Voice Based Watermarking Technique for Relational Databases
[Full Text]
AUTHOR(S)
Sachin Balawant Takmare, Ravindra Kumar Gupta, Gajendra Singh Chandel
KEYWORDS
Index Terms- watermarking relational databases, unauthorized access protection, analog signal, biometric technology, malicious attacks.
ABSTRACT
Abstract- This paper is about the technique of watermarking relational databases for unauthorized access. Signals of voice are introduced as watermark to be embedded into the relations; associated novel watermark insertion algorithm and detection algorithm are proposed. Detecting the watermark neither requires access to the original data nor the watermark. Thus, the watermark signal in this method is expected to be more meaningful and has closer correlative to the unauthorized user. The proposed technique is feasible, and robust against various forms of malicious attacks.
REFERENCES
1) R.Agrawal, J. Kiernan, “Watermarking relational databases”, proceedings of the 28th International Conference on VLDB, 2002, pp.155-166.
2) R.Agrawal, P. J. Hass, J. Kiernan “Watermarking relational data : Framework, Algorithms and Analysis”, VLDB Journal, 2003, pp.157-169.
3) Ali-Haj, Ashraf Odeh, “Robust and Blind Watermarking of relational Database system”,Journal of computer science4(12); 1024-1029,2008, ISSN 1549-3636.
4) V. S. Inamdar, PP. Rege, Aarti Bang “Speech Based watermarking for Digital Images”, TENCON 2009, 978-1-4244-4257/9/09.
5) Arti Deshpande, Jayant Ghatage ,”New watermarking Technique for relational databases”, Second International Conference on emerging trends in engineering and technology, ICETET-09.
6) Meng-Hsium Tsai, Hsaio-Yun Tseng, Chen-Ying Lai, “A database technique for temper detection”.
7) Sonia Jain, “Digital watermarking techniques: A case study in fingerprints and faces”.
8) Mailing Meng, Xinchun Cui, haiting Cui. “The Approch for optimization in watermark signal of database by using generic algorithms”. International conference on computer science and information technology 2008.
|