We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Watermark based Copyright Protection for Relational Database

by Ramani Sagar V
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 2
Year of Publication: 2013
Authors: Ramani Sagar V
10.5120/13462-0713

Ramani Sagar V . Watermark based Copyright Protection for Relational Database. International Journal of Computer Applications. 78, 2 ( September 2013), 22-28. DOI=10.5120/13462-0713

@article{ 10.5120/13462-0713,
author = { Ramani Sagar V },
title = { Watermark based Copyright Protection for Relational Database },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 2 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number2/13462-0713/ },
doi = { 10.5120/13462-0713 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:35.513960+05:30
%A Ramani Sagar V
%T Watermark based Copyright Protection for Relational Database
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 2
%P 22-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As information hiding, the digital watermark techniques have been attracting more interests in both research and industrial fields. Relational database is widely used in many information systems, as a tool for storing and managing a data. Major issue to protect the copyright of relational data. In order to make watermarking information more intuitive and easier to identify and to give authorization to the database this idea has been proposed. Ownership verification of a database by inserting an imperceptive watermark in such a way to provide robustness and security against attempts to remove the watermark. To prove ownership of the database watermarking is done using image. Image is converted into the row bits and row bits is encrypted using MD5 security algorithm . This row bits will be embed into the database attribute in terms of watermark. To check the performance of this scheme will be tested based on different types of attacks on the database which shows the robustness of this scheme.

References
  1. Andriy Furmanyuk, Mykola Karpinskyy, Bohdan Borowik," Modern Approaches to the Database Protection", IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems" 2007
  2. Zhi-Hao Zhang , Xiao-Ming jin, jain-Min wan , " Watermarking Relational Database Using Image ", IEEE, Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, 26-29 August 2004
  3. Sanjeev Khanna, Francis Zane. " Watermarking maps: hiding information in structured Data". Int'l Conf. SODA 2000, San Francisco, California, USA
  4. R. Barnett , "Digital watermarking: applications, techniques and challenges", Electronics & Communication Engineering Journal AUGUST 1999
  5. Raju Halder, Shantanu Pal , Agostino Cortesi,"Watermarking Techniques for Relational Databases:Survey", Classification and Comparison, Journal of Universal Computer Science, vol. 16, no. 21, 2010
  6. Radu Sion, "Database Watermarking for Copyright Protection, Network Security and Applied Cryptography Lab Computer Science", Stony Brook University
  7. Hossein Moradian Sardroudi, Subariah Ibrahim," A New Approach for Relational Database Watermarking Using Image," Universiti Teknologi Malaysia (UTM)",2006
  8. Yingjiu Li, Robert Huijie Deng, "Publicly Verifiable Ownership Protection for Relational Databases", ACM 1-59593-272-0/06/0003, ASIACCS'06, March 21-24, 2006
  9. Hamed khataeimaragheh and Hassan Rashidi," A Novel Watermarking scheme for detecting and recovering distortions in database tables", International Journal of Database Management Systems ( IJDMS ) Vol. 2, No. 3, August 2010
  10. Xiaomei Dong , Xiaohua Li, Ge Yu, Lei Zheng, An Algorithm Resistive to Invertibility Attack in Watermarking Relational Databases, 2009 Chinese Control and Decision Conference
Index Terms

Computer Science
Information Sciences

Keywords

Database watermarking image relational database MD5 algorithm