IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING WATERMARKING

Size: px
Start display at page:

Download "IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING WATERMARKING"

Transcription

1 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING ABSTRACT: Rucha D. Kulkarni and Dipak V. Patil G.E.S s R.H Sapat C.O.E. M.S. and R,Nashik,Savitribai Phule Pune University,India Relational data particularly shared extensively by the owners with research communities and in virtual data storage locations in the cloud, to work in a collaborative environment for knowledge extraction and decision making and also to make data openly available. Thus they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is used to ensure security related to ownership protection and tamper proofing in various data formats. While ownership protection using watermarking, the relational data gets modified so that the data quality gets compromised. Traditional watermarking techniques were unable to recover original data from watermarked data. Reversible watermarking is watermarking technique that tries to overcome the problem of data quality degradation by allowing recovery of original data along with the embedded watermark information. To ensure watermark encoding and decoding by using all the features in knowledge discovery and original data recovery in the presence of active malicious attacks reversible watermarking is used. Encryption of nonnumeric data is utilized as a contribution in the existing system which provides privacy preservation to both numeric as well as non-numeric data. Keywords: Reversible watermarking, genetic algorithm, ownership protection, data quality, encryption [1] INTRODUCTION In today s surge due to extensive growth of the Internet offers wide range of web services. Examples are e-commerce, decision support system, database, digital repositories and libraries etc. Relational data particularly used extensively by the cloud users and owners for research oriented work. The purpose is to share data that can be useful in collaborative environment and make data available to all so that it is useful for knowledge extraction and decision making. However these transparently accessible datasets make appealing focuses for attacks. Thus it is important, that in shared environments like cloud, security threats that arise from un-authenticated parties and relational databases are necessary to be addressed along with the application of ownership rights on behalf of their owners. Watermarking systems have broadly been utilized to guarantee security as far as ownership protection and sealing for a wide variety of data formats. Reversible watermarking strategies can guarantee information or data regeneration alongside ownership protection. Serial codes, data hashing, fingerprinting [1] are some alternative techniques used for ownership protection. A Rucha D. Kulkarni, Dipak V. Patil 1

2 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING transactional watermark which is also known as fingerprinting that are used to guide and identify digital ownership by watermarking all the replicas of contents with different watermarks for different recipients. Basically this sort of advanced watermarking tries to recognize the root of data emission by tracking criminal operators. Watermarking has the property that it can serve protecting ownership over the digital content by marking the information with a watermark exclusive to the owner. The embedded watermark can afterwards be used for proving and claiming ownership. Reversible watermarking tries to defeat the issue of information quality down gradation by permitting regeneration of unique information alongside the embedded watermark data. Proposed framework shows such reversible watermarking method that keeps the information valuable for learning revelation. Figure: 1. General block diagram of watermarking for database [Figure-1] shows general structure of watermarking process. In this process original data gets processed through watermarking algorithm. While processing original data watermark gets embedded into it, at the end system will return recovered data. [2] LITERATURE SURVEY Watermarking database relations is a area which demand research focus owing to the commercial implications of database theft. Digital watermarking for relational databases emerged as a candidate solution to provide problems regarding security such as copyright protection, tamper detection etc. Many watermarking techniques have been proposed in the previous work to address these purposes. Digital watermarking of multimedia content is more commonly acknowledged, particularly image watermarking. Some reversible digital watermarking techniques related to proposed system is mentioned below. Reversible watermarking for image: Adnan M Alattar [3] proposed multimedia reversible watermarking. They proposed algorithm that based on difference expansion of colored images. Since the watermark is completely reversible, the original image can he recovered exactly. Ingemar J. Cox[4] presented a secure algorithm for 2

3 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN watermarking images, and a methodology for multimedia watermarking that may be derived for audio, video, and multimedia data. Irreversible relational database watermarking: Agrawal and kierman[5] proposed first well understood conventional irreversible database watermarking plan for watermarking relational databases for numeric qualities. The system survives a few assaults and which safeguards mean variance of all numerical characteristic. This plan can t be straightforwardly applied to watermarking categorical.to settle this issue Sion, R [6] presented a one of a kind technique for rights preservation for categorical information through watermarking to fix this issue. This plan includes watermarking of categorical property by changing some of its quality to other worth to the property if such change is bearable in certain applications. Reversible relational database watermarking: Zhang et al. [7] proposed first reversible watermarking of relational database to accomplish less also correct verify of relational databases by means of expansion on data error histogram. This strategy has distributive mistake inside of two uniformly circulated variables as some beginning nonzero digits of errors to manufactured histograms. Gaurav Gupta and Josef Pieprzyk [8] proposed an change over the reversible and blind watermarking plan introduced, identifying and wiping out a basic issue with the past methods related with reversible watermarking. The proposed plan gives high security against secondary watermarking Attacks. Jung-Nan Chang and Hsien-Chu Wu [9] proposed strategy that recognizes database altered by installed significance describe of the innovation of database. The affiliation guideline of frequent pattern tree information mining is utilized to recognize the relationship existing with the protected attribute and others too in the database. Khurram Jawad, Asifullah Khan [10] presented new robust procedure for reversible watermarking approach for the security of relational databases. This methodology depends on the thought of difference expansion as on using genetic algorithm (GA)to enhance watermark limit and to reduce distort error. M. E.Farfoura and S.- J. Horng, [11] introduced a novel blind reversible watermarking strategy that guarantees us the responsibility for in the range of Relational Database of watermarking. In the proposed technique D. M.Thodi and J. J. Rodriguez [12] proposed an optional solution to distortion by using histogram shifting technique. The technique enhances distortion performance at low embedding limit. To enhance this new strategy was exhibited called prediction error expansion. Mahmoud E. Farfoura,Shi-Jinn Horng an,et.al [13] designed and used a confirmation protocol in view of an productive time-stamp convention, and they proposed a visually impaired turning around watermarking technique that guarantee assure ownership in the territory of relative database watermarking. Erik Sonnleitner [14] proposed a watermarking algorithm in based on parameter that tuple dividing watermarking and white spaces while utilizing it as a part of open watermark. The watermarking plan is non intrusive resilient also oblivious to reversibly and its suitable for databases of any sizes with sensible exhibitions on inserting and extraction. Javier Franco-Contreras, Gouenou Coatrieux,et.al[15] proposed the robust reversible watermarking modified by initially proposed under Vleeschouwer et.al for the pictures assurance of given relational databases. The propose plan states relative precise position of the circular histogram centric mass of one numerical quality for message showing and installing. Various encryption methods for nonnumeric data are available in [19]. Rucha D. Kulkarni, Dipak V. Patil 3

4 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING [3] PROPOSED SYSTEM The proposed framework is based on work by Saman Iftikhar et al.[1] which is for numeric data, along with this we have proposed to add ownership right protection for non-numeric data. In this system the most part focuses on reversible watermarking of relational database which authorizes ownership rights and gives intends to handling information altering without compromising information quality and recovers unique information after watermark decoding. In this framework watermark creation is done utilizing Genetic algorithm as an evolutionary technique. The proposed framework mainly contains following phases: 1) Preprocessing: In the preprocessing phase, two important tasks are accomplished: a) Selection of a suitable component for watermark embedding: For developing a huge data model of different elements of the dataset, every one of the components are positioned by their impact in data extraction, in light of their mutual dependence on different elements. For this reason, mutual information (MI), is exploited that is a imperative statistical measure for calculation of shared dependence of two arbitrary variables. Mutual information is calculated using following equation, Let, P A(a)- Probability of tuple a in feature A, P B(b)- Probability of tuple b in feature B, P AB(a,b)- Joint probability and MI(A,B)-measures degree of correlation of feature by measuring probability distributions Figure: 2. Equation to calculate Mutual Information b) Calculation of an optimal watermark with the help of an optimization technique: For the making of ideal watermark data that should be inserted in the first information we utilize a evolutionary method Genetic Algorithm. In the search of optimal solution, the GA follows an iterative mechanism to expand a population of chromosomes. The GA preserves essential data utilizing the application of essential genetic operations to these chromosomes that include selection, crossover, mutation and replacement. The GA inspected the nature of every applicant chromosome by exploiting a fitness function. The evolutionary system of the GA over and again proceeds through various eras, until some finish criteria is met. The fitness function can be mathematically expressed as following in which A indicates one of the feature in set of features F max β A...(2) where, AϵF, A 2) Watermark encoding: In this stage watermark has been embedded in selected feature. The watermark is embedded into each tuple for the selected feature of the dataset. The information owner can choose any number of elements for watermark implanting based upon a secret limit and Mutual 4

5 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN data of the elements. The watermark encoding algorithm begins the embedding process with the most significant bit MSB of the watermark. To accomplish this algorithm works with one tuple at once. Watermark gets encoded in selected feature, after creation of watermark is completed. While encoding watermark into tuples of selected feature first it is checked that which chromosome is optimal and optimum value of β. After finding optimum value of _ parameter _r that denotes percentage change in watermark encoding is calculated using equation given as follows where WEn denotes watermark encoder. η r = D r * WEn...(3) Figure: 3. System Architecture Algorithm Input: original database, watermark bits, optimized value to watermarked feature Output: Watermarked database, matrix containing percent change in data values 1. for all watermark bits of length l do 2. for all tuples of data 3. if watermark bit is 0 then 4. Compute changes using equation (3) Rucha D. Kulkarni, Dipak V. Patil 5

6 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING 5. Watermark data using D Wr = D r + β 6. if watermark bit is 1 then 7. Compute changes using equation(3) 8. Watermark data using D Wr = D r - β 9. End if 10. End for 11. Else if non-numeric data, do encryption using AES algorithm 12. End if 3) Watermark decoding: In the watermark decoding process, the initial step is to recognize the elements which have been checked. The procedure of optimization through GA is not required at this stage. We utilize a watermark decoder which computes the measure of progress in the estimation of an element that does not change its information quality. The watermark decoder translates the watermark by working with one piece at once. In watermark decoding phase very first task is to locate features which have been marked. WDe watermark decoder is used to calculate amount of change in value of feature that won t affect to data quality. Percentage change which is denoted by _dr is calculated as follows: η Δr = D w * WDe...(4) η Δr = η dr η r...(5) where, η Δr = The difference between the changes detected in the value of a feature during the encoding and decoding Algorithm Input: Watermarked database, matrix containing percent change in data values, length of watermark Output: Decoded watermark 1. for all tuples of data do 2. for all watermark bits of length l 3. Detected amount of change is computed using equation (4) 4. Difference in detected changes using equation (5) 5. if difference in detected changes 0 then 6. Detected watermark bit is 1 7. Else if if difference in detected changes 0 and 1 then 8. Detected watermark bit is 0 9. End if 10. End for 4) Data recovery: After identifying the watermark string, a few post processing steps are performed for error correction and data recovery. The optimized value β of calculated through the GA is used for reconstruction of original data using following equations: D r = D Wr + β...(6) D r = D Wr - β...(7) Algorithm 6

7 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN Input: Watermarked database, watermark bits Output: recovered database 1. for all tuples of data do 2. for all watermark bits of length l 3. if detected watermark bit is 1 then 4. Data is recovered using equation (6) 5. Else use equation (7) 6. End if 7. End for 8. Else if non-numeric data, apply decryption [4]. EXPERIMENTAL SETUP AND RESULTS Heart disease dataset from UCI repository [16] is used for this experiment. Table I shows description of classes and instances, where each class refers to heart disease. It has 920 number of instances and there are 76 attributes of which 15 are used for experiment.14 are numeric and 1 non-numeric. Attribute names are: Name, Age, sex, cp, trestps, chol, fbs, restecg, thalach, exang, oldpeak, slope, ca, thal, num. Class Instances Cleveland 303 Hungarian 294 Switzerland 123 Long 200 Beach VA TABLE I: Heart disease dataset Mutual Information (MI)[17],[18] is a popular information concept that calculates amount of details one feature has about other feature in dataset statistically. MI identifies features that don t have any significant effect on decision making process. Thus MI is an important statistical measure for computation of mutual dependence of two variables. The Table II show the results we obtained after calculating mutual information between age and each other attribute in the dataset. So, the MI of age is blank. Likewise mutual information is calculated between every feature with all other features. For determining data quality MI is used as measure. Attributes MI O MI W MI Age - - Sex Rucha D. Kulkarni, Dipak V. Patil 7

8 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING Cp Trestbps Chol Fbs Restecg Thalach Exang Oldpeak Slope Ca Thal Num TABLE II: Mutual Information of Selected Feature Before and After Watermarking The quality of proposed system is also evaluated using other statistical measures like mean and variance. Table III shows mean and variance before and after watermarking. Mean O Variance O Mean W Variance W TABLE III: Mean and Variance before and after watermarking. [6] CONCLUSION The proposed system is a system to protect ownership rights of relational database. The system creates watermark using genetic algorithm as an optimization technique, is able to protect ownership rights of relational data along with robustness without compromising data quality. The system has exploited GA as a optimization technique. GA applied on current problem domain provides global optimal solution. Irreversible watermarking techniques make changes in the data to such an extent that data quality gets compromised. Proposed reversible watermarking technique is used to cater to such scenarios because this is able to recover original data from watermarked data and ensure data quality to some extent. Technologies and techniques mentioned in proposed system have been adapted and integrated in order to build the overall system for ownership rights protection of relational database. In 8

9 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN addition with this watermarking of numerical data we are also providing privacy preservation to nonnumeric data. REFERENCES [1] Saman Iftikhar, M. Kamran, and Zahid Anwar, RRW-A Robust and Reversible watermarking Technique for Relational Data IEEE transactions on knowledge and data engineering, vol. 27, no. 4, april 20 [2] Raju Halder,Shantanu Palet.al, Watermarking Techniques for Relational Databases: Survey, Classication and Comparison Journal of Universal Computer Science, vol. 16, no. 21 (2010) [3] A. M. Alattar, Reversible watermark using difference expansion of triplets, in Proc. IEEE Int. Conf. Image Process., 2003, pp. I-501,vol. 1. [4] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process.,vol. 6, no. 12, pp , Dec [5] R. Agrawal and J. Kiernan, Watermarking relational databases, in Proc. 28th Int. Conf. Very Large Data Bases, 2002, pp [6] Sion, R.Proving ownership over categorical data. In Proceedings of the 20th IEEE international conference on data Engineering ICDE, April 2004 (pp ). [7] Y. Zhang, B. Yang, and X.-M. Niu, Reversible watermarking for relational database authentication, J. Comput., vol. 17,no. 2, pp , [8] G. Gupta and J. Pieprzyk, Database relation watermarking resilient against secondary watermarking attacks, in Information Systems and Security. New York, NY,USA: Springer, 2009, pp [9] J.-N. Chang and H.-C. Wu, Reversible fragile database watermarking technology using difference expansion based on SVR prediction, in Proc. IEEE Int. Symp. Computer., Consum. Control, 2012, pp [10] K. Jawad and A. Khan, Genetic algorithm and dierence expansion based reversible watermarking for relational databases J. Syst. Softw., vol. 86, no. 11, pp , [11] M. E. Farfoura and S.-J. Horng, A novel blind reversible method for watermarking relational databases, in Proc. IEEE Int. Symp. Parallel Distrib. Process. Appl., 2010,pp [12] D. M. Thodi and J. J. Rodriguez, Prediction-error based reversible watermarking, in Proc. IEEE Int. Conf. Image Process. 2004, vol. 3, pp [13] M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen, and M. K. Khan, A blind reversible method for watermarking relational databases based on a time-stamping Syst.Appl., vol. 39, no. 3, pp , [14] E. Sonnleitner, robust watermarking approach for large databases, in Proc. IEEE First AESS Eur. Conf. Satellite Telecommun.,2012, pp [15] Javier Franco-Contreras, Gouenou Coatrieux, Robust Lossless Watermarking of Based on Circular Histogram Modulation,IEEE Transactions on information forensics and security, Vol. 9, No. 3, March 2014 [16] K. Bache and M. Lichman. (2013). UCI machine learning repository [Online]. Available: [17] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York, NY, USA: Wiley- Interscience, Rucha D. Kulkarni, Dipak V. Patil 9

10 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING [18] Huan Liu,Hiroshi Motoda,Computational Methods of Feature Selection. william stalling,cryptography and network security 4 th edition. Author[s] brief Introduction Rucha D. Kulkarni Is pursuing the Masters in Computer from G. E. S. R. H. Sapat College of Engg., Nashik under Savitribai Phule Pune University.She has pursued her Bachelor s Degree in IT from K.K.W.I.E.E.R., Nashik under Savitribai Phule Pune University. Dipak V. Patil received B.E. degree in computer engineering in 1998 from University of North Maharashtra India and M.Tech. degree in computer Engineering in 2004 from Dr.B. A. Technological University, Lonere, India. He has done Ph.D. degree from S. R. T. M. University, Nanded. Currently he is an Associate Professor in Computer Engineering Department at G.E. S. R. H. Sapat College of Engg., Nashik,India.His research interests are in data mining and soft computing. 10

Watermarking Scheme for Numerical and Non-Numerical Relational Database

Watermarking Scheme for Numerical and Non-Numerical Relational Database Watermarking Scheme for Numerical and Non-Numerical Relational Database Priyanka R. Gadiya 1, Prof. P.A.Kale 2 priyankagadiya89@gmail.com 1, prashantkale15@gmail.com 2 M. E. Student, Dept. of Computer

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016

International Journal of Modern Trends in Engineering and Research  e-issn No.: , Date: April, 2016 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Watermarking Technology for Relational Database Priyanka R. Gadiya 1,Prashant

More information

Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data

Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data Gayatri R. Ghogare 1, Prof. Aparna Junnarkar 2 1Student, ME, Department of Computer Engineering, P.E.S

More information

ISSN Vol.04,Issue.17, November-2016, Pages:

ISSN Vol.04,Issue.17, November-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.17, November-2016, Pages:3280-3287 Secure Conservatory Embedded Techniques for Reversible Watermarking of Relational Data AMTUL SUFIA 1, DR. MD. WAHEEDUDDIN

More information

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Multilayer Data Embedding Using Reduced Difference Expansion

Multilayer Data Embedding Using Reduced Difference Expansion Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai

More information

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College

More information

Various Approaches for Watermarking of Relational Databases Mohit Bhesaniya, J.N.Rathod, Kunal Thanki

Various Approaches for Watermarking of Relational Databases Mohit Bhesaniya, J.N.Rathod, Kunal Thanki Various Approaches for Watermarking of Relational s Mohit Bhesaniya, J.N.Rathod, Kunal Thanki Abstract as a tool for storing and managing data, relational database is widely used in many information systems.

More information

Heart Disease Detection using EKSTRAP Clustering with Statistical and Distance based Classifiers

Heart Disease Detection using EKSTRAP Clustering with Statistical and Distance based Classifiers IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. IV (May-Jun. 2016), PP 87-91 www.iosrjournals.org Heart Disease Detection using EKSTRAP Clustering

More information

A Formal Model to Preserve Knowledge in Outsourced Datasets

A Formal Model to Preserve Knowledge in Outsourced Datasets A Formal Model to Preserve Knowledge in Outsourced Datasets 1 Veera Ragavan K, 2 Karthick S 1 ME Student, 2 Asst.Prof 1,2 Dept of Software Engineering, SRM University, Chennai, India 1 ragu.skp@gmail.com,

More information

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta

More information

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

Watermarking Of Relational Databases Mohit H Bhesaniya 1, Kunal Thanki 2

Watermarking Of Relational Databases Mohit H Bhesaniya 1, Kunal Thanki 2 Watermarking Of Relational s Mohit H Bhesaniya 1, Kunal Thanki 2 1 Department of computer engineering, AITS, Rajkot,Gujarat, India. 2 Department of computer engineering, Government polytechnique, porbandar.gujarat,

More information

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption GA Based Reversible Hiding in Encrypted s by Reserving Room before Encryption Patil K.U. 1 &Nandwalkar B.R. 2 1,2 (Comp. Engg. Dept., GNS COENashik, SPP Univ., Pune(MS), India) Abstract Information Security

More information

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,

More information

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

A Survey on improving performance of Information Retrieval System using Adaptive Genetic Algorithm

A Survey on improving performance of Information Retrieval System using Adaptive Genetic Algorithm A Survey on improving performance of Information Retrieval System using Adaptive Genetic Algorithm Prajakta Mitkal 1, Prof. Ms. D.V. Gore 2 1 Modern College of Engineering Shivajinagar, Pune 2 Modern College

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Watermarking for Security in Database

Watermarking for Security in Database Watermarking for Security in Database Prof. Manoj Dhande Department of Computer Engineering of Shah and Anchor Kutchhi Engineering College, Chembur, University of manoj.dhande@gmail.com Aishwarya Kotyankar

More information

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3

More information

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Region Based Even Odd Watermarking Method With Fuzzy Wavelet Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES

COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES USING DIFFERENT DATASETS V. Vaithiyanathan 1, K. Rajeswari 2, Kapil Tajane 3, Rahul Pitale 3 1 Associate Dean Research, CTS Chair Professor, SASTRA University,

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

Fragile Watermarking of 3D Models Using Genetic Algorithms

Fragile Watermarking of 3D Models Using Genetic Algorithms JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOG, VOL. 8, NO., SEPTEMBER Fragile Watermarking of D Models Using Genetic Algorithms Mukesh Motwani, Rakhi Motwani, and Frederick Harris, Jr. Abstract This paper

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,

More information

Self Destruction Of Data On Cloud Computing

Self Destruction Of Data On Cloud Computing Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Self Destruction Of Data On Cloud Computing Pradnya Harpale 1,Mohini Korde 2, Pritam

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

Keywords Data alignment, Data annotation, Web database, Search Result Record

Keywords Data alignment, Data annotation, Web database, Search Result Record Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

Cluster based boosting for high dimensional data

Cluster based boosting for high dimensional data Cluster based boosting for high dimensional data Rutuja Shirbhate, Dr. S. D. Babar Abstract -Data Dimensionality is crucial for learning and prediction systems. Term Curse of High Dimensionality means

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 6, June-2018 SECURE DATA HIDING IN AUDIO

More information

FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING

FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,

More information

ANALYSIS OF AES ENCRYPTION WITH ECC

ANALYSIS OF AES ENCRYPTION WITH ECC ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer

More information

Digital Watermarking on Micro Image using Reversible Optical Reproduction

Digital Watermarking on Micro Image using Reversible Optical Reproduction Digital Watermarking on Micro Image using Reversible Optical Reproduction Shraddha Raut, Antra Bhattacharya & S. P. Khandait G.H.R.I.E.T.W, G.H.R.I.E.T.W, K.D.K.C.E E-mail : rautshraddha@yahoo.in, antarab@rediffmail.com,

More information

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS

A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS ABD. S. ALFAGI 1 *, A. ABD. MANAF 1, B. A. HAMIDA 2, R. F. OLANREWAJUB 2 1 Advanced

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.2 Secret Key Cryptography CSC 474/574 Dr. Peng Ning 1 Agenda Generic block cipher Feistel cipher DES Modes of block ciphers Multiple encryptions Message

More information

Robust Lossless Data Hiding. Outline

Robust Lossless Data Hiding. Outline Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust

More information

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE

More information

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 Volume 1 Issue 4 ǁ May 2016 ǁ PP.01-07 Comparative Analysis of 2-Level and 4-Level for Watermarking and Tampering

More information

Schema Matching with Inter-Attribute Dependencies Using VF2 Approach

Schema Matching with Inter-Attribute Dependencies Using VF2 Approach International Journal of Emerging Engineering Research and Technology Volume 2, Issue 3, June 2014, PP 14-20 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Schema Matching with Inter-Attribute Dependencies

More information

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

S. Indirakumari, A. Thilagavathy

S. Indirakumari, A. Thilagavathy International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme

More information

Partition Based Perturbation for Privacy Preserving Distributed Data Mining

Partition Based Perturbation for Privacy Preserving Distributed Data Mining BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 2 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0015 Partition Based Perturbation

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

Secure and Reliable Watermarking in Relational Databases

Secure and Reliable Watermarking in Relational Databases Secure and Reliable Watermarking in Relational Databases G.Shyamala 1, I.Jasmine Selvakumari Jeya 2, M.Revathi 3 1 (PG Student, Dept. of CSE, Hindusthan College of Engineering and Tech, Coimbatore, Tamil

More information

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6) International Journals of Advanced Research in Computer Science and Software Engineering ISS: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Image Encryption Based on 2D Baker Map and 1D Logistic

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

Deduplication of Hospital Data using Genetic Programming

Deduplication of Hospital Data using Genetic Programming Deduplication of Hospital Data using Genetic Programming P. Gujar Department of computer engineering Thakur college of engineering and Technology, Kandiwali, Maharashtra, India Priyanka Desai Department

More information

Improved Frequent Pattern Mining Algorithm with Indexing

Improved Frequent Pattern Mining Algorithm with Indexing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,

More information

Research of Applications in Relational Database on Digital. Watermarking Technology

Research of Applications in Relational Database on Digital. Watermarking Technology International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 9ǁ September 2013 ǁ PP.84-89 Research of Applications in Relational Database on Digital

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

Advanced Digital Image Forgery Detection by Using SIFT

Advanced Digital Image Forgery Detection by Using SIFT RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering

More information

International Journal of Modern Trends in Engineering and Research

International Journal of Modern Trends in Engineering and Research International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Analysis of Content Based Video Copy Detection using different Wavelet Transforms

More information

SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR

SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR Kunjali Pawar 1 and Madhuri Patil 2 1 M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

An Overview of various methodologies used in Data set Preparation for Data mining Analysis

An Overview of various methodologies used in Data set Preparation for Data mining Analysis An Overview of various methodologies used in Data set Preparation for Data mining Analysis Arun P Kuttappan 1, P Saranya 2 1 M. E Student, Dept. of Computer Science and Engineering, Gnanamani College of

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

Robust Watermark Algorithm using Genetic Algorithm

Robust Watermark Algorithm using Genetic Algorithm JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

DATA hiding [1] and watermarking in digital images

DATA hiding [1] and watermarking in digital images 14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,

More information

A Brief Comparison of Security Patterns for Peer to Peer Systems

A Brief Comparison of Security Patterns for Peer to Peer Systems A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological

More information

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING Ajeet Pratap Singh 1, Sachin Kumar 2 1,2 Department of ECE, ASET, Amity University, Lucknow, U.P., (India) ABSTRACT The

More information

Sign-up Sheet posted outside of my office HFH 1121

Sign-up Sheet posted outside of my office HFH 1121 Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet

More information

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Improvement of Web Search Results using Genetic Algorithm on Word Sense Disambiguation

Improvement of Web Search Results using Genetic Algorithm on Word Sense Disambiguation Volume 3, No.5, May 24 International Journal of Advances in Computer Science and Technology Pooja Bassin et al., International Journal of Advances in Computer Science and Technology, 3(5), May 24, 33-336

More information

Robust and Blind Watermarking of Relational Database Systems

Robust and Blind Watermarking of Relational Database Systems Journal of Computer Science 4 (12): 1024-1029, 2008 ISSN 1549-3636 2008 Science Publications Robust and Blind Watermarking of Relational Database Systems 1 Ali Al-Haj and 2 Ashraf Odeh 1 Princess Sumaya

More information

WEINER FILTER AND SUB-BLOCK DECOMPOSITION BASED IMAGE RESTORATION FOR MEDICAL APPLICATIONS

WEINER FILTER AND SUB-BLOCK DECOMPOSITION BASED IMAGE RESTORATION FOR MEDICAL APPLICATIONS WEINER FILTER AND SUB-BLOCK DECOMPOSITION BASED IMAGE RESTORATION FOR MEDICAL APPLICATIONS ARIFA SULTANA 1 & KANDARPA KUMAR SARMA 2 1,2 Department of Electronics and Communication Engineering, Gauhati

More information

RECORD DEDUPLICATION USING GENETIC PROGRAMMING APPROACH

RECORD DEDUPLICATION USING GENETIC PROGRAMMING APPROACH Int. J. Engg. Res. & Sci. & Tech. 2013 V Karthika et al., 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved RECORD DEDUPLICATION USING GENETIC PROGRAMMING

More information

R. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India

R. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Service Ranking

More information

Combined Hashing/Watermarking Method for Image Authentication

Combined Hashing/Watermarking Method for Image Authentication Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

A Comprehensive Survey of Watermarking Relational Databases Research

A Comprehensive Survey of Watermarking Relational Databases Research 1 A Comprehensive Survey of Watermarking Relational Databases Research M. Kamran and Muddassar Farooq Abstract Watermarking and fingerprinting of relational databases are quite proficient for ownership

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information