CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A New Watermarking Approach for Non-numeric Relational Database

by Prof. Rajneeshkaur Bedi, Prof. Anita Thengade, Dr. Vijay M.Wadhai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Number 7
Year of Publication: 2011
Authors: Prof. Rajneeshkaur Bedi, Prof. Anita Thengade, Dr. Vijay M.Wadhai
10.5120/1790-2473

Prof. Rajneeshkaur Bedi, Prof. Anita Thengade, Dr. Vijay M.Wadhai . A New Watermarking Approach for Non-numeric Relational Database. International Journal of Computer Applications. 13, 7 ( January 2011), 37-40. DOI=10.5120/1790-2473

@article{ 10.5120/1790-2473,
author = { Prof. Rajneeshkaur Bedi, Prof. Anita Thengade, Dr. Vijay M.Wadhai },
title = { A New Watermarking Approach for Non-numeric Relational Database },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 13 },
number = { 7 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 37-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume13/number7/1790-2473/ },
doi = { 10.5120/1790-2473 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:02:07.518053+05:30
%A Prof. Rajneeshkaur Bedi
%A Prof. Anita Thengade
%A Dr. Vijay M.Wadhai
%T A New Watermarking Approach for Non-numeric Relational Database
%J International Journal of Computer Applications
%@ 0975-8887
%V 13
%N 7
%P 37-40
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a novel watermarking technique is proposed for data authentication and integrity of Relational Database. For integrity verification of tables in the database, the watermark has to depend on a secret key and on the original copy of that table. It is important that the dependence on the key should be sensitive. The proposed method makes use of the concept of eigen values by constructing a tuple -Relation matrix for each tuple. The eigen values are used for generating the watermark for a record in the table. Watermark embedding is done by using eigen values in a non numeric attribute of a tuple. Detection of the watermark prove the authenticate and integrity of data. We will show that our approach leads to an effective technique that is robust against different forms of malicious attacks as well as benign updates to the data.

References
  1. Agrawal, R., Haas, P., and Kiernan, J. 2003. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12, 2 (Aug. 2003), 157-169. DOI= http://dx.doi.org/10.1007/s00778-003-0097-x.
  2. J.T. Brassil, S. Low, N.F. Maxemchuk , and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying “, IEEE Journal on Selected Areas in Communications”, vol. 13, No. 8, October 1995, pp.1495-1504.
  3. Ding Haung, Hong Yan, “Interword distance changes represented by sine waves for watermarking text images”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, No.12, pp. 1237- 1245, Dec 2001.
  4. Zhang, Z., Jin, X., Wang, J., Li, D. 2004. Watermarking Relational Database Using Image. In Proceedings of the Third International Conference on Machine Leaning and Cybernetics, (Shanghai, August 26 – 29, 2004).
  5. Vahab Pournaghshband 2008 A New Watermarking Approach for Relational Data ,ACM-SE'08 March 28-29,2008,Auburn,AL,USA,ACM ISBN 978-1-60558-105-7/08/03.
  6. T. Rethika , Ivy Prathap, R. Anitha and S.V. Raghavan 2009 ESRGroups France A Novel Approach to Watermark Text Documents Based on Eigen Values.
  7. L. Boney, A. H. Tewfik, and K. N. Hamdy. Digital watermarks for audio signals. In International Conference on Multimedia Computing and Systems, Hiroshima, Japan, June 1996.
  8. M. Atallah and S. Lonardi, “Authentication of LZ-77 Compressed Data,” Proc. ACM Symp. Applied Computing, 2003.
  9. M. Atallah, V. Raskin, C. Hempelman, M. Karahan, R. Sion, K. Triezenberg, and U. Topkara, “Natural Language Watermarking and Tamperproofing,” Proc. Fifth Int'l Information Hiding Workshop, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Relational Database Eigen values