Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES
#1

[attachment=4945]
Watermarking Relational Databases using Optimization
ABSTRACT
Proving ownership rights on outsourced relational databases is a crucial issue in today's internet-based application environments and in many content distribution applications. In this paper, we present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. We formulate the watermarking of relational databases as a constrained optimization problem and discuss efficient techniques to solve the optimization problem and to handle the constraints. Our watermarking technique is resilient to watermark synchronization errors because it uses a partitioning approach that does not require marker tuples. Our approach overcomes a major weakness in previously proposed watermarking techniques. Watermark decoding is based on a threshold-based technique characterized by an optimal threshold that minimizes the probability of decoding errors. We implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration, and insertion attacks.

INTRODUCTION


The rapid growth of internet and related technologies has offered an unprecedented ability to access and redistribute digital contents. In such a context, enforcing data ownership is an important requirement which requires articulated solutions, encompassing technical, organizational and legal aspects. Though we are still far from such comprehensive solutions, in the last years watermarking techniques have emerged as an important building block which plays a crucial role in addressing the ownership problem. Such techniques allow the owner of the data to embed an imperceptible watermark into the data.

A watermark describes information that can be used to prove the ownership of data, such as the owner, origin, or recipient of the content. Secure embedding requires that the embedded watermark must not be easily tampered with, forged, or removed from the watermarked data. Imperceptible embedding means that the presence of the watermark is unnoticeable in the data. Furthermore, the watermark detection is blinded, that is, it neither requires the knowledge of neither the original data nor the watermark. Watermarking techniques have been developed for video, images, audio, and text data and also for software and natural language text.

By contrast the problem of watermarking relational data has not been given appropriate attention. There are, however, many application contexts for which data represent an important asset, the ownership of which must thus be carefully enforced. This is the case, for example, of weather data, stock market data, power consumption, consumer behavior data, medical and scientific data.

Watermark embedding for relational data is made possible by the fact that real data can very often tolerate a small amount of error without any significant degradation with respect to their usability. For example when dealing with weather data, changing some daily temperatures of 1 or 2 degrees is a modification that leaves the data still usable.

To date only a few approaches to the problem of watermarking relational data have been proposed. These techniques, however, are not very resilient to watermark attacks. In this project, we present a watermarking technique for relational data that is highly resilient compared to these techniques. In particular, our proposed technique is resilient to tuple deletion, alteration, and insertion attacks.
Reply

#2
[attachment=5833]
Watermarking Relational Databases

Rakesh Agrawal Jerry Kiernan
IBM Almaden Research Center
650 Harry Road, San Jose, CA 95120

Abstract
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking, and provide desirable properties of a watermarking system for relational data. A watermark can be applied to any database relation having attributes which are such that changes in a few of their values do not affect the applications. We then present an effective watermarking technique geared for relational data. This technique ensures that some bit positions of some of the attributes of some of the tuples contain specific values. The tuples, attributes within a tuple, bit positions in an attribute, and specific bit values are all algorithmically determined under the control of a private key known only to the owner of the data. This bit pattern constitutes the watermark. Only if one has access to the private key can the watermark be detected with high probability. Detecting the watermark neither requires access to the original data nor the watermark. The watermark can be detected even in a small subset of a watermarked relation as long as the sample contains some of the marks. Our extensive analysis shows that the proposed technique is robust against various forms of malicious attacks and updates to the data. Using an implementation running on DB2, we also show that the performance of the algorithms allows for their use in real world applications.
Reply

#3
WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES

abstract:
Proving ownerships rights on outsourced relational database is a crucial issue in today's internet based application environments and in many content distribution applications. In this paper, we present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. We formulate the watermarking of relational databases as a constrained optimization problem and discus efficient techniques to solve the optimization problem and to handle the onstraints. Our watermarking technique is resilient to watermark synchronization errors because it uses a partioning approach that does not require marker tuple. Our approach overcomes a major weakness in previously proposed watermarking techniques. Watermark decoding is based on a threshold-based technique characterized by an optimal threshold that minimizes the probability of decoding errors. We implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration and insertion attacks
Reply

#4
to get information about the topic uses of watermarking full report ,ppt and related topic refer the page link bellow

http://seminarsprojects.net/Thread-digit...king--5450

http://seminarsprojects.net/Thread-water...ues?page=2

http://seminarsprojects.net/Thread-water...evaluation

http://seminarsprojects.net/Thread-water...ull-report

http://seminarsprojects.net/Thread-water...-algorithm

http://seminarsprojects.net/Thread-digit...ad?page=15

http://seminarsprojects.net/Thread-digit...?pid=20966

http://seminarsprojects.net/Thread-conte...ech-signal
Reply

#5
to get full documentation of the idea WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES please see http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf or http://portal.acmcitation.cfm?id=1340185
Reply

#6

i want ful documentation of the project at any cost
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.