To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking technique for information recovery
1. GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
A Robust Multiple Watermarking Technique for
Information Recovery
Abstract:
Protecting the ownership and controlling the copies of digital data have
become very important issues in Internet-based applications. Reversible
watermark technology allows the distortion-free recovery of relational
databases after the embedded watermark data are detected or verified. Digital
databases serve as the vehicles for compiling, disseminating and utilizing all
forms of information that are pivotal for societal development. In the domain of
digital watermarking, past research has focused on robust watermarking for
establishing database ownership and fragile watermarking for tamper
detection.we propose a new technique for multiple watermarking of relational
databases that provides a unified solution to two major security concerns;
ownership identification and information recovery.Another watermark
encapsulates granular information on user specified crucial attributes in a
manner such that the perturbed or lost data can be regenerated conveniently
later.Theoretical analysis shows that the probability of successful regeneration
of tampered/lost data improves dramatically as we increase the number of
2. candidate attributes for embedding the watermark. Tamper detection is the
ability of a device to sense that an active attempt to compromise the device
integrity. The detection of the watermark can be completed successfully even
when 95% of a watermarked relation tuples are deleted.
Existing System:
Most existing watermarking schemes are designed to serve a single purpose
such as robustness.
We prove (experimentally and by analysis) our solution to be extremely
resilient to both alteration and data loss attacks, for example tolerating up to
80% data loss with a watermark alteration of only 25%.
We address the novel problem of securely transmitting provenance for data
streams.
Transmission error in one cipher text block have affect on other block such that
if a bit lost or an altered during transmission the error affect the n character and
cipher re-Asynchronous (Lightweight and Re-Asynchronous Mutual
Authentication Protocol for RFID) itself after n correct cipher text char.
This technique does not provide mechanism for multi bit watermarks. The
watermark can be easily compromised by very trivial attacks.
Disadvantage:
Flow Watermarking Scheme Based on Packet Reordering
Empirical results prove its robustness against timing and packet out-of-order
perturbations, introduced by network transmission and deliberately by attackers.
3. We address the novel problem of securely transmitting provenance for data
streams.
Easy to insert or delete blocks, Block encryption may be more susceptible to
cryptanalysis than either stream mode.
Proposed System:
We experimentally verify that the proposed technique is robust enough to
extract the watermark accurately even after 100% tuples.
Our scheme combines proof of ownership along with data recovery within the
same watermarking framework by embedding multiple watermarks.
We propose a blind reversible watermarking method that ensures ownership
protection in the field of relational database watermarking.
In the proposed watermarking method, we utilize a reversible data-embedding
technique called prediction-error expansion on integers to achieve reversibility.
In the proposed scheme, a reversible data-embedding algorithm, which is
referred to as “histogram shifting of adjacent pixel difference” (APD), is used to
obtain reversibility.
Spread-spectrum based reversible data-embedding algorithm and watermarking
technique is proposed, that avoids data degradation due to traditional
watermarking.
Advantage:-
We propose a spread-spectrum watermarking-based solution that embeds
provenance over the inter-packet delay.
4. Stream cipher that only encryption and decryption data one bit at a time are
really suitable for hard ware implementation. The key stream is generated
independently of the message stream
Synchronous stream cipher protect against cipher text searching because
identical block of characters in the message stream are enciphered under a
different part of the key stream
A stream cipher can be converted into a Pseudorandom Number
Generator by encrypting a long sequence of bytes of value zero.
Hardware Requirements:-
SYSTEM : Pentium IV 2.4 GHz
HARD DISK : 40 GB
RAM : 256 MB
Software Requirements:-
Operating system : Xp-3.
IDE : Microsoft Visual Studio 2010
Database : Sql server 2005
Coding Language : C#.NET.