Reversible Watermarking Technique based on Time Stamping in a Relational Data
Keywords:
Reversible Watermarking, Data Recovery, Data Quality, RobustAbstract
The main aim of this project is to maintain the ownership of Relational Database and also minimizing distortion in the watermarked content. Reversible watermarking is employed to ensure data quality along-with data recovery. However, such techniques are usually not robust against malicious attacks and do not provide any mechanism to selectively watermark a particular attribute. Therefore, reversible watermarking is required that ensures watermark encoding and decoding by accounting for the role of all the features in knowledge discovery and original data recovery.
References
[1] Y.-C. Liu, Y.-T. Ma, H.-S. Zhang, D.-Y. Li, and G.-S. Chen, “ A method for trust management in cloud computing: Data coloring by cloud watermarking,†International Journal of Automation and Computing, vol. 8, no. 3, pp. 280–285, 2011.
[2] Walmart to start sharing its sales data,
http://www.nypost.com/p/news/business/walmart-opensup, last updated: February
4, 2012, last accessed: July, 20 2013.
[3] Â Identity theft watch, http://www.scambook.com/
blog/2013/04/identity-theft-watch-customer-passwords-stolen-fromwalmart-vudu-video-service/,
last updated: April 11, 2013,last accessed: July, 20 2013.
[4] Securing outsourced consumer data,
http://www.databreaches.net/securing-outsourced-consumerdata/,last updated:
February 26, 2013, last accessed: July, 20 2013.
[5] As patients’ records go digital, theft and
hacking problems grow, â€http://www.kaiserhealthnews.org/Stories/2012/June/04/
electronic-health-records-theft-hacking.aspx, last updated: June 03, 2012, last
accessed: July, 20 2013.
[6] Y.-R. Wang, W.-H. Lin, and L. Yang, “An
intelligent watermarking method based on particle swarm optimization,†Expert
Systems with Applications, 2011.
[7] M. Kamran and M. Farooq, “An
information-preserving watermarking scheme for right protection of emr
systems,†Knowledge and Data Engineering, IEEE Transactions, 2012.
[8] T. M. Cover and J. A. Thomas, Elements of
information theory. Wiley-interscience, 2012.
[9] K. Jawad and A. Khan, “Genetic algorithm and
difference expansion based reversible watermarking for relational databases,â€
Journal of Systems and Software, 2013.
[10] Message Digest algorithms designed by
Professor Ronald Rivest of MIT (Rivest, 1992).
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.