IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING WATERMARKING
|
|
- Dana Gilbert
- 5 years ago
- Views:
Transcription
1 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING ABSTRACT: Rucha D. Kulkarni and Dipak V. Patil G.E.S s R.H Sapat C.O.E. M.S. and R,Nashik,Savitribai Phule Pune University,India Relational data particularly shared extensively by the owners with research communities and in virtual data storage locations in the cloud, to work in a collaborative environment for knowledge extraction and decision making and also to make data openly available. Thus they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is used to ensure security related to ownership protection and tamper proofing in various data formats. While ownership protection using watermarking, the relational data gets modified so that the data quality gets compromised. Traditional watermarking techniques were unable to recover original data from watermarked data. Reversible watermarking is watermarking technique that tries to overcome the problem of data quality degradation by allowing recovery of original data along with the embedded watermark information. To ensure watermark encoding and decoding by using all the features in knowledge discovery and original data recovery in the presence of active malicious attacks reversible watermarking is used. Encryption of nonnumeric data is utilized as a contribution in the existing system which provides privacy preservation to both numeric as well as non-numeric data. Keywords: Reversible watermarking, genetic algorithm, ownership protection, data quality, encryption [1] INTRODUCTION In today s surge due to extensive growth of the Internet offers wide range of web services. Examples are e-commerce, decision support system, database, digital repositories and libraries etc. Relational data particularly used extensively by the cloud users and owners for research oriented work. The purpose is to share data that can be useful in collaborative environment and make data available to all so that it is useful for knowledge extraction and decision making. However these transparently accessible datasets make appealing focuses for attacks. Thus it is important, that in shared environments like cloud, security threats that arise from un-authenticated parties and relational databases are necessary to be addressed along with the application of ownership rights on behalf of their owners. Watermarking systems have broadly been utilized to guarantee security as far as ownership protection and sealing for a wide variety of data formats. Reversible watermarking strategies can guarantee information or data regeneration alongside ownership protection. Serial codes, data hashing, fingerprinting [1] are some alternative techniques used for ownership protection. A Rucha D. Kulkarni, Dipak V. Patil 1
2 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING transactional watermark which is also known as fingerprinting that are used to guide and identify digital ownership by watermarking all the replicas of contents with different watermarks for different recipients. Basically this sort of advanced watermarking tries to recognize the root of data emission by tracking criminal operators. Watermarking has the property that it can serve protecting ownership over the digital content by marking the information with a watermark exclusive to the owner. The embedded watermark can afterwards be used for proving and claiming ownership. Reversible watermarking tries to defeat the issue of information quality down gradation by permitting regeneration of unique information alongside the embedded watermark data. Proposed framework shows such reversible watermarking method that keeps the information valuable for learning revelation. Figure: 1. General block diagram of watermarking for database [Figure-1] shows general structure of watermarking process. In this process original data gets processed through watermarking algorithm. While processing original data watermark gets embedded into it, at the end system will return recovered data. [2] LITERATURE SURVEY Watermarking database relations is a area which demand research focus owing to the commercial implications of database theft. Digital watermarking for relational databases emerged as a candidate solution to provide problems regarding security such as copyright protection, tamper detection etc. Many watermarking techniques have been proposed in the previous work to address these purposes. Digital watermarking of multimedia content is more commonly acknowledged, particularly image watermarking. Some reversible digital watermarking techniques related to proposed system is mentioned below. Reversible watermarking for image: Adnan M Alattar [3] proposed multimedia reversible watermarking. They proposed algorithm that based on difference expansion of colored images. Since the watermark is completely reversible, the original image can he recovered exactly. Ingemar J. Cox[4] presented a secure algorithm for 2
3 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN watermarking images, and a methodology for multimedia watermarking that may be derived for audio, video, and multimedia data. Irreversible relational database watermarking: Agrawal and kierman[5] proposed first well understood conventional irreversible database watermarking plan for watermarking relational databases for numeric qualities. The system survives a few assaults and which safeguards mean variance of all numerical characteristic. This plan can t be straightforwardly applied to watermarking categorical.to settle this issue Sion, R [6] presented a one of a kind technique for rights preservation for categorical information through watermarking to fix this issue. This plan includes watermarking of categorical property by changing some of its quality to other worth to the property if such change is bearable in certain applications. Reversible relational database watermarking: Zhang et al. [7] proposed first reversible watermarking of relational database to accomplish less also correct verify of relational databases by means of expansion on data error histogram. This strategy has distributive mistake inside of two uniformly circulated variables as some beginning nonzero digits of errors to manufactured histograms. Gaurav Gupta and Josef Pieprzyk [8] proposed an change over the reversible and blind watermarking plan introduced, identifying and wiping out a basic issue with the past methods related with reversible watermarking. The proposed plan gives high security against secondary watermarking Attacks. Jung-Nan Chang and Hsien-Chu Wu [9] proposed strategy that recognizes database altered by installed significance describe of the innovation of database. The affiliation guideline of frequent pattern tree information mining is utilized to recognize the relationship existing with the protected attribute and others too in the database. Khurram Jawad, Asifullah Khan [10] presented new robust procedure for reversible watermarking approach for the security of relational databases. This methodology depends on the thought of difference expansion as on using genetic algorithm (GA)to enhance watermark limit and to reduce distort error. M. E.Farfoura and S.- J. Horng, [11] introduced a novel blind reversible watermarking strategy that guarantees us the responsibility for in the range of Relational Database of watermarking. In the proposed technique D. M.Thodi and J. J. Rodriguez [12] proposed an optional solution to distortion by using histogram shifting technique. The technique enhances distortion performance at low embedding limit. To enhance this new strategy was exhibited called prediction error expansion. Mahmoud E. Farfoura,Shi-Jinn Horng an,et.al [13] designed and used a confirmation protocol in view of an productive time-stamp convention, and they proposed a visually impaired turning around watermarking technique that guarantee assure ownership in the territory of relative database watermarking. Erik Sonnleitner [14] proposed a watermarking algorithm in based on parameter that tuple dividing watermarking and white spaces while utilizing it as a part of open watermark. The watermarking plan is non intrusive resilient also oblivious to reversibly and its suitable for databases of any sizes with sensible exhibitions on inserting and extraction. Javier Franco-Contreras, Gouenou Coatrieux,et.al[15] proposed the robust reversible watermarking modified by initially proposed under Vleeschouwer et.al for the pictures assurance of given relational databases. The propose plan states relative precise position of the circular histogram centric mass of one numerical quality for message showing and installing. Various encryption methods for nonnumeric data are available in [19]. Rucha D. Kulkarni, Dipak V. Patil 3
4 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING [3] PROPOSED SYSTEM The proposed framework is based on work by Saman Iftikhar et al.[1] which is for numeric data, along with this we have proposed to add ownership right protection for non-numeric data. In this system the most part focuses on reversible watermarking of relational database which authorizes ownership rights and gives intends to handling information altering without compromising information quality and recovers unique information after watermark decoding. In this framework watermark creation is done utilizing Genetic algorithm as an evolutionary technique. The proposed framework mainly contains following phases: 1) Preprocessing: In the preprocessing phase, two important tasks are accomplished: a) Selection of a suitable component for watermark embedding: For developing a huge data model of different elements of the dataset, every one of the components are positioned by their impact in data extraction, in light of their mutual dependence on different elements. For this reason, mutual information (MI), is exploited that is a imperative statistical measure for calculation of shared dependence of two arbitrary variables. Mutual information is calculated using following equation, Let, P A(a)- Probability of tuple a in feature A, P B(b)- Probability of tuple b in feature B, P AB(a,b)- Joint probability and MI(A,B)-measures degree of correlation of feature by measuring probability distributions Figure: 2. Equation to calculate Mutual Information b) Calculation of an optimal watermark with the help of an optimization technique: For the making of ideal watermark data that should be inserted in the first information we utilize a evolutionary method Genetic Algorithm. In the search of optimal solution, the GA follows an iterative mechanism to expand a population of chromosomes. The GA preserves essential data utilizing the application of essential genetic operations to these chromosomes that include selection, crossover, mutation and replacement. The GA inspected the nature of every applicant chromosome by exploiting a fitness function. The evolutionary system of the GA over and again proceeds through various eras, until some finish criteria is met. The fitness function can be mathematically expressed as following in which A indicates one of the feature in set of features F max β A...(2) where, AϵF, A 2) Watermark encoding: In this stage watermark has been embedded in selected feature. The watermark is embedded into each tuple for the selected feature of the dataset. The information owner can choose any number of elements for watermark implanting based upon a secret limit and Mutual 4
5 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN data of the elements. The watermark encoding algorithm begins the embedding process with the most significant bit MSB of the watermark. To accomplish this algorithm works with one tuple at once. Watermark gets encoded in selected feature, after creation of watermark is completed. While encoding watermark into tuples of selected feature first it is checked that which chromosome is optimal and optimum value of β. After finding optimum value of _ parameter _r that denotes percentage change in watermark encoding is calculated using equation given as follows where WEn denotes watermark encoder. η r = D r * WEn...(3) Figure: 3. System Architecture Algorithm Input: original database, watermark bits, optimized value to watermarked feature Output: Watermarked database, matrix containing percent change in data values 1. for all watermark bits of length l do 2. for all tuples of data 3. if watermark bit is 0 then 4. Compute changes using equation (3) Rucha D. Kulkarni, Dipak V. Patil 5
6 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING 5. Watermark data using D Wr = D r + β 6. if watermark bit is 1 then 7. Compute changes using equation(3) 8. Watermark data using D Wr = D r - β 9. End if 10. End for 11. Else if non-numeric data, do encryption using AES algorithm 12. End if 3) Watermark decoding: In the watermark decoding process, the initial step is to recognize the elements which have been checked. The procedure of optimization through GA is not required at this stage. We utilize a watermark decoder which computes the measure of progress in the estimation of an element that does not change its information quality. The watermark decoder translates the watermark by working with one piece at once. In watermark decoding phase very first task is to locate features which have been marked. WDe watermark decoder is used to calculate amount of change in value of feature that won t affect to data quality. Percentage change which is denoted by _dr is calculated as follows: η Δr = D w * WDe...(4) η Δr = η dr η r...(5) where, η Δr = The difference between the changes detected in the value of a feature during the encoding and decoding Algorithm Input: Watermarked database, matrix containing percent change in data values, length of watermark Output: Decoded watermark 1. for all tuples of data do 2. for all watermark bits of length l 3. Detected amount of change is computed using equation (4) 4. Difference in detected changes using equation (5) 5. if difference in detected changes 0 then 6. Detected watermark bit is 1 7. Else if if difference in detected changes 0 and 1 then 8. Detected watermark bit is 0 9. End if 10. End for 4) Data recovery: After identifying the watermark string, a few post processing steps are performed for error correction and data recovery. The optimized value β of calculated through the GA is used for reconstruction of original data using following equations: D r = D Wr + β...(6) D r = D Wr - β...(7) Algorithm 6
7 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN Input: Watermarked database, watermark bits Output: recovered database 1. for all tuples of data do 2. for all watermark bits of length l 3. if detected watermark bit is 1 then 4. Data is recovered using equation (6) 5. Else use equation (7) 6. End if 7. End for 8. Else if non-numeric data, apply decryption [4]. EXPERIMENTAL SETUP AND RESULTS Heart disease dataset from UCI repository [16] is used for this experiment. Table I shows description of classes and instances, where each class refers to heart disease. It has 920 number of instances and there are 76 attributes of which 15 are used for experiment.14 are numeric and 1 non-numeric. Attribute names are: Name, Age, sex, cp, trestps, chol, fbs, restecg, thalach, exang, oldpeak, slope, ca, thal, num. Class Instances Cleveland 303 Hungarian 294 Switzerland 123 Long 200 Beach VA TABLE I: Heart disease dataset Mutual Information (MI)[17],[18] is a popular information concept that calculates amount of details one feature has about other feature in dataset statistically. MI identifies features that don t have any significant effect on decision making process. Thus MI is an important statistical measure for computation of mutual dependence of two variables. The Table II show the results we obtained after calculating mutual information between age and each other attribute in the dataset. So, the MI of age is blank. Likewise mutual information is calculated between every feature with all other features. For determining data quality MI is used as measure. Attributes MI O MI W MI Age - - Sex Rucha D. Kulkarni, Dipak V. Patil 7
8 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING Cp Trestbps Chol Fbs Restecg Thalach Exang Oldpeak Slope Ca Thal Num TABLE II: Mutual Information of Selected Feature Before and After Watermarking The quality of proposed system is also evaluated using other statistical measures like mean and variance. Table III shows mean and variance before and after watermarking. Mean O Variance O Mean W Variance W TABLE III: Mean and Variance before and after watermarking. [6] CONCLUSION The proposed system is a system to protect ownership rights of relational database. The system creates watermark using genetic algorithm as an optimization technique, is able to protect ownership rights of relational data along with robustness without compromising data quality. The system has exploited GA as a optimization technique. GA applied on current problem domain provides global optimal solution. Irreversible watermarking techniques make changes in the data to such an extent that data quality gets compromised. Proposed reversible watermarking technique is used to cater to such scenarios because this is able to recover original data from watermarked data and ensure data quality to some extent. Technologies and techniques mentioned in proposed system have been adapted and integrated in order to build the overall system for ownership rights protection of relational database. In 8
9 International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 ISSN addition with this watermarking of numerical data we are also providing privacy preservation to nonnumeric data. REFERENCES [1] Saman Iftikhar, M. Kamran, and Zahid Anwar, RRW-A Robust and Reversible watermarking Technique for Relational Data IEEE transactions on knowledge and data engineering, vol. 27, no. 4, april 20 [2] Raju Halder,Shantanu Palet.al, Watermarking Techniques for Relational Databases: Survey, Classication and Comparison Journal of Universal Computer Science, vol. 16, no. 21 (2010) [3] A. M. Alattar, Reversible watermark using difference expansion of triplets, in Proc. IEEE Int. Conf. Image Process., 2003, pp. I-501,vol. 1. [4] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process.,vol. 6, no. 12, pp , Dec [5] R. Agrawal and J. Kiernan, Watermarking relational databases, in Proc. 28th Int. Conf. Very Large Data Bases, 2002, pp [6] Sion, R.Proving ownership over categorical data. In Proceedings of the 20th IEEE international conference on data Engineering ICDE, April 2004 (pp ). [7] Y. Zhang, B. Yang, and X.-M. Niu, Reversible watermarking for relational database authentication, J. Comput., vol. 17,no. 2, pp , [8] G. Gupta and J. Pieprzyk, Database relation watermarking resilient against secondary watermarking attacks, in Information Systems and Security. New York, NY,USA: Springer, 2009, pp [9] J.-N. Chang and H.-C. Wu, Reversible fragile database watermarking technology using difference expansion based on SVR prediction, in Proc. IEEE Int. Symp. Computer., Consum. Control, 2012, pp [10] K. Jawad and A. Khan, Genetic algorithm and dierence expansion based reversible watermarking for relational databases J. Syst. Softw., vol. 86, no. 11, pp , [11] M. E. Farfoura and S.-J. Horng, A novel blind reversible method for watermarking relational databases, in Proc. IEEE Int. Symp. Parallel Distrib. Process. Appl., 2010,pp [12] D. M. Thodi and J. J. Rodriguez, Prediction-error based reversible watermarking, in Proc. IEEE Int. Conf. Image Process. 2004, vol. 3, pp [13] M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen, and M. K. Khan, A blind reversible method for watermarking relational databases based on a time-stamping Syst.Appl., vol. 39, no. 3, pp , [14] E. Sonnleitner, robust watermarking approach for large databases, in Proc. IEEE First AESS Eur. Conf. Satellite Telecommun.,2012, pp [15] Javier Franco-Contreras, Gouenou Coatrieux, Robust Lossless Watermarking of Based on Circular Histogram Modulation,IEEE Transactions on information forensics and security, Vol. 9, No. 3, March 2014 [16] K. Bache and M. Lichman. (2013). UCI machine learning repository [Online]. Available: [17] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York, NY, USA: Wiley- Interscience, Rucha D. Kulkarni, Dipak V. Patil 9
10 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING [18] Huan Liu,Hiroshi Motoda,Computational Methods of Feature Selection. william stalling,cryptography and network security 4 th edition. Author[s] brief Introduction Rucha D. Kulkarni Is pursuing the Masters in Computer from G. E. S. R. H. Sapat College of Engg., Nashik under Savitribai Phule Pune University.She has pursued her Bachelor s Degree in IT from K.K.W.I.E.E.R., Nashik under Savitribai Phule Pune University. Dipak V. Patil received B.E. degree in computer engineering in 1998 from University of North Maharashtra India and M.Tech. degree in computer Engineering in 2004 from Dr.B. A. Technological University, Lonere, India. He has done Ph.D. degree from S. R. T. M. University, Nanded. Currently he is an Associate Professor in Computer Engineering Department at G.E. S. R. H. Sapat College of Engg., Nashik,India.His research interests are in data mining and soft computing. 10
Watermarking Scheme for Numerical and Non-Numerical Relational Database
Watermarking Scheme for Numerical and Non-Numerical Relational Database Priyanka R. Gadiya 1, Prof. P.A.Kale 2 priyankagadiya89@gmail.com 1, prashantkale15@gmail.com 2 M. E. Student, Dept. of Computer
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Watermarking Technology for Relational Database Priyanka R. Gadiya 1,Prashant
More informationGenetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data
Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data Gayatri R. Ghogare 1, Prof. Aparna Junnarkar 2 1Student, ME, Department of Computer Engineering, P.E.S
More informationISSN Vol.04,Issue.17, November-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.17, November-2016, Pages:3280-3287 Secure Conservatory Embedded Techniques for Reversible Watermarking of Relational Data AMTUL SUFIA 1, DR. MD. WAHEEDUDDIN
More informationA NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationMultilayer Data Embedding Using Reduced Difference Expansion
Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai
More informationNOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION
NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College
More informationVarious Approaches for Watermarking of Relational Databases Mohit Bhesaniya, J.N.Rathod, Kunal Thanki
Various Approaches for Watermarking of Relational s Mohit Bhesaniya, J.N.Rathod, Kunal Thanki Abstract as a tool for storing and managing data, relational database is widely used in many information systems.
More informationHeart Disease Detection using EKSTRAP Clustering with Statistical and Distance based Classifiers
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. IV (May-Jun. 2016), PP 87-91 www.iosrjournals.org Heart Disease Detection using EKSTRAP Clustering
More informationA Formal Model to Preserve Knowledge in Outsourced Datasets
A Formal Model to Preserve Knowledge in Outsourced Datasets 1 Veera Ragavan K, 2 Karthick S 1 ME Student, 2 Asst.Prof 1,2 Dept of Software Engineering, SRM University, Chennai, India 1 ragu.skp@gmail.com,
More informationCOMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING
International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationA Combined Encryption Compression Scheme Using Chaotic Maps
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression
More informationWatermarking Of Relational Databases Mohit H Bhesaniya 1, Kunal Thanki 2
Watermarking Of Relational s Mohit H Bhesaniya 1, Kunal Thanki 2 1 Department of computer engineering, AITS, Rajkot,Gujarat, India. 2 Department of computer engineering, Government polytechnique, porbandar.gujarat,
More informationGA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption
GA Based Reversible Hiding in Encrypted s by Reserving Room before Encryption Patil K.U. 1 &Nandwalkar B.R. 2 1,2 (Comp. Engg. Dept., GNS COENashik, SPP Univ., Pune(MS), India) Abstract Information Security
More informationSecure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationAccumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,
More informationSpatial, Transform and Fractional Domain Digital Image Watermarking Techniques
Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationA Survey on improving performance of Information Retrieval System using Adaptive Genetic Algorithm
A Survey on improving performance of Information Retrieval System using Adaptive Genetic Algorithm Prajakta Mitkal 1, Prof. Ms. D.V. Gore 2 1 Modern College of Engineering Shivajinagar, Pune 2 Modern College
More informationISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department
More informationWatermarking for Security in Database
Watermarking for Security in Database Prof. Manoj Dhande Department of Computer Engineering of Shah and Anchor Kutchhi Engineering College, Chembur, University of manoj.dhande@gmail.com Aishwarya Kotyankar
More informationAN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE
AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3
More informationRegion Based Even Odd Watermarking Method With Fuzzy Wavelet
Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More informationCOMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES
COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES USING DIFFERENT DATASETS V. Vaithiyanathan 1, K. Rajeswari 2, Kapil Tajane 3, Rahul Pitale 3 1 Associate Dean Research, CTS Chair Professor, SASTRA University,
More informationPRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA
PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department
More informationFragile Watermarking of 3D Models Using Genetic Algorithms
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOG, VOL. 8, NO., SEPTEMBER Fragile Watermarking of D Models Using Genetic Algorithms Mukesh Motwani, Rakhi Motwani, and Frederick Harris, Jr. Abstract This paper
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationA Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks
International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,
More informationSelf Destruction Of Data On Cloud Computing
Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Self Destruction Of Data On Cloud Computing Pradnya Harpale 1,Mohini Korde 2, Pritam
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationKeywords Data alignment, Data annotation, Web database, Search Result Record
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationCluster based boosting for high dimensional data
Cluster based boosting for high dimensional data Rutuja Shirbhate, Dr. S. D. Babar Abstract -Data Dimensionality is crucial for learning and prediction systems. Term Curse of High Dimensionality means
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 6, June-2018 SECURE DATA HIDING IN AUDIO
More informationFREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING
FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,
More informationANALYSIS OF AES ENCRYPTION WITH ECC
ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer
More informationDigital Watermarking on Micro Image using Reversible Optical Reproduction
Digital Watermarking on Micro Image using Reversible Optical Reproduction Shraddha Raut, Antra Bhattacharya & S. P. Khandait G.H.R.I.E.T.W, G.H.R.I.E.T.W, K.D.K.C.E E-mail : rautshraddha@yahoo.in, antarab@rediffmail.com,
More informationA New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationA ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS
A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS ABD. S. ALFAGI 1 *, A. ABD. MANAF 1, B. A. HAMIDA 2, R. F. OLANREWAJUB 2 1 Advanced
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.2 Secret Key Cryptography CSC 474/574 Dr. Peng Ning 1 Agenda Generic block cipher Feistel cipher DES Modes of block ciphers Multiple encryptions Message
More informationRobust Lossless Data Hiding. Outline
Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationComparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection
International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 Volume 1 Issue 4 ǁ May 2016 ǁ PP.01-07 Comparative Analysis of 2-Level and 4-Level for Watermarking and Tampering
More informationSchema Matching with Inter-Attribute Dependencies Using VF2 Approach
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 3, June 2014, PP 14-20 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Schema Matching with Inter-Attribute Dependencies
More informationSPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute
More informationA Flexible Scheme of Self Recovery for Digital Image Protection
www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China
More informationOptimized Watermarking Using Swarm-Based Bacterial Foraging
Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationS. Indirakumari, A. Thilagavathy
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme
More informationPartition Based Perturbation for Privacy Preserving Distributed Data Mining
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 2 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0015 Partition Based Perturbation
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationSecure and Reliable Watermarking in Relational Databases
Secure and Reliable Watermarking in Relational Databases G.Shyamala 1, I.Jasmine Selvakumari Jeya 2, M.Revathi 3 1 (PG Student, Dept. of CSE, Hindusthan College of Engineering and Tech, Coimbatore, Tamil
More informationResearch Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)
International Journals of Advanced Research in Computer Science and Software Engineering ISS: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Image Encryption Based on 2D Baker Map and 1D Logistic
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationDeduplication of Hospital Data using Genetic Programming
Deduplication of Hospital Data using Genetic Programming P. Gujar Department of computer engineering Thakur college of engineering and Technology, Kandiwali, Maharashtra, India Priyanka Desai Department
More informationImproved Frequent Pattern Mining Algorithm with Indexing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,
More informationResearch of Applications in Relational Database on Digital. Watermarking Technology
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 9ǁ September 2013 ǁ PP.84-89 Research of Applications in Relational Database on Digital
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationAdvanced Digital Image Forgery Detection by Using SIFT
RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering
More informationInternational Journal of Modern Trends in Engineering and Research
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Analysis of Content Based Video Copy Detection using different Wavelet Transforms
More informationSPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR Kunjali Pawar 1 and Madhuri Patil 2 1 M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune
More informationISSN: Page 320
A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar
More informationAn Overview of various methodologies used in Data set Preparation for Data mining Analysis
An Overview of various methodologies used in Data set Preparation for Data mining Analysis Arun P Kuttappan 1, P Saranya 2 1 M. E Student, Dept. of Computer Science and Engineering, Gnanamani College of
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationRobust Watermark Algorithm using Genetic Algorithm
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationDATA hiding [1] and watermarking in digital images
14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,
More informationA Brief Comparison of Security Patterns for Peer to Peer Systems
A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological
More informationDIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING
DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING Ajeet Pratap Singh 1, Sachin Kumar 2 1,2 Department of ECE, ASET, Amity University, Lucknow, U.P., (India) ABSTRACT The
More informationSign-up Sheet posted outside of my office HFH 1121
Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationEFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationImprovement of Web Search Results using Genetic Algorithm on Word Sense Disambiguation
Volume 3, No.5, May 24 International Journal of Advances in Computer Science and Technology Pooja Bassin et al., International Journal of Advances in Computer Science and Technology, 3(5), May 24, 33-336
More informationRobust and Blind Watermarking of Relational Database Systems
Journal of Computer Science 4 (12): 1024-1029, 2008 ISSN 1549-3636 2008 Science Publications Robust and Blind Watermarking of Relational Database Systems 1 Ali Al-Haj and 2 Ashraf Odeh 1 Princess Sumaya
More informationWEINER FILTER AND SUB-BLOCK DECOMPOSITION BASED IMAGE RESTORATION FOR MEDICAL APPLICATIONS
WEINER FILTER AND SUB-BLOCK DECOMPOSITION BASED IMAGE RESTORATION FOR MEDICAL APPLICATIONS ARIFA SULTANA 1 & KANDARPA KUMAR SARMA 2 1,2 Department of Electronics and Communication Engineering, Gauhati
More informationRECORD DEDUPLICATION USING GENETIC PROGRAMMING APPROACH
Int. J. Engg. Res. & Sci. & Tech. 2013 V Karthika et al., 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved RECORD DEDUPLICATION USING GENETIC PROGRAMMING
More informationR. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India
Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Service Ranking
More informationCombined Hashing/Watermarking Method for Image Authentication
Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image
More informationSDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data
SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationA Comprehensive Survey of Watermarking Relational Databases Research
1 A Comprehensive Survey of Watermarking Relational Databases Research M. Kamran and Muddassar Farooq Abstract Watermarking and fingerprinting of relational databases are quite proficient for ownership
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More information