CFP last date
20 December 2024
Reseach Article

Experimental Study of Improved Watermarking Scheme on Relational Databases

by N.g. Pardeshi, J.n. Kale, M.s. Ankoshe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 12
Year of Publication: 2015
Authors: N.g. Pardeshi, J.n. Kale, M.s. Ankoshe
10.5120/19239-0906

N.g. Pardeshi, J.n. Kale, M.s. Ankoshe . Experimental Study of Improved Watermarking Scheme on Relational Databases. International Journal of Computer Applications. 109, 12 ( January 2015), 9-15. DOI=10.5120/19239-0906

@article{ 10.5120/19239-0906,
author = { N.g. Pardeshi, J.n. Kale, M.s. Ankoshe },
title = { Experimental Study of Improved Watermarking Scheme on Relational Databases },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 12 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number12/19239-0906/ },
doi = { 10.5120/19239-0906 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:44:35.995763+05:30
%A N.g. Pardeshi
%A J.n. Kale
%A M.s. Ankoshe
%T Experimental Study of Improved Watermarking Scheme on Relational Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 12
%P 9-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main objective of watermarking is to protect a digital content from unauthorized redistribution and copying by enabling ownership provability over the content. The goal of digital watermarking is to insert a robust and imperceptible watermark into the digital content such that the mark does not destroy the value of the content, and the mark is hard to be removed by attackers without destroying the utility of content. The measurement of the value of the content is closely related to the data type and its intended use. We have proposed a new marking scheme called as improved watermarking. Watermarking scheme first generates the bit string of fixed length. The mark bit is computed with the help of watermark bit and mask bit, which is used to mark the certain bit location of the attribute value.

References
  1. I. J. Cox and M. L. Miller. February 1997. A review of watermarking and the importance of perceptual modeling. In Proc. of Electronic Imaging.
  2. N. F. Johnson, Z. Duric, and S. Jajodia. 2000. Information Hiding: Steganography and Watermarking – Attacks and Countermeasures. Kluwer Academic Publishers.
  3. S. Katzenbeisser and F. A. Petitcolas, editors. 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House.
  4. Joseph J. K. ´O Ruanaidh, W. J. Dowling, and F. M. Boland. 1996. Watermarking digital images for copyright protection. IEEE Proceedings on Vision, Signal and Image Processing, 143(4):250–256.
  5. F. Hartung and B. Girod. 1998. Watermarking of uncompressed and compressed video. Signal Processing, 66(3):283–301.
  6. L. Boney, A. H. Tewfik, and K. N. Hamdy. June 1996. Digital watermarks for audio signals. In International Conference on Multimedia Computing and Systems, Hiroshima, Japan.
  7. S. Czerwinski. Digital music distribution and audio watermarking. Available from http://citeseer. nj. nec. com
  8. M. Atallah and S. Wagstaff. January 1999. Watermarking with quadratic residues. In Proc. of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents.
  9. C. S. Collberg and C. Thomborson. Feb 2000. Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection. Technical Report 2000-03, University of Arizona.
  10. S. Benjamin, B. Schwartz, and R. Cole. 1999. Accuracy of ACARS wind and temperature observations determined by collocation. Weather and Forecasting, 14:1032–1038.
  11. J. Kiernan, R. Agrawal, 2004. Watermarking Relational Databases, Proc. 28th Int'l Conf. Very Large Databases VLDB.
  12. Y. Li, V. Swarup, and S. Jajodia, January-March 2005. Fingerprinting Relational Databases :Schemes and specialities, IEEE transactions, Vol. 2, No. 1.
  13. J. L. Dugelay and S. Roche. 2000. A survey of current watermarking techniques. In S. Katzenbeisser and F. A. Petitcolas, editors, Information Hiding Techniques for Steganography and Digital Watermarking, chapter 6, pages 121–148. Artech House.
  14. B. Schneier. 1996. Applied Cryptography. John Wiley.
  15. A. Kerckhoffs. La cryptographie militaire. January 1983. Journal des Sciences Militaires, 9:5–38.
Index Terms

Computer Science
Information Sciences

Keywords

Digital watermarking relational database systems copyright protection ownership verification imperceptibility robustness Watermark embedding Watermark extraction.