CFP last date
20 December 2024
Reseach Article

RRW: A Novel Watermarking Technique for Relational Data

by Abhilash Shukla, Swapnil Bhambar, Harshala Patil, K. S. Kumavat, Harshada Ghyar, Seema Desale
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 2
Year of Publication: 2017
Authors: Abhilash Shukla, Swapnil Bhambar, Harshala Patil, K. S. Kumavat, Harshada Ghyar, Seema Desale
10.5120/ijca2017913792

Abhilash Shukla, Swapnil Bhambar, Harshala Patil, K. S. Kumavat, Harshada Ghyar, Seema Desale . RRW: A Novel Watermarking Technique for Relational Data. International Journal of Computer Applications. 165, 2 ( May 2017), 15-19. DOI=10.5120/ijca2017913792

@article{ 10.5120/ijca2017913792,
author = { Abhilash Shukla, Swapnil Bhambar, Harshala Patil, K. S. Kumavat, Harshada Ghyar, Seema Desale },
title = { RRW: A Novel Watermarking Technique for Relational Data },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 2 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number2/27545-2017913792/ },
doi = { 10.5120/ijca2017913792 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:18.019239+05:30
%A Abhilash Shukla
%A Swapnil Bhambar
%A Harshala Patil
%A K. S. Kumavat
%A Harshada Ghyar
%A Seema Desale
%T RRW: A Novel Watermarking Technique for Relational Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 2
%P 15-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In real world, a huge amount of data of various forms such as audio, video, text, etc. is transmitted over internet. In relational database, it is easy to recover structured data but difficult to recover unstructured data. These databases are used in collaboration for extracting information. However they are vulnerable to security threats and malicious attacks. Watermark Technique is used to recognize pattern and identify authenticity of data[1]. Watermarking techniques provides ownership protection over relational database and prevents the data from getting corrupted, but such methods are not resilient and hence the system uses a robust and reversible watermarking technique which provides watermark encoding and decoding. Robust means resilient to any attacks. Reversible watermarking technique ensures data quality with data recovery and also prevents the data from being tampered. Though any changes are made to the data by the attacker (like insertion, deletion, alteration), data is fully recovered with the use of robust and reversible watermarking techniques. Robust and reversible Watermarking Techniques has provided security to the digital data by marking the data which is unique and can be used for claiming ownership of data. Using Genetic algorithm feature analysis and selection is done and then a watermark is created. After that the data is passed to the attacker channel where attacks take place, but due to Robust and Reversible Watermarking technique, data is recovered completely without any loss.

References
  1. Y.-C. Liu, Y.-T. Ma, H.-S. Zhang, D.-Y. Li, and G.-S. Chen, “A method for trust management in cloud computing: Data coloring by cloud watermarking,” Int. J. Autom. Comput., vol. 8, no. 3, pp. 280–285, 2011.
  2. F. A. Petitcolas, “Watermarking schemes evaluation,” IEEE SignalProcess. Mag., vol. 17, no. 5, pp. 58–64, Sep. 2000.
  3. J. T. Brassil, S. Low, and N. F. Maxemchuk, “Copyright protection for the electronic distribution of text documents,” Proc. IEEE, vol. 87, no. 7, pp. 1181–1196, Jul. 1999.
  4. R. Agrawal and J. Kiernan, “Watermarking relational databases,”in Proc. 28th Int. Conf. Very Large Data Bases, 2002, pp. 155–166.
  5. R. Sion, M. Atallah, and S. Prabhakar, “Rights protection for cate gorical data,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 7, pp. 912-926, Jul. 2005.
  6. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Pro- cess., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
  7. I. Cox, M. Miller, J. Bloom, and M. Miller, Digital Watermarking. Burlington, MA, USA: Morgan Kaufmann, 2001.
  8. P. W. Wong, “A public key watermark for image verification and authentication,” in Proc. IEEE Int. Conf. Image Process., 1998, vol. 1, pp. 455–459.
Index Terms

Computer Science
Information Sciences

Keywords

RRW Watermark Robust Reversible Relational Database Recovery.