136 1462424464 - 05-05-2016 PDF
136 1462424464 - 05-05-2016 PDF
Volume: 4 Issue: 4
ISSN: 2321-8169
578 - 583
________________________________________________________________________________________________________
Aishwarya Kotyankar
Nidhi Mannadiar
manoj.dhande@gmail.com
aishwaryakotyankar.2016@gmail.com
nidhimannadiar.2016@gmail.com
Prajkta Jagtap
Department of Computer Engineering
Shah and Anchor Kutchhi Engineering College, Chembur
Mumbai, India
prajktajagtap.2016@gmail.com
Abstract: Watermarking technology is used to embed copyright information in objects such as images, audio, video and databases. The
increasing use of relational database systems in many real-life applications creates the need for database watermarking systems for protection of
database. As a result, watermarking relational database system deals with the legal issue of copyright protection of database system. There are
different types of databases like, Numerical and Categorical Databases. Working with numerical data is easier as compared to categorical
databases which is much harder to work with. This report addresses a unique, robust copyright protection scheme for Relational Database.
Watermark (Characteristic code) is a binary string calculated through the characteristic operation on the original database. A watermark is called
robust if it resists a designated class of transformations. Robust watermarks may be used in copy protection applications to carry copy and access
control information. The algorithm correlates characteristics according to the content of the databases, which can resist invertibility attack
efficiently.Invertibility attack on database is being considered in this paper.
Keywords: Digital Watermarking, Authentication, Relational Databases, Invertibility Attack, Relating Characteristic.
__________________________________________________*****_________________________________________________
I.
INTRODUCTION
A. Types of Watermarking:
1. Visible Watermarking
In visible watermarking, the information is visible in the
picture or video. The information is text or a logo which
identifies the owner of the media. When a television
broadcaster adds its logo to the comer of transmitted video,
this is also a visible watermark.
2.
3.
Invisible Watermarking
Source Tracking.
Broadcast Monitoring.
Content protection for audio and video content.
Forensics and piracy deterrence.
Communication of ownership and copyright.
Document and image security.
2.
3.
_______________________________________________________________________________________
ISSN: 2321-8169
578 - 583
________________________________________________________________________________________________________
attacks, provided that the attacks do not degrade the
1. Generate Hash Value:
usefulness of the data significantly.
A database is embedded with a watermark using a private
4.
Watermark information: The watermark information
secret key. A new virtual primary key is generated using a
that is embedded into a database can be a single-bit
cryptographic secure one-way hash function, which consists
watermark, a multiple-bit watermark, a fingerprint,
of with a secret key (KEY) in conjunction with the database
or multiple watermarks in different watermarking
table primary key (pk). Hashing algorithm-MD-5 is used.
schemes.
5.
Verifiability: A watermark solution is said to be
2. Encode Watermark:
private if the detection of a watermark can only be
To embed mark bits. All bits will be XORed with securely
performed bysomeone who owns a secret key and
selected MSB (Most Significant Bit) of selected attribute
can only be proven once to the public (e.g., to the
among changeable candidate attributes, according to
court). After this one-time proof, the secret key is
generated key. This approach will increase mark
known to the public and the embedded watermark
imperceptibility.
can be easily destroyed by malicious users. A
watermark solution is said to be public if the
3. To apply watermark to the Database:
detection of a watermark can be publicly proven by
anyone, as many times as necessary.
Two dimensions are used to refer the image directly, and
6.
Data structure: Different watermarking schemes are
does not map the image from two dimensions to a vector. A
designed to accommodate different structural
hash function is used to generate values for a tuple. We then
information of the underlying data, including
use the generated values and use it for elements coordinates
relational databases (with or without primary keys),
and the value of pixel in this coordinates will be embedded
data cubes, streaming data, and XML data.
into the relevant tuple.
4. Minimize Variation of Data:
Altering the value of attributes is the most important point in
database during watermarking and should be noted. The
vital issue is to limit modifications in the tuples, to an
acceptable range.
5. Selection of LSB:
In this method one of the specified LSBs will be selected
and modified.The attribute will be changed as well. If
thefirst LSB is the selected bit, the value will be changed in
minimum rate, but if the chosen bit is the second or a higher
bit, the value will be changed by more than one unit.
6. Commit:
Figure 2. Watermarking Process
C.PROPOSED ALGORITHM PROCESS
_______________________________________________________________________________________
ISSN: 2321-8169
578 - 583
________________________________________________________________________________________________________
Then he can forge the original database according to the
same with the legitimate owners by an attacker is shown as
fictitious watermark WM_ by using the same parameters to
formula (6):
fictitious watermark.
P =1
1000 1000 4 50
= 0.5 108 (6)
Once a forged original database Ris obtained, the attacker
So it can be concluded that it is impossible for an attacker to
may declare his copyright of database R_ by providing
select all the parameters same with those of the legitimate
forged original database R, watermark WM_ and
owner.
watermarked database R_.
At the same time, we can conclude from Table 3 that
different parameters have different effect on watermark
To confirm the copyright, a legitimate owner can providethe
detection. The effect of for watermark detection is
original database R, watermark WM, watermarkeddatabase
stronger.
R_. According to the proposed algorithm, characteristic code
for R and Rcan be computed respectively:
III.PROPOSED SYSTEM
_______________________________________________________________________________________
ISSN: 2321-8169
578 - 583
________________________________________________________________________________________________________
4. Perform the following permutation on the data
block.
5. Split the block into two halves. The first 32 bits are
called L[0], and the last 32 bits are called R[0].
6. Apply the 16 subkeys to the data block.
7. Expand the 32-bit R[i-1] into 48 bits according to
the bit-selection
8. Exclusive-or E(R[i-1]) with K[i].
9. Break E(R[i-1]) xor K[i] into eight 6-bit blocks
10. Substitute the values found in the S-boxes for all
Figure 2.3: Encrypted Database
B[j].
11. until all 8 blocks have been replaced.
12. Repeat the same for L[i-1]
13. Perform the permutation on the block R[16] L[16].
2.2 Decryption Algorithm :
1.
2.
3.
581
IJRITCC | April 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
578 - 583
________________________________________________________________________________________________________
_______________________________________________________________________________________
ISSN: 2321-8169
578 - 583
________________________________________________________________________________________________________
.In the experiments, database is used as the host, whereas
text and .jpeg images are used as watermark image.
V. ACKNOWLEDGEMENT
A Paper is a teamwork and reflects the contribution of
many people .We would like to thank everyone who has
contributed to this effort by sharing their time and taking
interest in our work and encouraging us all the way
through.In particular, we thank our guide Mr. Manoj
Dhande, for helping in our project. We thank him for his
guidance, support and words of encouragement throughout
the time of our project.
VI.REFERENCES
[1] R. Agrawal, P. J. Hass and J. Kiernan, Watermarking
relationaldata: framework, algorithms and analysis,
Proceedingsof the 28th VLDB Conference, 157-169,
2003.
[2] Y. Zhang, D. Zhao, and D. Li, Digital watermarking for
relational databases, Computer engineering and
application, No 25, 193-195, 2003. (In Chinese)
[3] Y. Wang, G. Zhu and S. Zhang "Research on the
Watermarking Algorithm based on Numerical Attributein
the Relational Database", IEEE, ICCSEE, pp. 363-367,
2012.
[4] M. Atallah and S. Wagstaff. Watermarking with
quadratic residues. In Proc. of IS&T/SPIE Conference on
Security and Watermarking of Multimedia Contents,
January 1999.
[5] K. Huang, M. Yue, P. Chen, Y. He and X. Chen "A
Cluster-based Watermarking Technique for Relational
Database", IEEE, IWDTA, pp. 107-110, 2009.
[6] Atallah M, Wagstaff S (1999) Watermarking with
quadrati residues.In: Proceedings of IS&T/SPIE
conference on security and watermarking of multimedia
contents, January 1999
[7] Y. Li, H. Guo and S. Jajodia, Tamper Detection and
Localization for Categorical Data Using Fragile
Watermarks. Proceedings of the 4thACM Workshop on
Digital Rights Management, Washington DC, USA, pp.
73-82, 2004.
[8] http://www.globalcis.org/jcis/ppl//JCIS1-088017IP4.pdf.
583
IJRITCC | April 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________