Hiding Relational Databases with optimization Based Techniques
#1

[attachment=9907]
Hiding Relational Databases with optimization Based Techniques
Abstract

• Proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data.
• We formulate the watermarking of relational databases as a constrained optimization problem and discuss efficient techniques to solve the optimization problem and to handle the constraints.
• Watermark decoding is based on a threshold-based technique characterized by an optimal threshold that minimizes the probability of decoding errors.
• We implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration, and insertion attacks.
• A watermark describes information that can be used to prove the ownership of data such as the owner, origin, or recipient of the content.
• We develop an efficient technique for watermark detection that is based on an optimal threshold.
• The optimal threshold is selected by minimizing the probability of decoding error.
Existing System
• Watermarking techniques have emerged as an important building block that plays a crucial role in addressing the ownership problem.
• Such techniques allow the owner of the data to embed an imperceptible watermark into the data.
• A watermark describes information that can be used to prove the ownership of data such as the owner, origin, or recipient of the content.
• Secure embedding requires that the embedded watermark must not be easily tampered with, forged, or removed from the watermarked data.
Disadvantage
• The hackers can easily access the data
• No security measures are provided
Proposed System
• We present a watermarking technique for relational data that is highly resilient compared to these techniques.
• Our proposed technique is resilient to tuple deletion, alteration, and insertion attacks.
• Formulate the watermarking of relational databases as a constrained optimization problem and discuss efficient techniques to handle the constraints.
• There are two techniques to solve the formulated optimization problem based on genetic algorithms and pattern search techniques.
• Proposed system present a data partitioning technique that does not depend on marker tuples to locate the partitions and, thus, it is resilient to watermark synchronization errors.
• We develop an efficient technique for watermark detection that is based on an optimal threshold.
• The optimal threshold is selected by minimizing the probability of decoding error.
Advantages
• Since the data transmission is hidden, the data cannot be hacked
• Watermarking technique is an added advantage
• Permissions are specified
Software Requirements
• Operating System : Windows XP professional
• Front End : Microsoft Visual Studio .Net 2005
• Language : Visual C# .Net
• Back End : SQL Server 2000
Hardware Requirements:
Processor : Pentium III / IV
Hard Disk : 40 GB
Ram : 256 MB
Monitor : 15VGA Color
Mouse : Ball / Optical
Keyboard : 102 Keys

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: watermark relational data base using optimization base technique, water marking relational database using optimization based techniques, project documentation of watermarking relational databases using optimization based techniques, watermarking relational databases using optimization techniques, source code for watermarking relational databases using optimization based techniques, watermarking relational databases using optimization based techniques ppt, ppt on optimization techniques in wedm,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,097 15-04-2016, 08:04 PM
Last Post: knagpur
  Skin Tone based Secret Data hiding in Images seminar class 9 7,016 23-12-2015, 04:18 PM
Last Post: HelloGFS
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 42 22,971 07-10-2014, 07:57 PM
Last Post: seminar report asees
  Particle Swarm Optimization Algorithm and Its Application in Engineering Design Optim computer science crazy 3 5,489 03-05-2013, 10:28 AM
Last Post: computer topic
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,968 04-03-2013, 01:21 PM
Last Post: Guest
  A Novel Algorithm for Hiding Sensitive Frequent Itemsets electronics seminars 1 2,032 19-11-2012, 12:19 PM
Last Post: seminar details
  Eye Movement-Based Human-Computer Interaction Techniques computer girl 1 3,946 17-10-2012, 01:24 PM
Last Post: Guest
  VWS: Applying virtualization techniques to Web Services computer girl 0 1,109 09-06-2012, 11:38 AM
Last Post: computer girl
  A Review of Data Compression Techniques seminar surveyer 1 1,694 01-03-2012, 11:42 AM
Last Post: seminar paper
  Design Techniques for Voice Browsers Electrical Fan 1 2,872 21-01-2012, 09:50 AM
Last Post: seminar addict

Forum Jump: