International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 02 Issue: 09 | Dec-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 785
Watermarking of relational databases: Survey
Rucha D. Kulkarni
1
, Dipak V. Patil
2
1
Student, Department of Computer Engineering
Gokhale Education Society's R.H. Sapat College of Engineering, Management Studies and Research, Nasik,
Maharashtra, India
2
Associate professor, Department of Computer Engineering
Gokhale Education Society's R.H. Sapat College of Engineering, Management Studies and Research, Nasik,
Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Watermarking techniques provides
candidate solution to ensure security in terms of
ownership protection and tamper proofing for a
various types of data. Digital watermarking of
multimedia content is more commonly known. There is
rich body of literature for watermarking of multimedia
data. But watermarking of relational databases is
emerging area as compared to multimedia data.
Though it is emerging various techniques are proposed
to ensure security against variety of attacks, ownership
right protection and data tampering. This paper
focuses on different techniques that have been
proposed to provide solutions for security problems
related with relational data. This survey provides
different techniques classified according to their intent
along with type of watermarking.
Key Words: Relational database, watermarking
1. INTRODUCTION
Now a day’s digital data can be accessed and exchanged
through computer via internet has growing extensively
which is very simple task. As digital data available publicly
it can be easily modified by unauthenticated user and can
steal rights of it. So, data security is an essential area that
provides variety of solutions for protection of different
data formats.
Watermarking is one of the popular and
extensively used techniques that ensure security in terms
of ownership protection and tamper proofing for a various
data formats. Fingerprinting, data hashing, serial codes are
some other techniques used for ownership protection [2]-
[4].Using these other techniques one can identify source of
data leakage but can’t protect data from being leaked.
Digital watermarking provides a strong method of
protecting digital data from modification, copyright
protection by embedding a secret code directly into the
data. The embedded secret code, called watermark, can be
used in various applications. Watermarking has the
property that it can provide ownership protection to
digital content inserting watermark unique to the owner.
The embedded watermark can subsequently be used for
proving and claiming ownership. It is very important to
protect the ownership of databases, many times making
copy of databases may get ignored. We only care about is
relational database is authentic and unmodified, and if
modified discovered and recovered.
Initially watermarking is restricted only up to
multimedia content such as images, audio, video [7]-[10]
etc. Particularly image watermarking is used while
transmission of messages from one party to another.
Processing of relational database watermarking differs
that of watermarking techniques that are applied to
multimedia data, cause is difference in properties of data.
As relational data is independent and discrete compared
to multimedia data is continuous.
Thus watermarking particularly for relational databases
was proposed very firstly by [11]. The technique was
irreversible in nature i.e. it can’t regenerate original data
from watermarked data using secret key. Further after few
years reversible watermarking techniques get proposed
by [12] that can regenerate data without comprising
original quality.
Watermarking techniques mainly used to protect
publicly available data from being tampered, protect
ownership [13] of that data, ensure integrity [14] and such
other purposes.
Some of the important approaches of watermarking are
introduced in this paper as follows: Section 2 gives general
processing for watermarking that are explained using
fig.1. Section ͵ includes various Surveys’ on variety of
watermarking techniques and finally in Section 4
conclusion was made.