2,060 research outputs found

    Watermarking for Security in Database

    Get PDF
    Watermarking technology is used to embed copyright information in objects such as images, audio, video and databases. The increasing use of relational database systems in many real-life applications creates the need for database watermarking systems for protection of database. As a result, watermarking relational database system deals with the legal issue of copyright protection of database system. There are different types of databases like, Numerical and Categorical Databases. Working with numerical data is easier as compared to categorical databases which is much harder to work with. This report addresses a unique, robust copyright protection scheme for Relational Database. Watermark (Characteristic code) is a binary string calculated through the characteristic operation on the original database. A watermark is called robust if it resists a designated class of transformations. Robust watermarks may be used in copy protection applications to carry copy and access control information. The algorithm correlates characteristics according to the content of the databases, which can resist invertibility attack efficiently.Invertibility attack on database is being considered in this paper

    Survey on relational database watermarking techniques

    Get PDF
    Digital watermarking has been in multimedia data use over the past years. Recently it has become applicable in relational database system not only to secure copyright ownership but also to ensure data contents integrity. Further, it is used in locating tampered and modified places. However, the watermarking relational database has its own requirements, challenges, attacks and limitations. This paper, surveys recent database watermarking techniques focusing on the importance of watermarking relational database, the difference between watermarking relational database and multimedia objects, the issues in watermarking relational database, type of attacks on watermarked database, classifications, distortion introduced and the embedded information. The comparative study shows that watermarking relational database can be an effective tool for copyright protection, tampered detection, and hacker tracing while maintaining the integrity of data contents. In addition, this study explores the current issues in watermarking relational database as well as the significant differences between watermarking multimedia data and relational database contents. Finally, it provides a classification of database watermarking techniques according to the way of selecting the candidate key attributes and tuples, distortion introduced and decoding methods used

    Online Software Copyright Protection Using Trust Platform Module and Database Watermarking

    Get PDF
    As the digital information can be copied and transmitted easily, new and novel methods for the investment safeguarding are highly important. Many software companies developed several ways to prevent their software from piracy but hackers are still working. Other companies have their own techniques, but they keep them for confidential. This paper utilizes the digital watermarking and the Trust Platform Module (TPM) to enhance software piracy protection and decrease the efforts costs to protect software copyrights. The paper conducts a new approach called Trust Platform Module and Database Watermarking (TPMDWM) which is developed to enhance the software copyright protection. The proposed approach combines the new technologies of Trust Platform Module with database watermarking, hash function, and advanced encryption standard to enhance software copyright protection and decrease the cost and loose of software revenues. As shown by results, TPMDWM can effectively prevent illegal copying, getting the software at installation or updating license. The results also show that TPMDWM approach does not affect the software code and control. In addition, TPMDWM decreases dongle cost and it can also be used for client identification

    Image Watermaking With Biometric Data For Copyright Protection

    Full text link
    In this paper, we deal with the proof of ownership or legitimate usage of a digital content, such as an image, in order to tackle the illegitimate copy. The proposed scheme based on the combination of the watermark-ing and cancelable biometrics does not require a trusted third party, all the exchanges are between the provider and the customer. The use of cancelable biometrics permits to provide a privacy compliant proof of identity. We illustrate the robustness of this method against intentional and unintentional attacks of the watermarked content

    Implementing a Copyright Management System

    Get PDF
    While Copyright Management Information (CMI) is not a new concept, it has not been a universally applied one. This article aims to review the different ways CMI's can be represented as well as the possibility of implementing them via Oracle technologies. Such an approach is justified in the absence of any wide scale, industry accepted, standard for implementation.Copyright Management Information, metadata, document identifiers, watermarking
    corecore