Genetic Algorithm Based Reversible Watermarking Approach For Relational Data

Gayatri R. Ghogare, Prof.Aparna A. Junnarkar


Over the past few years, excessive growth in the
use of Internet has led to the generation and consumption of
huge amount of relational data. Relational databases is been
openly available within shared environment for knowledge gain
and decision making purposes to a large extent. To protect
these databases from various security attacks(insertion, deletion,
alteration, etc.,) and data tampering, watermarking techniques
are enforced. Reversible watermarking schemes are used to
impose ownership rights and tackling data tampering. But
these schemes are not robust against different active malicious
attacks and they modify the data content to a very large
extent resulting in data degradation. In this paper, a Genetic
Algorithm(GA) based robust and reversible watermarking(RRW)
technique for a numerical relational data is proposed which
ensures: i) recovery of the original relational data along with
the embedded watermark information and ii) achieve robustness
(attack resilience) in the presence of malicious attacks. Use of
Mutual Information(MI) concept along with genetic algorithm
enhances the process of watermarking relational database and
enables successful data recovery. Experimental studies proves the
effectiveness and performance of RRW against the attacks and
degradation in data quality.

Full Text:



Saman Iftikhar, M. Kamran and Zahid Anwar, “RRW - A Robust and

Reversible Watermarking Technique for Relational Data”, in Proceedings

of IEEE Transactions on Knowledge and Data Engineering, val X, No :

XX , 2015.

K. Jawad and A. Khan, “Genetic algorithm and difference expansion

based reversible watermarking for relational databases”, Journal of Systems and Software, 2013.

Kamran M, Suhail S, Farooq M., “A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability

constraints”, IEEE Transactions on Knowledge and Data Engineering,

; 25(12): 26942707.

J.-N. Chang and H.-C. Wu, “Reversible fragile database watermarking

technology using difference expansion based on svr prediction”, Computer, Consumer and Control (IS3C), 2012 International Symposium on.

IEEE, 2012, pp. 690693.

E. Sonnleitner, “A robust watermarking approach for large databases”, in

Satellite Telecommunications (ESTEL), 2012 IEEE First AESS European

Conference on. IEEE, 2012, pp. 16.

M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen and M. K.

Khan, “A blind reversible method for watermarking relational databases

based on a time-stamping protocol”, Expert Systems with Applications,

vol. 39, no. 3, pp. 31853196, 2012.

M. Kamran and M. Farooq, “An information-preserving watermarking

scheme for right protection of emr systems”, Knowledge and Data

Engineering, on. IEEE Transactions, vol. 24, no. 11, pp. 19501962, 2012.

Coatrieux G, Chazard E, Beuscart R, Roux C., “Lossless watermarking

of categorical attributes for verifying medical data base integrity”, IEEE

Annual International Conference of the Engineering in Medicine and

Biology Society, EMBC, 2011, IEEE, Boston, MA, 2011;81958198.

Zhang L, Gao W, Jiang N, Zhang L, Zhang Y., “Relational databases

watermarking for textual and numerical data”, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC),

IEEE, Jilin, China, 2011; 16331636.

Y.-R. Wang, W.-H. Lin, and L. Yang, “An intelligent watermarking

method based on particle swarm optimization”, Expert Systems with

Applications, vol. 38, no. 7, pp. 8024 8029, 2011.

G. Gupta and J. Pieprzyk, “Database relation watermarking resilient

against secondary watermarking attacks”, in Information Systems Security.

Springer, 2009, pp. 222236.

G. Gupta and J. Pieprzyk, “Reversible and blind database watermarking

using difference expansion”, in Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications,

information, and multimedia and workshop. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering),

, p. 24.

S. Subramanya and B. K. Yi, “Digital rights management”, Potentials,

IEEE, vol. 25, no. 2, pp. 3134, 2006.

Y. Zhang, B. Yang, and X.-M. Niu, “Reversible watermarking for

relational database authentication”, Journal of Computers, vol. 17, no.

, pp. 5966, 2006.

M. E. Farfoura and S.-J. Horng, “A novel blind reversible method for

watermarking relational databases”, in Parallel and Distributed Processing with Applications (ISPA), 2010 International Symposium on. IEEE,

, pp. 563569.

D. M. Thodi and J. J. Rodriguez, “Prediction-error based reversible

watermarking”, in Image Processing, 2004. ICIP04. 2004 International

Conference on. IEEE, vol. 3., 2004, pp. 15491552.

D. M. Thodi and J. J. Rodriguez, “Reversible watermarking by

prediction-error expansion”, in Image Analysis and Interpretation, 2004.

th IEEE Southwest Symposium on. IEEE, 2004, pp. 2125.

A. M. Alattar, “Reversible watermark using difference expansion of

triplets”, in Image Processing, 2003. ICIP 2003. Proceedings. 2003

International Conference on. IEEE, vol. 1., 2003, pp. I501.

R. Agrawal and J. Kiernan, “Watermarking relational databases”, in

Proceedings of the 28th international conference on Very Large Data

Bases. VLDB Endowment, 2002, pp.


Copyright © IJETT, International Journal on Emerging Trends in Technology