Preview

Watermarking Relational Databases

Powerful Essays
Open Document
Open Document
3087 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Watermarking Relational Databases
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.3, No.1, February 2013

WATERMARKING RELATIONAL DATABASES
Mayuree K.Rathva¹,Prof.G.J.Sahani²
Dept.of Computer Engineering, SVIT,Vasad, Anand,Gujarat, INDIA
¹mayurirathva@gmail.com and ²Gurcharan_sahani@yahoo.com

ABSTRACT
Uptil now most of the work is done on image, video, audio.but today the Database watermarking becomes the research topic because of the increasing the use of relational database systems. Which deals with the legal issue of copyright protection of database systems. .Watermarking is an information hiding technique which is used to embed a mark within some host content. In this paper,we have focused on the review of four relational database watermarking techniques proposed by researchers [R.Agarwal & Jerry Kiernan, ZHU Qin, Brijesh B. Mehta, A.Odeh and A. Al-Haj].

KEYWORDS
Database Security, Database Watermarking, Multi-place Watermarking, Copyright Protection.

1. INTRODUCTION
Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the



References: [1] [2] [3] [4] [5] R. Agrawal and J. Kiernan.” Watermarking relational databases”. In Proceedings of The 28th International Conference on Very Large Databases VLDB, 2002. ZHU Qin, YANG Ying, LE Jia-jin, LUO Yishu,(2006)“Watermark based Copyright Protection of Outsourced Database,” IEEE, IDEAS, pp. 1-5. Brijesh B. Mehta, Udai Pratap Rao,” A Novel approach as Multi-place Watermarking For Security in Database”Dept. of Computer Engineering, S. V. National Institute of Technology, Surat, Gujarat A. Odeh and A. Al-Haj “Watermarking Relational Database Systems”, IEEE, pp. 270-274, 2008. Raju Halder, Shantanu Pal, Agostino Cortesi,”(2010) Watermarking Techniques for Relational Databases: Survey, Classification and Comparison” Journal of Universal Computer Science, vol. 16, no. 21, 3164-3190. Prof.Bhawana Ahire, Prof. Neeta Deshpande,” Watermarking relational databases: A Review”,IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 8. [6] 79

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    Unit 18 - Database P1, M1

    • 995 Words
    • 4 Pages

    Every database management system should have these feature to protect and ensure the data is safe and accuracy.…

    • 995 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Sidpers

    • 2831 Words
    • 12 Pages

    Afyouni, Hassan, Database Security and Auditing, Protecting Data Integrity and Accessibility, 2006 Thomson Course Technology…

    • 2831 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    References: Ali, I. (2006, July 24). Copyright Protection-Software-Computer Programs. Retrieved December 4, 2010 from http://www.lawdit.co.uk/reading_room/room/view_article.asp?name=../articles/Computer%20Protection-%20Software-Computer%20Programs.htm…

    • 1793 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are…

    • 962 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Apa Manual 6th Edition

    • 814 Words
    • 4 Pages

    and digitization, or stored in a database or retrieval system, without the prior written permission o f…

    • 814 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    In this document I will be discussing the laws that are related to security and privacy of datas, I will explain how they relate to the security and privacy of data.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Fundamental of information security is based on three principle Confidentiality, Integrity and Availability. How a user will be able to access asset by following these three principle is called as Access control. “Access control is the process of allowing only authorized users, programs and other computer system (i.e. networks) to observe, modify or otherwise take possession of resources of a computer system. It is also a mechanism for limiting the use of some resources to authorized users.”…

    • 553 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nowadays Database Management System (DBMS) is the important part of many important industries. Databases hold everything from sales, inventory, payroll, accounting, personnel and more. A properly maintained and designed database can give managers insights into trends and information that might Have been otherwise missed. Presently with the large amount of DBMS versions, it is a problem to choose exact and proper database for your requirement. The main reason for my presentation is to help us understand some of the differences between databases and realize that there are some fundamental differences between database implementations. With this paper I want to introduce about differences between two well-known database systems such a MySQL and Oracle. With this paper reader can differentiate two database above with three aspects: security, data type and data storage concepts. Section 2.1, for understand security advantages of two database systems. Section 2.2, with listed data type of two database systems we can differentiate data types. The section 2.3 provide a description of the conceptual differences and similarities in data storage for MySQL and Oracle databases.…

    • 1593 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Backup Methods

    • 642 Words
    • 3 Pages

    One of the important aspects of data security involves protecting data from loss or destruction. In this short paper, I will cover the backup methods we can use to protect our data and reduces the chances of data loss.…

    • 642 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    With the increase in human population, digital information is also increasing exponentially. In 2007, 97 percent of assessment showed that approximately 93 percent of information was stored digitally as opposed to less than 1% in 1986. With the amount of information stored digitally, there is an increasing need to share and allow access to the appropriate individuals [1]. As user populations of information system have expanded, the challenge of controlling access to resources using security policies has grown. Access Control is the process for proving authority to access the specific resources, applications and system.…

    • 1572 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 2061 Words
    • 9 Pages

    Rapid development of automation processes and the penetration of the computers in all fields of life have lead to appearance of a range of peculiar problems. One of these problems is the necessity of providing effective protection to information and means of its processing.…

    • 2061 Words
    • 9 Pages
    Powerful Essays