Submit Search
Upload
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerprint Masking
•
0 likes
•
6 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i3/IRJET-V7I3679.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET Journal
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ijistjournal
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET Journal
Recommended
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET Journal
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ijistjournal
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET Journal
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
IJCSIS Research Publications
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
ijtsrd
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
IJERA Editor
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
IJSRED-V2I1P2
IJSRED-V2I1P2
IJSRED
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
IRJET Journal
Ej24856861
Ej24856861
IJERA Editor
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
IOSRjournaljce
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
AM Publications
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET Journal
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET Journal
More Related Content
What's hot
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET Journal
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
IJCSIS Research Publications
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
ijtsrd
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
IJERA Editor
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
IJSRED-V2I1P2
IJSRED-V2I1P2
IJSRED
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
IRJET Journal
Ej24856861
Ej24856861
IJERA Editor
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
IOSRjournaljce
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
AM Publications
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
What's hot
(20)
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IJSRED-V2I1P2
IJSRED-V2I1P2
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Ej24856861
Ej24856861
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
Similar to IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerprint Masking
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET Journal
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET Journal
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET Journal
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET Journal
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET Journal
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
IRJET Journal
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET Journal
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET Journal
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET Journal
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
Similar to IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerprint Masking
(20)
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET - Encoded Polymorphic Aspect of Clustering
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Recently uploaded
(20)
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
power system scada applications and uses
power system scada applications and uses
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerprint Masking
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3378 A Genetic Approach for Reversible Database Watermarking using Fingerprint masking J.Menaka Gandhi, T.J Shredha, S.Vishali, V.K. Vishnupriya 1Assistant Professor, Dept. of Information Technology, Meenakshi College of Engineering, Tamil Nadu, India 2,3,4Student, Dept. of Information Technology, Meenakshi College of Engineering, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Data mining involves the practice of examining large pre-existing raw databases to generate usable new information. Authenticity, privacy, and confidentiality of larger datasets are outsourced to the cloud and internet in the encrypted format. Although it has wide attention because of its large storage features, there are severe security and privacy challenges it brings. Watermarking is used to enforce proprietary rights on shared relational databases. There are various reversible watermarking methods used to protect the rights of owners and to recover original data. Generally, the methodsintroduced,compromisetheoriginaldatato a large extent that cannot achieve a good balance between robustness, dataqualitydegradation,malicious attacks, and data recovery. In this paper, we proposed a vigorous and reversible database watermarking technique, Genetic Fingerprinting Algorithm using Histogram shifting (GFAHS). The original database is encoded along with the fingerprint of the owner and watermarked together. The outcomes are in terms of robustness and prevention from illegal ownership violations. Key Words: Genetic Fingerprinting algorithm, Histogram shifting, Robustness, Watermarking, Ownership violation. 1. INTRODUCTION Data mining examines large databases to generate usable new information. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users. Data Mining techniques are used to predict the hidden patterns and behaviors. This allows the businesses to analyze data from different dimensions, then categorizing and summarizing it into meaningful information. Data is an important asset to any organization and thereby, it is essential to safeguard it from online frauds [1]. Data security is not just important for organizations, but also for the remote devices that connect to an organization gets attacked by attackers to tap sensitive information. Data breaches andcyber-attacks are anticipated toincrease as the computer networks expand.[1] While there are technical methods for protecting the content of the websites, there are tech-savvy thieves who can probably still find their way around these protections. Here in our proposal, we have used the Watermarking technique where duplicate data is embedded with the original data to protecttheoriginalcontentandmakeit harder to copy the item. Reversible watermarking techniques are also calledas invertible that are applied where the authenticityofan image has to be granted and the original content is to be decoded. According to Risk Based Securityresearch published in the year 2019, the first six months had seen more than 3,800 publicly disclosed breaches that exposedanincredible4.1billioncompromisedrecords. The most remarkable fact is that 3.2 billion of those records were exposed by just eight breaches.Asforthe exposed data itself, the report has anemailthatexisted in 70% of breaches and passwords of 65% at the topof the pile. 2. PRELIMINARIES AND PREVIOUS WORK 2.1 Firefly optimization algorithm This paper illustrates the reversible database watermarking that uses a firefly algorithm which is calledasanoptimizationalgorithm.Thisapproachuses DEW (Difference Expansion watermarking) algorithm with FFA (Firefly Algorithm) called FFADEW [2]. This technique is used to embed watermark with relational databases and also reverse the watermarked database to original data after watermark extraction and verification.Thedrawbacksofthissystemincludesthat it does not use the notion of persistent watermarking which improves the integrityanddoesnotdiscusshow to improve the existing techniques in terms of persistency. 2.2 A Novel watermarking A reversible watermarking technique recovers the primary data from watermarked data and secure data
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3379 quality. This technique used to recover large data even after the malicious attacks and security threats[3]. RRW analysis is done where the watermarking is spotted with an increased number of decoding accuracies in various modules. It provides ownership protection over a relational database. The drawbacks of this system include, this violatesqueryprocessingin watermarking and also the distortion rate is relatively high. 2.3 Prediction errors by efficient histogram modification A Reversible imagewatermarkingalgorithmadvocates the efficiency of modifying a pair of histogram bins. Multiple sets ofhistogramsareselectedinsequencefor data embedding and pre-process of pixel values is carried out to avoid the overflow and underflow [4]. Blind extraction and recovery are processed by merging a precomputed location and other data into a watermarked image. This algorithm produces high payload data Hiding. The drawbacks of the system include, it has a wide-open to security threats and malicious attacks. The system fails in pattern recognition and authentication. 2.4 Persistent Watermarking This paper explains Persistent watermarking of the relational databases that combine both the Public and Private watermark technique which allows the owner to prove his ownership rights and allows the end-user to demonstrate the correctness and originality of the Information without the loss of data. The public watermarking is based on a part of database state which is invariant in the processing of queries and the private watermarking technique is based on the original database state called abstract database which remains invariant in the processing of the associated queries [3]. The system refuses the data coloring method of cloud watermarking to acknowledge and ensure the mutual reputation. 3. PROPOSED SYSTEM The proposed system presents the method to secure the information using the GFAHS (Genetic Fingerprinting Algorithm using Histogram shifting). We consider a typical multimodal system,madeupofa Biometric authentication that operates by providing physical access and logical access to the internal information. This system also includes watermarking methods. In the watermarking concept, the duplicate data is overwritten above the originalcontext;herethe entire information in the database is encrypted and watermarked where no one could view the original context. It also includes double encryption where the fingerprint authentication is also encrypted within the database. Group sharing in the cloud is a hot topic in recent years. Our proposed work focused onproviding a secure and robust feature in the group sharing in an organization using watermarking technology [1]. The watermarking is followed by usingageneticalgorithm. This genetic algorithm helps in partitioning the available database randomly into tuples and distributes these tuples unsystematically to the employees present in a particular team. These employees update the database on the completion of their tasks. The update is carried periodically where each employee is aware of only their particular tuples or tasks and updates their task details to their team leader individually.Oncompletionofallthedistributed tasks, the team leader finally combines the task and forwards it to the HR Manager of the organization. Here a robust biometric authentication is used by the manager to view the task details. 3.1 ARCHITECTURE Chart -1: FINGERPRINT AUTHENTICATION In the data group partitioning,thedatagetspartitioned with the help of a secret key. In the UTC Date time the alphanumerical strings are converted into the form of 0’s and 1’s (Chart-1) and then encode the fingerprint authentication with the watermark embedding. The data retrieval process is carried out with the following process which encompasses tuple identification followed by reverse watermarking[1] to retrieve the original content. 3.2 MODULE DESCRIPTION The modules included in our proposed work are:
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3380 Database Partitioning Daily Update Captcha (Private Key) generation Information Sharing and Accessing 3.2.1: Database Partitioning Genetic Algorithm is used to partition the database randomly and distribute it to the team members [8]. This is the initial part of the group sharing where available information in the database is shared evenly and randomly to the team mates[Fig -3]. Step 1: Generate tuples i.e.) tuples () from the group of data and select a set of info () from the generated tuple. Step 2: To Calculate the fitness function, select the random number from generated tuple which is compared with the total length of the generated info(). if the generated value is less than the info Len() then the value gets incremented. Step 3: If the fitness score is less than or equal to 0, we have reached the target. Step 4: Else generate the new set of data 3.2.2: Daily Update This system holds a hierarchical structure where the HR Manager, Team Leaders, and their respectiveTeam members are registered onto the organization’s website [Fig -1]. The Manager and Team Leader are given the privileges to accept and deny the team members' requests [Fig -2]. Managers now hold their respective employee’s login credentials [8]. The Team Leader assigns the tasks to their Team Members regularly and on submission of those tasks, a typical document is generated as the daily report of the ongoing project and delivered to the Team Leader [9]. Here the Team Members are not allowed the privilege to rewrite or view the document once submitted to the Team Leader. 3.2.3: Captcha (Private Key) generation Captcha is the recently secured and developing technology that is used to generate random alphanumeric values to differentiate between the automated computer program and human logins.Here different captcha is generated [Fig-4] for each document randomly [9]. And when the Team Leader wants to access those documented files, they have to provide the password and captcha to view. A QR code is generated [Fig -5] at last that allows the HR manager to view the daily updates of the Team Leader and the Employees which can be scanned to gain access. Step 1: To generate a captcha, initially create a random string combination Random() in the String combination=0123456789ABCDEFGHIJKLMNOPQRST UVWXYZabcdefghijklmnopqrstuvwxyz Step 2: The length of the captcha is six which is generated from the list of the string combinations, which follows with the next combination length Step 3: Once the captcha is generated, it displays in the image format “GenerateCaptcha.aspx?” 3.2.4: Information Sharing and Accessing From the information that is shared by the Team Leader and Team Members the HR Manager can now keep track of the details of the documents updated daily[Fig -3]. The Manager can also navigate to the specific document of the Team Members using the Team Member’s Identity[10]. Once the final documented file is updated to the Manager no one can access or view the document. The Manager is provided with dual authentication (fingerprints and password) foraccess[10].Thefingerprintauthenticationiscarried out using the SHA Algorithm which involves pixel to pixel verification of the fingerprint image [Fig -6]. 4. IMPLEMENTATION EMPLOYEE REGISTRATION Fig -1: Employee registration
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3381 Each member of the organizationhastoregisterbefore communicating and sharing information among them. TEAM LEADER LOGIN Each member in the company has to log in before group sharing. Fig -2: Team leader login EMPLOYEE DAILY UPDATES On this page, the employee has to include their daily updates which generate a pdf document that is sent to both the Manager and Team Leader. Fig -3: send information CAPTCHA VERIFICATION To open and view the pdf document obtained from the employee, the Team leader has to provide the Captcha which is used to view the information shared. Fig - 4: Employee Update QR CODE GENERATION A QR-Code is generated to the manager which helps him to view the document. Fig -5: QR Generation FINGERPRINT VERIFICATION The final fingerprint authentication results in viewing the entire document shared by the Team leader. Fig -6: Fingerprint Verification. 5. CONCLUSION Thus, this paper encompasses around securing the information communicated among the project
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3382 members and also provides a robust nature, when subjected to malicious attacks and also preventsillegal copying and malicious attacks. This prevents the organization’sprivateinformationfromdatabreeching which provides high security and protection of the database. REFERENCES [1] Donghui Hu, Dan Zhao and Shui Zheng "A New Robust Approach for reversible Database Watermarking with Distortion Control” Vol31, No.6, June 2019. [2] McNickle, “Top 10 data security breaches in 2012,” Apr. 17, 2013. [Online]. Available: http://www.healthcarefinancenews. com/news/top- 10-data-security-breaches-2012 [3] R. Agrawal and J. Kiernan, Chapter 15— watermarking relational databases, in Proc. 28th Int. Conf. Very Large Databases, San Francisco: Morgan Kaufmann, 2002, pp. 155–166. [4] R. Halder and A. Cortesi, “A persistent public watermarking of relational databases,” in Proc. Int. Conf. Inf. Syst. Secur., 2010, pp. 216–230. [5]D.Gross-Amblard,“Query-preservingwatermarking of relational databases and XML documents,” ACM Trans. Database Syst., vol. [6] E. B. M. Shehab and A. Ghafoor, “Watermarking relational databa using optimization-based techniques,” IEEE Trans. Knowl. [7] R. Halder, S. Pal, and A. Cortesi, “Watermarking technique for relational databases: Survey, classification, and comparison, "J. Universal Comput. 2010 [8] M. Rabin, “Efficient dispersal of information for security,” Journal of the ACM (JACM). [9] J. G. et al. (2006) The expanding digital universe: A forecast of worldwide information [10] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, [11] Y.Zheng, X.Yuan, X. Wang, and X. Gui, "Toward encrypted cloud media center with Secure deduplication," IEEE Trans. Multimedia, vol. 19, no. 2,pp. 251-265,2017. [12] Y. Wu, Z. Wei, and R.H. Deng, "Attribute-based access to scalable media in the cloud- Assisted content sharing networks," IEEE Trans. Multimedia, vol. 15,no.4,pp. 788-788,2013 [13] L. Zhou, V. Varadharajan, and M. Hitchens, "Cryptographic role-based access control for secure clouddatastoragesystems,”InformationForensicsand Security IEEE Transactions on, vol. 10, no. 11, pp. 2381–2395, 2015. [14] F. Chen, T. Xiang, Y. Yang, and S. S. M. Chow, “Secure cloud storage meets with secure network coding,” in IEEE INFOCOM, 2014, pp. 673–681 [15] D. He, S. Zeadally,andL.Wu,“Certificatelesspublic auditing scheme for cloud-assisted wireless body area networks,” IEEE Systems Journal, pp. 1–10, 2015.
Download now