Open Access   Article Go Back

Relational Databases Watermarking Technique Based on Randomized String Verification

Anuj Kumar Dwivedi1 , B. K. Sharma2 , A. K. Vyas3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 412-416, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.412416

Online published on Jun 30, 2019

Copyright © Anuj Kumar Dwivedi, B. K. Sharma, A. K. Vyas . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anuj Kumar Dwivedi, B. K. Sharma, A. K. Vyas, “Relational Databases Watermarking Technique Based on Randomized String Verification,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.412-416, 2019.

MLA Style Citation: Anuj Kumar Dwivedi, B. K. Sharma, A. K. Vyas "Relational Databases Watermarking Technique Based on Randomized String Verification." International Journal of Computer Sciences and Engineering 7.6 (2019): 412-416.

APA Style Citation: Anuj Kumar Dwivedi, B. K. Sharma, A. K. Vyas, (2019). Relational Databases Watermarking Technique Based on Randomized String Verification. International Journal of Computer Sciences and Engineering, 7(6), 412-416.

BibTex Style Citation:
@article{Dwivedi_2019,
author = {Anuj Kumar Dwivedi, B. K. Sharma, A. K. Vyas},
title = {Relational Databases Watermarking Technique Based on Randomized String Verification},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {412-416},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4566},
doi = {https://doi.org/10.26438/ijcse/v7i6.412416}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.412416}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4566
TI - Relational Databases Watermarking Technique Based on Randomized String Verification
T2 - International Journal of Computer Sciences and Engineering
AU - Anuj Kumar Dwivedi, B. K. Sharma, A. K. Vyas
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 412-416
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
366 224 downloads 123 downloads
  
  
           

Abstract

In the era of digital data transmission, relational databases also transmitted through internet for the web base environment and many other important areas, the unauthorized changes to database can lead to sarcastic losses for receiver of the Database. Owners of the database are need to protect and verify originality of their database. Digital watermarking is an effective technical solution to protecting the copyright of databases from wildcat copying by using the built-in properties of relational databases. In this paper, we propose a relational database watermarking scheme that partition the whole database in groups by using the tuple hash value of the database records. After the group formation, we randomize all the tuples of the group and fuse the use of hash byte function over the group tuples along with owner id to form a group string. Similarly, in detection process, we form a string to verify the suspicious watermarked database. The proposed scheme does not require any additional storage in the original database for copyright verification so the approach is robust against the any distortion in original database. Two experiments, Cast comparison and displacement attack conducted over watermark creation and detection algorithms with the group size variation and the results analyzed to show the running cost of the proposed scheme.

Key-Words / Index Term

ownership protection; group wise partition; tuple hash value; hashbyte

References

[1] Saraju P. Mohanty , “Digital Watermarking : A Tutorial Review” Indian Institute of Science, Bangalore, 1999
[2] R. Agrawal, J. Kiernan. “Watermarking Relational Databases”, In: Proceeding of the 28th VLDB Conference. Hong Kong, 2002: 155-166.
[3] G.H. Gamal, M.Z. Rashad and M.A. Mohamed “A Simple Watermark Technique for Relational Databa” Mansoura Journal for Computer Science and Information Systems Vol. 4, No.4, Jan2008.
[4] Raju Halder, Shantanu Pal, Agostino Cortesi “Watermarking Techniques for Relational Databases: Survey, Classification and Comparison” Journal of Universal Computer Science, Vol. 16, no.21 2010, pp.3165-3190
[5] Min, Li, Wenyue, Zhao, “An Asymmetric Watermarking Scheme for Relational Database”, Communication Software and Networks (ICCSN), IEEE 3rd International Conference. 2011,pp.180-184
[6] Udai Pratap Rao a, Dhiren R. Patel a, Punitkumar M. Vikani, “Relational Database Watermarking for Ownership Protection 2nd International Conference on Communication, Computing & Security [ICCCS-2012] Science Direct pp.988-995.
[7] B. Wu, et aI., "Design and implementation of spatial data
watermarking service system", Geo-spatial Information Science, vol.13, no. I, pp. 40-48, 2010.
[8] Anuj Kumar Dwivedi ,Dr. B. K. Sharma ,Dr. A. K. Vyas “Relational databases watermarking technique based on embedded proportion” International Education & Research Journal [IERJ] E-ISSN No : 2454-9916 | Volume : 3 | Issue : 6 June 2017 pp 34-36
[9] Anuj Kumar Dwivedi ,Dr. B. K. Sharma ,Dr. A. K. Vyas “Relational Databases Watermarking Technique Based on Specific String Verification” International Journal of Computer Sciences and Engineering [IJCSE] Vol.6(7), Jul 2018, E-ISSN: 2347-2693