WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES
#7
[attachment=10927]
Watermarking Relational Databases Using Optimization- Based Techniques
Abstraction

 Proving ownership rights on outsourced relational databases
 We present a mechanism for proof of ownership based on secure embedding of robust(Sturdy in construction)
 Here we formulate the constrains and discuss efficient tech to solve the optimization prob and to handle the constrains
 Overcomes a major weakness in previously proposed tech
 Probability of decoding errors are minimized by an optimal threshold(Threshold-Based Tech)
Introduction
 Enforcing data ownership is an important requirement which requires articulated solutions
 In last years watermarking techniques have emerged as an important building block which plays a crucial role in addressing the ownership problem.
 A watermark describes information that can be used to prove the ownership of data, such as the owner, origin, or recipient of the content.
 Watermarking techniques have been developed for video, images, audio, and text data and also for software and natural language text
 application contexts for which data represent an important asset, the ownership of which must thus be carefully enforced.
 For example, of weather data, stock market data, power consumption, consumer behavior data, medical and scientific data
Watermarking
Main Contribution

 We formulate the watermarking of relational databases as a constrained optimization problem, and discuss efficient techniques to handle the constraints. We present two techniques to solve the formulated optimization problem based on genetic algorithms and pattern search techniques.
 We present a data partitioning technique that does not depend on marker tuples to locate the partitions and thus it is resilient to watermark synchronization errors.
 We develop an efficient technique for watermark detection that is based on an optimal threshold. The optimal threshold is selected by minimizing the probability of decoding error.
 With a proof of concept implementation of our watermarking technique, we have conducted experiments using both synthetic and real-world data. We have compared our watermarking technique with previous approaches shows the superiority of our technique with respect to all types of attacks.
Related Work
 1. Agrawal proposed a watermarking algorithm that embeds the watermark bits in the least significant bits (LSB) of selected attributes of a selected subset of tuples
 This technique does not provide a mechanism for multi bit watermarks; instead only a secret key is used.
 For each tuple, a secure message authenticated code (MAC) is computed using the secret key and the tuple’s primary key.
Hiding bits in LSB is efficient.
 Problem : the watermark can be easily compromised by very trivial attacks.
 2. Sion et al proposed a watermarking technique that embeds watermark bits in the data statistics.
 data partitioning technique used is based on the use of special marker tuples which makes it vulnerable to watermark synchronization errors resulting from tuple deletion and tuple insertion; thus such technique is
not resilient to deletion and insertion attacks.
 He recommend storing the marker tuples to enable the decoder to accurately reconstruct the underlying partitions
 Problem: violates the blinded watermark detection property
 Furthermore, Sion et al. proposed
 a threshold technique for bit decoding that is based on two thresholds.
 However, the thresholds are arbitrarily chosen without any optimality criteria.
 Thus the decoding algorithm exhibits errors resulting from the non-optimal threshold selection
 Even in the absence of an attacker.
Next Comes Gross-Amblard
 Gross-Amblard proposed a watermarking technique for
XML documents and theoretically investigates links between query result preservation and acceptable watermarking alterations.
 Another interesting related research effort is to be found in where the authors have proposed a fragile watermark technique
 to detect and localize alterations made to a database relation with categorical attributes.
APPROACH OVERVIEW
 The Main Components are as follows
 Data set “D”
 Data set “D” is transformed into a watermarked version “DW”
 watermark encoding function that also takes as inputs a secret key “Ks”
 only known to the copyright owner and a watermark “W”
 Watermarking modifies the data.
 modifications
 are controlled by providing usability constraints referred to by the set G.
Watermarking Encoding
summarized by the following three steps:
 Step E1: Data set partitioning: by using the secret key Ks
the data set D is partitioned into m non-overlapping partitions {S0, . . . , Sm−1}.
 Step E2: Watermark embedding: a watermark bit is embedded in each partition by altering the partition statistics while still verifying the usability constraints in G. This alteration is performed by solving a constrained optimization problem.
 Step E3: Optimal threshold evaluation: the bit embedding statistics are used to compute the optimal threshold T∗ that minimizes the probability of decoding error.
Watermark Decoding
 The watermark decoding is divided into three main steps:
 Step D1: Data set partitioning: by using the data partitioning
algorithm used in E1, the data partitions are generated.
 Step D2: Threshold based decoding: the statistics of each partition are evaluated and the embedded bit is decoded using a threshold based scheme based on the optimal threshold T∗.
 Step D3: Majority voting: The watermark bits are decoded using a majority voting technique.
Watermark Encoding Algorithms
 Data Partitioning
 Watermark Embedding
 Single Bit Encoding
 Genetic Algorithm Technique
 Pattern Search Technique
 Watermark Embedding Algorithm
Watermark Decoding Algorithms
 Decoding Threshold Evaluation
 Watermark Detection
 Attacker Model:
 Deletion Attack
 Alteration Attack
 Insertion Attack
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: advanced optimization techniques in electrical engineering abstract, seminar on firewall optimization techniques, databases systems, content protection using watermarking, documentation for the project watermarking relational databases, lottery sanwadmentation of an intrusion response system for relational databases project, watermarking relational databases using optimization based techniques ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES - by seminar class - 24-03-2011, 03:54 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATION 1 940 15-02-2017, 04:13 PM
Last Post: jaseela123d
  watermarking algorithm seminar class 3 2,690 27-04-2016, 11:17 AM
Last Post: dhanabhagya
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,911 22-07-2013, 09:37 PM
Last Post: Guest
  Digital Video Watermarking ( Project ) saeedah 6 5,053 18-03-2013, 04:06 PM
Last Post: computer topic
  A Search Engine Using Case Based Reasoning nit_cal 1 1,632 21-12-2012, 11:01 AM
Last Post: seminar details
  A ROBUST DIGITAL IMAGE WATERMARKING ALGORITHM USING DNA SEQUENCES smart paper boy 1 1,946 29-11-2012, 01:42 PM
Last Post: seminar details
Smile Implementation Of Digital Watermarking nit_cal 1 1,806 25-10-2012, 12:56 PM
Last Post: seminar details
  CBIR - Content Based Image Retrieval Using Shape & Color Characteristics seminar class 1 2,815 19-10-2012, 01:08 PM
Last Post: seminar details
  Two Techniques For Fast Computation of Constrained Shortest Paths seminar topics 4 3,741 06-03-2012, 12:49 PM
Last Post: seminar paper
  CELL BREATHING TECHNIQUES FOR LOAD BALANCING IN WIRELESS LANS- MOBILE COMPUTING electronics seminars 5 5,271 01-03-2012, 02:58 PM
Last Post: seminar paper

Forum Jump: