WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES
#8


Watermarking relational database using optimization based techniques
Abstract:

For most corporations the volume of sensitive data used by outsourcing providers continues to increase. As the number of different entities having access to a database increases, it gets harder to prevent and trace-back data leakage. We address the problems of proving ownership and unauthorized data distribution (leakage) for relational databases. We propose three techniques that altogether may be used to detect, determine and trace-back data leaks from relational databases. We use business process outsourcing scenarios as the descriptive use case, but our techniques are equally applicable in other use cases when a relational database is shared among many parties and its confidentiality and authenticity needs to be protected. Previous work has shown how to watermark and fingerprint numerical relational data to prove ownership and track unauthorized redistributions respectively. We implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration, and insertion attacks.
A relational database is a database that groups data using common attributes found in the data set. The resulting "clumps" of organized data are much easier for people to understand.
For example, a data set containing all the real estate transactions in a town can be grouped by the year the transaction occurred; or it can be grouped by the sale price of the transaction; or it can be grouped by the buyer's last name; and so on.
Optimization:
Optimization is used to improving the performance. Here we are going to propose data hiding to prove the ownership effectively.
Existing System:
In existing system watermarking is not resilient to tuple deletion, alteration, and insertion attacks.
Proposed system:
In our proposed system we implemented encoding and decoding and data partition technique.
A data set is transformed into a watermarked version by applying a watermark encoding function that also takes as inputs a secret key only known to the copyright owner and a watermark.
Watermark decoding is the process of extracting the embedded watermark using the watermarked data set, the secret keys.
Data partitioning algorithm that partitions the data set based on a secret key. That is if your given correct secret key means watermark text will extract for modification (edit, update, delete).
This tool applies your watermarks to multiple files to protect your copyright. RealWatermark simplifies the process of creating and applying watermark to multiple image files in multiple folders. It supports a mixture of text, copyright symbols, graphic and drawing watermark of any complexity. The multi-level transparency setting allows you to choose and preview how your watermark will affect your image..
Why watemark is datamining?
1. Here we develop data hiding process
2. Here text consider as data(tuple)
Hardware Requirements:
• SYSTEM : Pentium III 700 MHz
• HARD DISK : 40 GB
• RAM : 128 MB
Software Requirements:
• Operating system :- Windows XP Professional
• Front End :- Microsoft Visual Studio .Net 2005
• Coding Language :- C# .Net
• BackEnd :-SqlServer 2000
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: watermarking relational databases, intrusion response system for relational databases pdf, existing system of intrusion respone system for relational databases, watermarking databases source code, water marking relational database using optimization based techniques, design and implementation of an intrusion response system for relational databases, databases companies,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES - by seminar class - 19-04-2011, 01:05 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATION 1 939 15-02-2017, 04:13 PM
Last Post: jaseela123d
  watermarking algorithm seminar class 3 2,690 27-04-2016, 11:17 AM
Last Post: dhanabhagya
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,911 22-07-2013, 09:37 PM
Last Post: Guest
  Digital Video Watermarking ( Project ) saeedah 6 5,053 18-03-2013, 04:06 PM
Last Post: computer topic
  A Search Engine Using Case Based Reasoning nit_cal 1 1,632 21-12-2012, 11:01 AM
Last Post: seminar details
  A ROBUST DIGITAL IMAGE WATERMARKING ALGORITHM USING DNA SEQUENCES smart paper boy 1 1,945 29-11-2012, 01:42 PM
Last Post: seminar details
Smile Implementation Of Digital Watermarking nit_cal 1 1,806 25-10-2012, 12:56 PM
Last Post: seminar details
  CBIR - Content Based Image Retrieval Using Shape & Color Characteristics seminar class 1 2,814 19-10-2012, 01:08 PM
Last Post: seminar details
  Two Techniques For Fast Computation of Constrained Shortest Paths seminar topics 4 3,741 06-03-2012, 12:49 PM
Last Post: seminar paper
  CELL BREATHING TECHNIQUES FOR LOAD BALANCING IN WIRELESS LANS- MOBILE COMPUTING electronics seminars 5 5,270 01-03-2012, 02:58 PM
Last Post: seminar paper

Forum Jump: