Water Marking Relational Databases Using Optimization technique
#1

hi ,

i have selected the below project title.
Water Marking Relational Databases Using Optimization technique
Can anyone please Guide/advise me about this project title . Technology :Java Database : Oracle....

Thanks a lot

Regards
Shiek
Reply
#2
Watermarking Relational Databases using Optimization Based Techniques

Watermarking techniques have emerged as animportant building
block which plays a crucial role in addressing the ownership
problemIn this article we describe a mechanism for proof of
ownership based on the secure embedding of a robust imperceptible
watermark in relational data.Earlier, Proving ownership rights
on outsourced relational databases was a critical issue in
internet-based application environments and in many content
distribution applications. This watermarking technique is
immune to watermark synchronization errors because it uses a
partitioning approach that does not require marker tuples. This
technique overcomes a major drawback of previous methods in that
Watermark decoding is based on a threshold-based technique
characterized by an optimal threshold that minimizes the
probability of decoding errors. The watermarking of relational
databases is done as a constrained optimization problem, and
efficient techniques to solve the optimization problem and to
handle the constraints are discussed. Experimental results
show that this technique is resilient to alteration, tuple
deletion, and insertion attacks.

Watermarking techniques
A watermark describes information that can be used to prove
the ownership of data. Imperceptible embedding means that the
presence of the watermark is unnoticeable in the data.
Also, the watermark detection is blinded ,that is, it neither
requires the knowledge of the original data nor the watermark.

The approach
A data set D is transformed into a watermarked version DW by
applying a watermark encoding function that also takes as
inputs a secretkey Ks only known to the copyright owner
and a watermark W.Data modifications by watermark
are controlled by providing usability constraints referred to by
the set G.The watermark encoding has the following three steps:
1)Data set partitioning: the data set D is partitioned into m non-overlapping partitions by using key Ks.

2)Watermark embedding: a watermark bit is embedded in
each partition by altering the partition statistics while still verifying
the usability constraints in G.

3)Optimal threshold evaluation: the bit embedding statistics
are used to compute the optimal threshold that minimizes
the probability of decoding error.


Watermark decoding: It is the process of extracting the embedded
watermark using the watermarked data set DW, the secret key Ks
and the optimal threshold. It consists of the following steps:
1)Data set partitioning where the data partitions are generated

2)Threshold based decoding: the statistics of each partition
are evaluated and the embedded bit is decoded using a threshold
based scheme based on the optimal threshold.

3)Majority voting: The watermark bits are decoded using
a majority voting technique.

Genetic algorithm and pattern search techniques are employed to solve
the optimization problem and to handle the constraints.


Seminar report download:
[attachment=730]
Reply
#3
hi
even i have selected this topic,if u have the project report kindly share with me..'
thanksSmile
Reply
#4



for more about the Water Marking Relational Databases Using Optimization technique

http://studentbank.in/report-water-marki...-technique

http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf
Reply
#5
can u please any one send how the algorithms work in this project
Reply
#6
Hi Guys

I have selected this topic .... Pl help me with the project report , ppt , pseudo code related to this topic in lang etc....


Vimala
Reply
#7
previous page has a report on it. just click on the page link below to see

http://studentbank.in/report-water-marki...37#pid7137
Reply
#8
Thanks for ur reply
Can U pl send an example for synthetic or real world data set to check the implementation of watermarking technique
Reply
#9
The real-life data set for the purpose of running the experimental simulation was obtained from the relatively small database that contains the daily power consumption rates of some customers over a period of one year. the CIMEG project makes available such kind of data sets. approximately 5 Megabyte is the size of the database. For the experiment, only a subset
of the original data is used with 150000 tuples. The parameters used are:
c=75%,
minimum partition size epsilon=10
no. of partitions m=2048
allowable data change=+/-0.5%
Wateramrk used=16 bit watermark

to minimize the probability of decoding error, a special decodong technique was used. The watermark thus formed was subject to the normal attacks of deletion, alteration, and addition attacks. Multiple runs of the experiment was run and the results of these runs were averaged to obtain the conclusions. both uniform and normally distributed synthetic data were applied to the test and the results obtained.

For more details on the data sets used and the experiments, see:
http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf
Reply
#10

Thank u Summer Project Pal

But my problem is i couldnt get the data set form CIMEG.... & i have gone through the paper fully...... If i got that data set
I dont know
1. How to use Optimization tech?
2. what will be the optimization problem and the constraints ?
3. what is synchronization error?
4. what is decoding error?
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: download ppt of incremental information extraction using relational databases, synopses of digital watermarking relational databases using optimization based techniques, design and implementation of an intrusion response system for relational databases project, road marking aa6 and y3, existing system of intrusion respone system for relational databases, intrusion response system for relational databases pdf, databases for the courier management system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  download industrial waste water sjbit notes 2 1,637 09-06-2017, 08:25 AM
Last Post: Guest
  10cv835 idustrial waste water treatment vtu notes pdf 4 2,156 19-05-2017, 02:33 PM
Last Post: jaseela123d
  source code for task scheduling using genetic algorithm using java 2 8,531 11-04-2017, 08:31 PM
Last Post: Guest
  rain water harvesting marathi slogans 1 1,224 20-07-2016, 04:00 PM
Last Post: dhanabhagya
  intelligent water drops algorithm code in c 2 683 16-07-2016, 04:15 PM
Last Post: jaseela123d
  drama script on save water in hindi 2 2,646 16-07-2016, 02:58 PM
Last Post: jaseela123d
  ant colony optimization source code in ns2 2 756 12-07-2016, 11:26 AM
Last Post: jaseela123d
Wink water treatment system in kota thermal power plant pdf 1 706 05-07-2016, 12:43 PM
Last Post: visalakshik
  circular water tank design excel sheet 1 885 04-07-2016, 04:32 PM
Last Post: visalakshik
  making water pollution model on thermocol sheet 1 739 04-07-2016, 02:49 PM
Last Post: visalakshik

Forum Jump: