19-04-2011, 01:05 PM
Watermarking relational database using optimization based techniques
Abstract:
For most corporations the volume of sensitive data used by outsourcing providers continues to increase. As the number of different entities having access to a database increases, it gets harder to prevent and trace-back data leakage. We address the problems of proving ownership and unauthorized data distribution (leakage) for relational databases. We propose three techniques that altogether may be used to detect, determine and trace-back data leaks from relational databases. We use business process outsourcing scenarios as the descriptive use case, but our techniques are equally applicable in other use cases when a relational database is shared among many parties and its confidentiality and authenticity needs to be protected. Previous work has shown how to watermark and fingerprint numerical relational data to prove ownership and track unauthorized redistributions respectively. We implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration, and insertion attacks.
A relational database is a database that groups data using common attributes found in the data set. The resulting "clumps" of organized data are much easier for people to understand.
For example, a data set containing all the real estate transactions in a town can be grouped by the year the transaction occurred; or it can be grouped by the sale price of the transaction; or it can be grouped by the buyer's last name; and so on.
Optimization:
Optimization is used to improving the performance. Here we are going to propose data hiding to prove the ownership effectively.
Existing System:
In existing system watermarking is not resilient to tuple deletion, alteration, and insertion attacks.
Proposed system:
In our proposed system we implemented encoding and decoding and data partition technique.
A data set is transformed into a watermarked version by applying a watermark encoding function that also takes as inputs a secret key only known to the copyright owner and a watermark.
Watermark decoding is the process of extracting the embedded watermark using the watermarked data set, the secret keys.
Data partitioning algorithm that partitions the data set based on a secret key. That is if your given correct secret key means watermark text will extract for modification (edit, update, delete).
This tool applies your watermarks to multiple files to protect your copyright. RealWatermark simplifies the process of creating and applying watermark to multiple image files in multiple folders. It supports a mixture of text, copyright symbols, graphic and drawing watermark of any complexity. The multi-level transparency setting allows you to choose and preview how your watermark will affect your image..
Why watemark is datamining?
1. Here we develop data hiding process
2. Here text consider as data(tuple)
Hardware Requirements:
• SYSTEM : Pentium III 700 MHz
• HARD DISK : 40 GB
• RAM : 128 MB
Software Requirements:
• Operating system :- Windows XP Professional
• Front End :- Microsoft Visual Studio .Net 2005
• Coding Language :- C# .Net
• BackEnd :-SqlServer 2000