A Semi Blind Reversible Watermarking On Numerical Relational Database
Abstract
Watermarking method is to recognizable pattern used to identify authenticity. Intentionally introduced pattern in the data is hard to find and destroy, robust again malicious attack. WATERMARKING, without any exception ,has been used for ownership protection of a number of data format-images, videos, audio, software, XML documents, geographic information system(GIS) related data, text document, relational databases and so on-that are used in different application domains. Recently, intelligent mining techniques are being used on data, extracted from relational databases, to detect interesting pattern(generally hidden in the data) that provide significant support to decision makers in making effective, accurate and relevant decisions; as a result, sharing of data between its owners and legitimate users. the owners of relational database embeds the watermark data, the distortion in the original data are kept within certain limits, which are defined by the usability constraints, to preserve the knowledge contained in the data. The proposed algorithm embeds every bit of a multi bit water mark (generated from date/time).In each selected row(in a numeric attribute)with a objective of having maximum robustness even if an attacker is somehow able to successfully corrupt the watermark in some selected part of the data set.
Keywords
Full Text:
PDFReferences
G. Gupta and J. Pieprzyk, “Database relation watermarking resilient against secondary watermarking attacks,” in Information Systems and Security. New York, NY, USA: Springer, 2009, pp. 222–236
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
P. W. Wong, “A public key watermark for image verification and authentication,” in Proc. IEEE Int. Conf. Image Process., 1998, vol. 1, pp. 455–459.
K. Huang, H. Yang, I. King, M. R. Lyu, and L. Chan, “Biased minimax probability machine for medical diagnosis,” AMAI, 2004.
M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen, and M. K. Khan, “A blind reversible method for watermarking relational databases based on a time-stamping protocol,” Expert Syst. Appl., vol. 39, no. 3, pp. 3185–3196, 2012.
P. E. Gill, W. Murray, and M. A. Saunders, “Snopt: An sqp algorithm for large-scale constrained optimization,” SIAM Rev., vol. 47, no. 1, pp. 99–131, 2005.
Y.-C. Liu, Y.-T. Ma, H.-S. Zhang, D.-Y. Li, and G.-S. Chen, “method for trust management in cloud computing: Data coloring by cloud watermarking,” Int. J. Autom. Comput., vol. 8, no. 3, pp. 280–285, 2011
D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process.,
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.