10.14257/ijdta.2017.10.6.03 fatcat:sapveffhuzfwlgbetdlrrxi5ki

Watermarking Relational Database Using Hindi Phonemes and Hill Cipher Technique

Rajneeshkaur K. Bedi, Dr. V. M Wadhai
2014 IOSR Journal of Computer Engineering  
In this paper, a new relational database watermarking method for non-numeric data is proposed based on nonnumeric attributes. A mark is computed based on the hill cipher technique.  ...  The use of databases in various internet base applications has increased tremendously and theft of the data from database is a main concern for the database owners.  ...  Acknowledgements This is the research work associated to the PhD work going on under Sant Gadge Baba Amravati University (SGBAU) and PG Department of Computer Science and Engineering, Amravati.  ... 
doi:10.9790/0661-1633102107 fatcat:b544cnnrgzexhmkokpli46spje

A Comprehensive Survey of Watermarking Relational Databases Research [article]

Muhammad Kamran, Muddassar Farooq
2018 arXiv   pre-print
Watermarking and fingerprinting of relational databases are quite proficient for ownership protection, tamper proofing, and proving data integrity.  ...  A survey of almost all the work done, till date, in these fields has been presented in this paper. The techniques have been classified on the basis of how and where they embed the watermark.  ...  The watermarking of relational databases is different from other data formats.  ... 
arXiv:1801.08271v1 fatcat:ensgymv35be67jebrgqasvel7u

Watermarking Categorical Data : Algorithm and Robustness Analysis

Vidhi Khanduja, Shampa Chakraverty, Om Prakash Verma
2015 Defence Science Journal  
To deter piracy, we propose a robust watermarking scheme for relational databases containing categorical data that resolves ownership issues. We propose a three-level security strategy.  ...  The process of embedding does not produce any distortion in the database.  ...  He is studying at Netaji Subhas Institute of Technology, Delhi,  ... 
doi:10.14429/dsj.65.8444 fatcat:2e3vfpmelvcrjbutvrcusu7tby

A Novel Watermarking Scheme for Detecting and Recovering Distotions in Database Tables

Hamed khataeimaragheh, Hassan Rashidi
2010 International Journal of Database Management Systems  
In this paper a novel fragile watermarking scheme is proposed to detect, localize and recover malicious modifications in relational databases.  ...  By using the embedded watermark, we are able to detect and localize the modification made to the database and even we recover the true data from the database modified locations.  ...  Since the watermarking process will inevitably introduce small distortions to a relational database, we assume that the relational database to be watermarked has numerical attributes which tolerate small  ... 
doi:10.5121/ijdms.2010.2301 fatcat:zbkfurlwxvcvzhv35c3b64js5i

A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints

M. Kamran, Sabah Suhail, Muddassar Farooq
2013 IEEE Transactions on Knowledge and Data Engineering  
who want tight usability constraints that ensure minimum distortions in the data; and (4) last but not least, it should not require that a database owner defines usability constraints for each type of  ...  The major contribution of this paper is a robust and efficient watermarking scheme for relational databases that is able to meet all above-mentioned four challenges.  ...  A recent survey [18] presented a review of database watermarking techniques but, to the best of our knowledge, no watermarking technique for relational databases exists which ensures that the decoding  ... 
doi:10.1109/tkde.2012.227 fatcat:36662pgu5jhcfkhbzv6gtcf7ty

RRW—A Robust and Reversible Watermarking Technique for Relational Data

Saman Iftikhar, M. Kamran, Zahid Anwar
2015 IEEE Transactions on Knowledge and Data Engineering  
Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data tampering.  ...  Advancement in information technology is playing an increasing role in the use of information systems comprising relational databases.  ...  The watermark information is normally embedded in the LSB of features of relational databases to minimize distortions.  ... 
doi:10.1109/tkde.2014.2349911 fatcat:zpaxi5lt2fhq3n7wzr2hhkd2ee

Watermill: An Optimized Fingerprinting System for Databases under Constraints

J. Lafaye, D. Gross-Amblard, C. Constantin, M. Guerrouani
2008 IEEE Transactions on Knowledge and Data Engineering  
This paper presents a watermarking/fingerprinting system for relational databases.  ...  It features a built-in declarative language to specify usability constraints that watermarked data sets must comply with.  ...  Watermarking techniques are widely studied in the area of multimedia documents (see [5] and [12] for a survey), and several recent efforts have lead to solutions for watermarking relational databases  ... 
doi:10.1109/tkde.2007.190713 fatcat:sntygw23bjfk5cs6oij2nj4q54

A robust multiple watermarking technique for information recovery

Vidhi Khanduja, Shampa Chakraverty, Om Prakash Verma, Rakshita Tandon, Sahil Goel
2014 2014 IEEE International Advance Computing Conference (IACC)  
In this paper, we propose a new technique for multiple watermarking of relational databases that provides a unified solution to two major security concerns; ownership identification and information recovery  ...  In order to resolve ownership conflicts a secure watermark is embedded using a secret key known only to the database owner.  ...  In [12] , Khataeimaragheh et.al proposed a fragile watermarking technique that can detect and correct distortions in relational databases by embedding watermarks created from each attribute value, thereby  ... 
doi:10.1109/iadcc.2014.6779329 fatcat:xiizavhx2jhtfconlytqwkr6fy
« Previous Showing results 1 — 15 out of 854 results