Watermarking Relational Database
Transcript of Watermarking Relational Database
-
8/2/2019 Watermarking Relational Database
1/22
WELCOME
1
-
8/2/2019 Watermarking Relational Database
2/22
Watermarking Relational Database Using
Optimization-Based Techniques
2
-
8/2/2019 Watermarking Relational Database
3/22
ABSTRACT
Proving ownerships rights on outsourced relational database is
a crucial issue in today's internet based applicationenvironments and in many content distribution applications. Inthis paper, we present a mechanism for proof of ownership
based on the secure embedding of a robust imperceptiblewatermark in relational data. We formulate the watermarking of
relational databases as a constrained optimization problem anddiscus efficient techniques to solve the optimization problemand to handle the constraints. Our watermarking technique isresilient to watermark synchronization errors because it uses a
partioning approach that does not require marker tuple.
In this paper we are discussing about the steps that wehave completed by far in our project
3
-
8/2/2019 Watermarking Relational Database
4/22
CONTENTS
y Watermarkingy Existing systemy Proposed systemy Modules associated with the projecty Server moduley Client moduley Dataflow diagramy Screen shotsy System Requirementsy Conclusion
4
-
8/2/2019 Watermarking Relational Database
5/22
INTRODUCTION
The rapid growth of the Internet and relatedtechnologies has offered an unprecedented ability toaccess and redistribute digital contents. In such acontext, enforcing data ownership is an important
requirement, which requires articulated solutions,encompassing technical, organizational, and legalaspects
A watermark describes information that can beused to prove the ownership of data such as the owner,origin, or recipient of the content.
5
-
8/2/2019 Watermarking Relational Database
6/22
WATERMARKING
y Robust Watermark: for proof of ownership, copyrightsprotection.
y Fragile Watermark: for tamper proofing, data integrity
Watermarking is technique that allow the owner of thedata to embed imperceptible watermark into the data
.
6
-
8/2/2019 Watermarking Relational Database
7/22
Existing System
Watermarking in Least Significant Bits(LSB).
This technique embeds the watermark bits in the least
significant bits of selected attributes of a selected
subset of tuples. It uses secret key in watermarking.
y The data partitioning technique used is based on the
use of special marker tuples.
7
-
8/2/2019 Watermarking Relational Database
8/22
PROPOSED SYSTEM
Watermarking embeds ownership information in
digital content.
Watermark describes information that can be used to
prove the ownership of relational database. Here the embedding is hidden that the presence of
watermarking is invisible to the user.
y Watermark decoding is based on a threshold-based
technique characterized by an optimal threshold that
minimizes the probability of decoding errors.
8
-
8/2/2019 Watermarking Relational Database
9/22
THE MODULES ASSOCIATED WITH
THIS PROJECT ARE
ySERVER (SOURCE) MODULE
yCLIENT (DESTINATION)MODULE
9
-
8/2/2019 Watermarking Relational Database
10/22
SERVER (SOURCE) MODULE
THIS MODULE INCLUDES CLASSES SUCH AS
DBCON This class establishes a connection to thedatabase using SQL SERVER.
ACTION CONTROLLER This class initiates the processby accessing the data table.
PARTITION This class eventually divides the tablerecords and assign partition number to it.
10
-
8/2/2019 Watermarking Relational Database
11/22
y SINGLE BIT ENCODING This class encodes thepartitioned file by adding one bit to each record.
y ENCRYPTIONThis class gets all the encoded
records and encrypts them as awhole file along the secret key.
yWATERMARK EMBEDDINGThis class embedswatermark and sends it to the destination via networkconnections
11
-
8/2/2019 Watermarking Relational Database
12/22
CLIENT (DESTINATION) MODULETHE CLASSES OF THIS MODULE DOES THE REVERSE ENGINEERING
OF THE SOURCE MODULE
MAIN FORM - This class receives the file fromsource
DECRYPTION -This class decrypts the file using thesecret key
REVER
SE PARTITIONT
his class merge the partitionedfile or records into a single file .
12
-
8/2/2019 Watermarking Relational Database
13/22
DATAFLOW DIAGRAM
USER
AUTHENT-ICATION
WEATHER
DATABASE
DATA
LISTINGFOR S/W
LISTED TABLESAND FUNCTION
13
-
8/2/2019 Watermarking Relational Database
14/22
LISTED
DATAPARTITION
Single bit
encoding
SERIALZATION
14
-
8/2/2019 Watermarking Relational Database
15/22
DES
IMPLEMENTATION
GENETIC
ALGORITHM
IMLIMENTATI
ON
HASHCODE
GENERATION
Serialized
data
WATERMARK
EMBEDDED
DATA
15
-
8/2/2019 Watermarking Relational Database
16/22
SCREENSHOT - LOGIN
16
-
8/2/2019 Watermarking Relational Database
17/22
SCREENSHOT MAIN WINDOW
17
-
8/2/2019 Watermarking Relational Database
18/22
WATERMARKING DATABASE
18
-
8/2/2019 Watermarking Relational Database
19/22
SCREENSHOT - ENCRYPTION
19
-
8/2/2019 Watermarking Relational Database
20/22
SYSTEM REQUIREMENTS
Software Requirements:
y Language : C#(visual studio net2005)
y Operating System : Windows NT/XP
y
Back End : sqlserverHardware Requirements:
y Processor : Pentium IV
y RAM : 512 MB
y Hard Disk : 40GB
20
-
8/2/2019 Watermarking Relational Database
21/22
CONCLUSION
In this project, we propose a resilientwatermarking technique for relational data that embedswatermark bits. The watermarking problem was
formulated as a constrained optimization problem thatmaximizes or minimizes a hiding function based on thebit to be embedded. GA and PS techniques wereemployed to solve the proposed optimization problem
and to handle the constraints.
21
-
8/2/2019 Watermarking Relational Database
22/22
THANK YOU
22