IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 1 - Issue 10, November 2012 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Voice Based Watermarking Technique for Relational Databases

[Full Text]

 

AUTHOR(S)

Sachin Balawant Takmare, Ravindra Kumar Gupta, Gajendra Singh Chandel

 

KEYWORDS

Index Terms- watermarking relational databases, unauthorized access protection, analog signal, biometric technology, malicious attacks.

 

ABSTRACT

Abstract- This paper is about the technique of watermarking relational databases for unauthorized access. Signals of voice are introduced as watermark to be embedded into the relations; associated novel watermark insertion algorithm and detection algorithm are proposed. Detecting the watermark neither requires access to the original data nor the watermark. Thus, the watermark signal in this method is expected to be more meaningful and has closer correlative to the unauthorized user. The proposed technique is feasible, and robust against various forms of malicious attacks.

 

REFERENCES

1) R.Agrawal, J. Kiernan, “Watermarking relational databases”, proceedings of the 28th International Conference on VLDB, 2002, pp.155-166.

2) R.Agrawal, P. J. Hass, J. Kiernan “Watermarking relational data : Framework, Algorithms and Analysis”, VLDB Journal, 2003, pp.157-169.

3) Ali-Haj, Ashraf Odeh, “Robust and Blind Watermarking of relational Database system”,Journal of computer science4(12); 1024-1029,2008, ISSN 1549-3636.

4) V. S. Inamdar, PP. Rege, Aarti Bang “Speech Based watermarking for Digital Images”, TENCON 2009, 978-1-4244-4257/9/09.

5) Arti Deshpande, Jayant Ghatage ,”New watermarking Technique for relational databases”, Second International Conference on emerging trends in engineering and technology, ICETET-09.

6) Meng-Hsium Tsai, Hsaio-Yun Tseng, Chen-Ying Lai, “A database technique for temper detection”.

7) Sonia Jain, “Digital watermarking techniques: A case study in fingerprints and faces”.

8) Mailing Meng, Xinchun Cui, haiting Cui. “The Approch for optimization in watermark signal of database by using generic algorithms”. International conference on computer science and information technology 2008.