International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 02 Issue: 09 | Dec-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 785 Watermarking of relational databases: Survey Rucha D. Kulkarni 1 , Dipak V. Patil 2 1 Student, Department of Computer Engineering Gokhale Education Society's R.H. Sapat College of Engineering, Management Studies and Research, Nasik, Maharashtra, India 2 Associate professor, Department of Computer Engineering Gokhale Education Society's R.H. Sapat College of Engineering, Management Studies and Research, Nasik, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Watermarking techniques provides candidate solution to ensure security in terms of ownership protection and tamper proofing for a various types of data. Digital watermarking of multimedia content is more commonly known. There is rich body of literature for watermarking of multimedia data. But watermarking of relational databases is emerging area as compared to multimedia data. Though it is emerging various techniques are proposed to ensure security against variety of attacks, ownership right protection and data tampering. This paper focuses on different techniques that have been proposed to provide solutions for security problems related with relational data. This survey provides different techniques classified according to their intent along with type of watermarking. Key Words: Relational database, watermarking 1. INTRODUCTION Now a day’s digital data can be accessed and exchanged through computer via internet has growing extensively which is very simple task. As digital data available publicly it can be easily modified by unauthenticated user and can steal rights of it. So, data security is an essential area that provides variety of solutions for protection of different data formats. Watermarking is one of the popular and extensively used techniques that ensure security in terms of ownership protection and tamper proofing for a various data formats. Fingerprinting, data hashing, serial codes are some other techniques used for ownership protection [2]- [4].Using these other techniques one can identify source of data leakage but can’t protect data from being leaked. Digital watermarking provides a strong method of protecting digital data from modification, copyright protection by embedding a secret code directly into the data. The embedded secret code, called watermark, can be used in various applications. Watermarking has the property that it can provide ownership protection to digital content inserting watermark unique to the owner. The embedded watermark can subsequently be used for proving and claiming ownership. It is very important to protect the ownership of databases, many times making copy of databases may get ignored. We only care about is relational database is authentic and unmodified, and if modified discovered and recovered. Initially watermarking is restricted only up to multimedia content such as images, audio, video [7]-[10] etc. Particularly image watermarking is used while transmission of messages from one party to another. Processing of relational database watermarking differs that of watermarking techniques that are applied to multimedia data, cause is difference in properties of data. As relational data is independent and discrete compared to multimedia data is continuous. Thus watermarking particularly for relational databases was proposed very firstly by [11]. The technique was irreversible in nature i.e. it can’t regenerate original data from watermarked data using secret key. Further after few years reversible watermarking techniques get proposed by [12] that can regenerate data without comprising original quality. Watermarking techniques mainly used to protect publicly available data from being tampered, protect ownership [13] of that data, ensure integrity [14] and such other purposes. Some of the important approaches of watermarking are introduced in this paper as follows: Section 2 gives general processing for watermarking that are explained using fig.1. Section ͵ includes various Surveys’ on variety of watermarking techniques and finally in Section 4 conclusion was made.