CFP last date
20 December 2024
Reseach Article

Watermarking Technique using UID for Relational Data Saving in Database

by G. Agila, N.R. Ananthanarayanan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 2
Year of Publication: 2015
Authors: G. Agila, N.R. Ananthanarayanan
10.5120/ijca2015907305

G. Agila, N.R. Ananthanarayanan . Watermarking Technique using UID for Relational Data Saving in Database. International Journal of Computer Applications. 132, 2 ( December 2015), 37-45. DOI=10.5120/ijca2015907305

@article{ 10.5120/ijca2015907305,
author = { G. Agila, N.R. Ananthanarayanan },
title = { Watermarking Technique using UID for Relational Data Saving in Database },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 2 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 37-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number2/23569-2015907305/ },
doi = { 10.5120/ijca2015907305 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:48.133403+05:30
%A G. Agila
%A N.R. Ananthanarayanan
%T Watermarking Technique using UID for Relational Data Saving in Database
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 2
%P 37-45
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The technology is increasing to use the information in relational data for saving in database. This database are used in collaboration of environment is used to exact the data and the data is need to security threat for ownership rights. The watermarking is enforcing the data saving the ownership rights in relational data saving in database. In this watermarking technique was containing both reversible and non reversible technique for data storage and recovery. The watermarking technique was providing security threats concerning the ownership rights. The attacking the data saved in database which was in EyeOs cloud server to solve this problem in this watermarking technique using UID for relational data saving in database using four steps modules for encoding and decoding the discovery knowledge (data). Watermarking technique contains the following steps. They are step one is to encoding and decoding the data saved in database step two is to discover of the knowledge of original data saved in database protected from attacker.

References
  1. P. W. Wong, “A public key watermark for image verification and authentication,” in Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on, vol. 1. IEEE, 1998, pp. 455–459.
  2. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” Image Processing, IEEE Transactions on, vol. 10, no. 10,pp. 1593–1601, 2001.
  3. F. A. Petitcolas, “Watermarking schemes evaluation,” Signal Processing Magazine, IEEE, vol. 17, no. 5, pp. 58–64, 2000.
  4. J. T. Brassil, S. Low, and N. F. Maxemchuk, “Copyright protection for the electronic distribution of text documents,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1181–1196, 1999.
  5. R. Agrawal and J. Kiernan, “Watermarking relational databases,” in Proceedings of the 28th international conference on Very Large Data Bases. VLDB Endowment, 2002, pp. 155–166.
  6. CBS News: "Digital piracy stronger than ever", Onli
  7. ne link: http://goo.gl/Ws2rZ, valid as of October 2010
  8. Tirkel A., Rankin G., Schyndel R., Ho W., Mee N., and Osborne C.: "Electronic watermark". Proceedings of Digital Image Computing, Technology and Applications, DICTA 93, pp. 666-673, 1993.
  9. Langelaar G.C., Setyawan I., and Lagendijk R.L.: "Watermarking digital image and video data: a state-of-the-art overview".IEEE Signal Processing Magazine, Vol.17, pp.20-46, 2000.
  10. Armbrust M, Fox A, Griffith R, Joseph A (2009) Above the Clouds: ABerkeley View of Cloud Computing, Technical Report UCBEECS200928 53(UCB/EECS-2009-28). EECS Department University of California Berkeley
  11. 2. Smith M, Schmidt M, Fallenbeck N, D¨ornemann T, Schridde C, Freisleben B (2009) Secure On-demand Grid Computing. J Future Generation Comput Syst 25(3): 315–325
  12. Garfinkel T, Rosenblum M (2005) When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing. In 10thWorkshop on Hot Topics in Operating Systems 121–126
  13. Reimer D, Thomas A, Ammons G, Mummert T, Alpern B, Bala V (2008)Opening Black, Boxes: Using Semantic Information to Combat Virtual Machine Image Sprawl. In Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments 111–120. Seattle: ACM
  14. Schwarzkopf R, Schmidt M, Fallenbeck N, Freisleben B (2009) Multi-Layered Virtual Machines for Security Updates in Grid Environments.
  15. In Proceedings of 35th Euromicro Conference on Internet Technologies, Quality of Service and Applications (ITQSA) 563–570. Patras: IEEE Press
  16. Wei J, Zhang X, Ammons G, Bala V, Ning P (2009) Managing Security of Virtual Machine Images in a Cloud Environment. In Proceedings of the 2009 ACM Workshop on, Cloud Computing Security, CCSW ’09 91–96. New York: ACM
  17. Fallenbeck N, Schmidt M, Schwarzkopf R, Freisleben B (2010) Inter-Site Virtual Machine Image Transfer in Grids and Clouds. In Proceedings of the 2nd International ICST Conference on Cloud Computing (CloudComp 2010) 1–19. Barcelona: Springer, LNICST
  18. Lillard TV, Garrison CP, Schiller CA, Steele J (2010) The Future of Cloud Computing. In Digital Forensics for Network, Internet, and Cloud Computing 319–339. Boston: Syngress
  19. Potter S, Nieh J (2005) AutoPod: Unscheduled System Updates with Zero Data Loss. In Autonomic Computing, International Conference on 367–368
  20. Sapuntzakis C, Brumley D, Chandra R, Zeldovich N, Chow J, Lam MS, Rosenblum M (2003) Virtual Appliances for Deploying and Maintaining Software. In Proceedings of the 17th USENIX Conference on System Administration 181–194. Berkeley: USENIX Association
  21. Debian Security Advisory 1576-1 OpenSSH (2008) Predictable Random Number Generator. http://www.debian.org/security/2008/dsa-1576
  22. Bleikertz S, Schunter M, Probst CW, Pendarakis D, Eriksson K (2010) Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security, CCSW ’10 93–102. Chicago
  23. Yoon J, Sim W (2007) Implementation of the, Automated Network Vulnerability Assessment Framework. In Proceedings of the 4th International Conference on Innovations in Information Technology 153–157. Dubai: IEEE
Index Terms

Computer Science
Information Sciences

Keywords

UID Unique Identification CS Checksum CT Cyber text DES Data Encryption Standard TS Time Stamp RCS Row Checksum BC Binary conversion .