Secure and Reliable Watermarking in Relational Databases

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-11 Number-1
Year of Publication : 2014
Authors : G.Shyamala , I.Jasmine Selvakumari Jeya , M.Revathi
DOI :  10.14445/22312803/IJCTT-V11P103


G.Shyamala , I.Jasmine Selvakumari Jeya , M.Revathi."Secure and Reliable Watermarking in Relational Databases". International Journal of Computer Trends and Technology (IJCTT) V11(1):13-18, May 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
The rapid growth of the Internet and related technologies has offered an unpredicted ability to access and redistribute original digital contents. Watermarking techniques have emerged as an important building block that plays a crucial role in addressing the ownership problem. A watermark is a owner information that is securely and robustly embedded into original information such as an text, image, video or audio signal, producing a watermark information. In this paper, it provides mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. This technique is resilient to watermark synchronization errors because it uses a partitioning approach that does not require marker tuples. It is resilient to tuple deletion, alteration and insertion attacks. This approach is used in watermarking database to provide security to owner information and to identify the unique characteristics of relational data and provide desirable properties of a watermarking system for relational data. The watermarking technique can be applied to any database relation having attributes in which few tuples altered based on the threshold value do not affect the database values. This approach ensures that some bit positions of some of the attributes of some of the tuples contain watermark bits. The tuples division is done and after finding the threshold value watermark bits are added for efficient and secure watermark embedding and attacker may not find the original watermarked data. Only if user has access to the private key, then he can decode the database with high probability.

[1] Abdullah Bamatraf, Rosziati Ibrahim and Mohd. Najib Mohd. Salleh, “A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit”. Journal Of Computing, Issn, Volume 3, Issue 4, April 2011, 2151-9617.
[2] R.Balasubramaniam, “Data Security In Relational Database Management System”, International Journal of Computer Science and Security (IJCSS), Volume (6): Issue (4): 2012.
[3] S. Bhattacharya and A. Cortesi, “A distortion free watermark framework for relational databases,” Proceedings of the 4th International Conference on Software and Data Technologies (ICSOFT 2009), pp. 229–234, 2009.
[4] Hamed khataeimaragheh and Hassan Rashidi, “A Novel Watermarking Scheme For Detecting And Recovering Distortions In Database Tables” International Journal of Database Management Systems ( IJDMS ) Vol.2, No.3, August 2010.
[5] Hazem M. El-Bakry, “A New Watermark Approach for Protection of Databases”, Mansoura University, IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 1, pp. 116–129, 2007.
[6] Jiri Fridrich and Goljan, “Robust Hash Functions for Digital Watermarking“, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012.
[7] M. Kamran, Sabah Suhail, and Muddassar Farooq, “A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-all Usability Constraints”, IEEE Transactions On Knowledge And Data Engineering Digital Object Indentifier 10.1109.
[8] Sabah Suhail1, M. Kamran and Fahim Arif, “Watermarking of Relational Databases with Emphasis on Re-watermarking Attack”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012.
[9] M. Shehab, E. Bertino, and A. Ghafoor, “Watermarking relational databases using optimization-based techniques,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 1, pp. 116–129, 2008.
[10]Shantanu Pal, Raju Halder, Agostino Cortesi “Watermarking Techniques for Relational Databases Survey, Classi?cation and Comparison” Journal of Universal Computer Science, vol. 16, no. 21 (2010), 3164-3190 submitted: 18/12/09, accepted: 29/11/10, appeared: 1/12/10 © J.UCS
[11] Vahab Pournaghshband , “A New Watermarking Approach for Relational Data” , 9th WSEAS International Conference on Applied Informatics And Communications (AIC `09) Vol.2, No.3, August 2010.
[12] Vidhi Khanduja, and O. P. Verma, “Identification and Proof of Ownership by Watermarking Relational Databases” International Journal of Information and Electronics Engineering, Vol. 2, No. 2, March 2012.
[13] S.W. Weng, Y. Zhao and J.-S. Pan “Reversible watermarking resistant to cropping attack”, The Institution of Engineering and Technology 2007 (IET Inf. Secure), 2007, 1, (2), pp. 91–95.
[14] Dr. Yossra H. Ali & Bashar Saadoon Mahdi , “Watermarking for Relational Database by using Threshold Generator”, Computer Sciences Department, University of Technology Eng. & Tech. Journal, Vol. 29, No. 1, 2011.

Attacks, database security, ownership protection, secret key, watermarking.