Genetic Algorithm Based Reversible Watermarking Approach For Relational Data
Abstract
use of Internet has led to the generation and consumption of
huge amount of relational data. Relational databases is been
openly available within shared environment for knowledge gain
and decision making purposes to a large extent. To protect
these databases from various security attacks(insertion, deletion,
alteration, etc.,) and data tampering, watermarking techniques
are enforced. Reversible watermarking schemes are used to
impose ownership rights and tackling data tampering. But
these schemes are not robust against different active malicious
attacks and they modify the data content to a very large
extent resulting in data degradation. In this paper, a Genetic
Algorithm(GA) based robust and reversible watermarking(RRW)
technique for a numerical relational data is proposed which
ensures: i) recovery of the original relational data along with
the embedded watermark information and ii) achieve robustness
(attack resilience) in the presence of malicious attacks. Use of
Mutual Information(MI) concept along with genetic algorithm
enhances the process of watermarking relational database and
enables successful data recovery. Experimental studies proves the
effectiveness and performance of RRW against the attacks and
degradation in data quality.
Full Text:
PDFReferences
Saman Iftikhar, M. Kamran and Zahid Anwar, “RRW - A Robust and
Reversible Watermarking Technique for Relational Data”, in Proceedings
of IEEE Transactions on Knowledge and Data Engineering, val X, No :
XX , 2015.
K. Jawad and A. Khan, “Genetic algorithm and difference expansion
based reversible watermarking for relational databases”, Journal of Systems and Software, 2013.
Kamran M, Suhail S, Farooq M., “A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability
constraints”, IEEE Transactions on Knowledge and Data Engineering,
; 25(12): 26942707.
J.-N. Chang and H.-C. Wu, “Reversible fragile database watermarking
technology using difference expansion based on svr prediction”, Computer, Consumer and Control (IS3C), 2012 International Symposium on.
IEEE, 2012, pp. 690693.
E. Sonnleitner, “A robust watermarking approach for large databases”, in
Satellite Telecommunications (ESTEL), 2012 IEEE First AESS European
Conference on. IEEE, 2012, pp. 16.
M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen and M. K.
Khan, “A blind reversible method for watermarking relational databases
based on a time-stamping protocol”, Expert Systems with Applications,
vol. 39, no. 3, pp. 31853196, 2012.
M. Kamran and M. Farooq, “An information-preserving watermarking
scheme for right protection of emr systems”, Knowledge and Data
Engineering, on. IEEE Transactions, vol. 24, no. 11, pp. 19501962, 2012.
Coatrieux G, Chazard E, Beuscart R, Roux C., “Lossless watermarking
of categorical attributes for verifying medical data base integrity”, IEEE
Annual International Conference of the Engineering in Medicine and
Biology Society, EMBC, 2011, IEEE, Boston, MA, 2011;81958198.
Zhang L, Gao W, Jiang N, Zhang L, Zhang Y., “Relational databases
watermarking for textual and numerical data”, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC),
IEEE, Jilin, China, 2011; 16331636.
Y.-R. Wang, W.-H. Lin, and L. Yang, “An intelligent watermarking
method based on particle swarm optimization”, Expert Systems with
Applications, vol. 38, no. 7, pp. 8024 8029, 2011.
G. Gupta and J. Pieprzyk, “Database relation watermarking resilient
against secondary watermarking attacks”, in Information Systems Security.
Springer, 2009, pp. 222236.
G. Gupta and J. Pieprzyk, “Reversible and blind database watermarking
using difference expansion”, in Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications,
information, and multimedia and workshop. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering),
, p. 24.
S. Subramanya and B. K. Yi, “Digital rights management”, Potentials,
IEEE, vol. 25, no. 2, pp. 3134, 2006.
Y. Zhang, B. Yang, and X.-M. Niu, “Reversible watermarking for
relational database authentication”, Journal of Computers, vol. 17, no.
, pp. 5966, 2006.
M. E. Farfoura and S.-J. Horng, “A novel blind reversible method for
watermarking relational databases”, in Parallel and Distributed Processing with Applications (ISPA), 2010 International Symposium on. IEEE,
, pp. 563569.
D. M. Thodi and J. J. Rodriguez, “Prediction-error based reversible
watermarking”, in Image Processing, 2004. ICIP04. 2004 International
Conference on. IEEE, vol. 3., 2004, pp. 15491552.
D. M. Thodi and J. J. Rodriguez, “Reversible watermarking by
prediction-error expansion”, in Image Analysis and Interpretation, 2004.
th IEEE Southwest Symposium on. IEEE, 2004, pp. 2125.
A. M. Alattar, “Reversible watermark using difference expansion of
triplets”, in Image Processing, 2003. ICIP 2003. Proceedings. 2003
International Conference on. IEEE, vol. 1., 2003, pp. I501.
R. Agrawal and J. Kiernan, “Watermarking relational databases”, in
Proceedings of the 28th international conference on Very Large Data
Bases. VLDB Endowment, 2002, pp.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology