WATERMARKING RELATIONAL DATABASES
Mayuree K.Rathva¹,Prof.G.J.Sahani²
Dept.of Computer Engineering, SVIT,Vasad, Anand,Gujarat, INDIA
¹mayurirathva@gmail.com and ²Gurcharan_sahani@yahoo.com
ABSTRACT
Uptil now most of the work is done on image, video, audio.but today the Database watermarking becomes the research topic because of the increasing the use of relational database systems. Which deals with the legal issue of copyright protection of database systems. .Watermarking is an information hiding technique which is used to embed a mark within some host content. In this paper,we have focused on the review of four relational database watermarking techniques proposed by researchers [R.Agarwal & Jerry Kiernan, ZHU Qin, Brijesh B. Mehta, A.Odeh and A. Al-Haj].
KEYWORDS
Database Security, Database Watermarking, Multi-place Watermarking, Copyright Protection.
1. INTRODUCTION
Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the
References: [1] [2] [3] [4] [5] R. Agrawal and J. Kiernan.” Watermarking relational databases”. In Proceedings of The 28th International Conference on Very Large Databases VLDB, 2002. ZHU Qin, YANG Ying, LE Jia-jin, LUO Yishu,(2006)“Watermark based Copyright Protection of Outsourced Database,” IEEE, IDEAS, pp. 1-5. Brijesh B. Mehta, Udai Pratap Rao,” A Novel approach as Multi-place Watermarking For Security in Database”Dept. of Computer Engineering, S. V. National Institute of Technology, Surat, Gujarat A. Odeh and A. Al-Haj “Watermarking Relational Database Systems”, IEEE, pp. 270-274, 2008. Raju Halder, Shantanu Pal, Agostino Cortesi,”(2010) Watermarking Techniques for Relational Databases: Survey, Classification and Comparison” Journal of Universal Computer Science, vol. 16, no. 21, 3164-3190. Prof.Bhawana Ahire, Prof. Neeta Deshpande,” Watermarking relational databases: A Review”,IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 8. [6] 79