CFP last date
22 April 2024
Reseach Article

A Unique Approach for Watermarking Non-numeric Relational Database

by Rajneesh Kaur Bedi, Purva Gujarathi, Poonam Gundecha, Ashish Kulkarni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 36 - Number 7
Year of Publication: 2011
Authors: Rajneesh Kaur Bedi, Purva Gujarathi, Poonam Gundecha, Ashish Kulkarni
10.5120/4501-6355

Rajneesh Kaur Bedi, Purva Gujarathi, Poonam Gundecha, Ashish Kulkarni . A Unique Approach for Watermarking Non-numeric Relational Database. International Journal of Computer Applications. 36, 7 ( December 2011), 9-14. DOI=10.5120/4501-6355

@article{ 10.5120/4501-6355,
author = { Rajneesh Kaur Bedi, Purva Gujarathi, Poonam Gundecha, Ashish Kulkarni },
title = { A Unique Approach for Watermarking Non-numeric Relational Database },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 36 },
number = { 7 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume36/number7/4501-6355/ },
doi = { 10.5120/4501-6355 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:22:31.274049+05:30
%A Rajneesh Kaur Bedi
%A Purva Gujarathi
%A Poonam Gundecha
%A Ashish Kulkarni
%T A Unique Approach for Watermarking Non-numeric Relational Database
%J International Journal of Computer Applications
%@ 0975-8887
%V 36
%N 7
%P 9-14
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s transient world, securing digital assets is very important. For data authentication and integrity of the relational database we have proposed a secure method which uses both semantic and syntactic techniques to watermark the tuple in a relation. The Watermarking technique is dependent on secret key and on the relation. The proposed algorithm is based on the concept of predefined signals for ASCII characters. A secret key is generated by using these signals only. To embed a watermark we are using the concept of abbreviations for words and also one syntactic approach, if former technique is not possible. Detection of watermark leads to the authentication and integrity to data. Experimental result shows that, our approach is robust and secure against the various malicious attacks.

References
  1. Lee, S. and Jung, S. “A survey of watermarking techniques applied to multimedia”. In Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE ’01), pages 272–277, Pusan, South Korea. IEEE Press, 2001.
  2. Potdar, V. M., Han, S., and Chang, E. “A survey of digital image watermarking techniques”. In Proceedings of the 3rd IEEE International Conference on Industrial Informatics (INDIN ’05), pages 709–716, Peth, Australia.IEEE Press, 2005.
  3. J.T. Brassil, S. Low, N.F. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying”, IEEE Journal on Selected Areas in Communications, vol. 13, No. 8, October 1995, pp.1495-1504.
  4. Ding Haung, Hong Yan, “Interword distance changes represented by sine waves for watermarking text images”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, No.12, pp. 1237- 1245, Dec 2001.
  5. Y. Zhang, D. N. Zhao, D. Y. Li. “Digital Watermarking Techniques and Progress”, Journal of PLA University of Science and Technology (Natural Science Edition) (In Chinese). 2003.6 4(3): 1-5.
  6. Bedi R., Thengade A., Wadhai V., “A New Watermarking Approach for Non Numeric Relational Database”, 2011.
  7. Agrawal, R., Haas, P., and Kiernan, J. “Watermarking relational data: framework, algorithms and analysis”. The VLDB Journal 12, 2 (Aug. 2003).
  8. Vahab Pournaghshband “A New Watermarking Approach for Relational Data”, ACMSE' 08 March 28-29, 2008, Auburn, AL, USA, ACM ISBN 978-1-60558-105-7/08/03.
  9. T. Rethika, Ivy Prathap, R. Anitha and S.V. Raghavan “A Novel Approach to Watermark Text Documents Based on Eigen Values”. ESR Groups France, 2009.
  10. M. Atallah, V. Raskin, C. Hempelman, M.Karahan, R. Sion, K. Triezenberg, and U. Topkara, “Natural Language Watermarking and Tamperproofing,” Proc. Fifth Int'l Information Hiding Workshop, 2002.
  11. R. Sion, M. Atallah, S. Prabhakar, “Watermarking Relational Databases”, Technical Report. Indiana: the Center for Education and Research in Information Assurance and Security of Purdue University, 2002.
  12. Mahmoud E. Farfoura, Shi-Jinn Horng, Jui-Lin Lai, Ray Shine Run, Rong-Jian Chen, Muhammad Khurram Khan, “A blind reversible method for watermarking relational databases based on a time-stamping protocol”, 2011.
  13. Prof. R. Manjula, Nagarjuna Settipalli, “A new Relational Watermarking Scheme Resilient to Additive Attacks”, International Journal of Computer Applications (0975 – 8887) Volume 10– No.5, November 2010.
  14. Adnan Abdul-Aziz Gutub, "e-Text Watermarking: Utilizing 'Kashida' Extensions in Arabic Language Electronic Writing", Journal of Emerging Technologies in Web Intelligence, vol. 2, no. 1, February 2010.
  15. Damien Hanyurwimfura, Yuling Liu and Zhijie Liu, "Text Format Based Relational Database Watermarking for Non-numeric Data”, International Conference On Computer Design And Applications (ICCDA 2010).
  16. Chuanxian Jiang, Xiaowei Chen and Zhi Li, "Watermarking Relational Databases for Ownership Protection Based on DWT". Fifth International Conference on Information Assurance and Security (2009).
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Relational Database Signals