SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3378
A Genetic Approach for Reversible Database Watermarking using
Fingerprint masking
J.Menaka Gandhi, T.J Shredha, S.Vishali, V.K. Vishnupriya
1Assistant Professor, Dept. of Information Technology, Meenakshi College of Engineering, Tamil Nadu, India
2,3,4Student, Dept. of Information Technology, Meenakshi College of Engineering, Tamil Nadu, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Data mining involves the practice of
examining large pre-existing raw databases to generate
usable new information. Authenticity, privacy, and
confidentiality of larger datasets are outsourced to the
cloud and internet in the encrypted format. Although it
has wide attention because of its large storage features,
there are severe security and privacy challenges it
brings. Watermarking is used to enforce proprietary
rights on shared relational databases. There are various
reversible watermarking methods used to protect the
rights of owners and to recover original data. Generally,
the methodsintroduced,compromisetheoriginaldatato
a large extent that cannot achieve a good balance
between robustness, dataqualitydegradation,malicious
attacks, and data recovery. In this paper, we proposed a
vigorous and reversible database watermarking
technique, Genetic Fingerprinting Algorithm using
Histogram shifting (GFAHS). The original database is
encoded along with the fingerprint of the owner and
watermarked together. The outcomes are in terms of
robustness and prevention from illegal ownership
violations.
Key Words: Genetic Fingerprinting algorithm,
Histogram shifting, Robustness, Watermarking,
Ownership violation.
1. INTRODUCTION
Data mining examines large databases to generate
usable new information. It can be used in a variety of
ways, such as database marketing, credit risk
management, fraud detection, spam Email filtering, or
even to discern the sentiment or opinion of users. Data
Mining techniques are used to predict the hidden
patterns and behaviors. This allows the businesses to
analyze data from different dimensions, then
categorizing and summarizing it into meaningful
information. Data is an important asset to any
organization and thereby, it is essential to safeguard it
from online frauds [1]. Data security is not just
important for organizations, but also for the remote
devices that connect to an organization gets attacked
by attackers to tap sensitive information. Data
breaches andcyber-attacks are anticipated toincrease
as the computer networks expand.[1] While there are
technical methods for protecting the content of the
websites, there are tech-savvy thieves who can
probably still find their way around these protections.
Here in our proposal, we have used the Watermarking
technique where duplicate data is embedded with the
original data to protecttheoriginalcontentandmakeit
harder to copy the item.
Reversible watermarking techniques are also calledas
invertible that are applied where the authenticityofan
image has to be granted and the original content is to
be decoded. According to Risk Based Securityresearch
published in the year 2019, the first six months had
seen more than 3,800 publicly disclosed breaches that
exposedanincredible4.1billioncompromisedrecords.
The most remarkable fact is that 3.2 billion of those
records were exposed by just eight breaches.Asforthe
exposed data itself, the report has anemailthatexisted
in 70% of breaches and passwords of 65% at the topof
the pile.
2. PRELIMINARIES AND PREVIOUS WORK
2.1 Firefly optimization algorithm
This paper illustrates the reversible database
watermarking that uses a firefly algorithm which is
calledasanoptimizationalgorithm.Thisapproachuses
DEW (Difference Expansion watermarking) algorithm
with FFA (Firefly Algorithm) called FFADEW [2]. This
technique is used to embed watermark with relational
databases and also reverse the watermarked database
to original data after watermark extraction and
verification.Thedrawbacksofthissystemincludesthat
it does not use the notion of persistent watermarking
which improves the integrityanddoesnotdiscusshow
to improve the existing techniques in terms of
persistency.
2.2 A Novel watermarking
A reversible watermarking technique recovers the
primary data from watermarked data and secure data
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3379
quality. This technique used to recover large data even
after the malicious attacks and security threats[3].
RRW analysis is done where the watermarking is
spotted with an increased number of decoding
accuracies in various modules. It provides ownership
protection over a relational database. The drawbacks
of this system include, this violatesqueryprocessingin
watermarking and also the distortion rate is relatively
high.
2.3 Prediction errors by efficient histogram
modification
A Reversible imagewatermarkingalgorithmadvocates
the efficiency of modifying a pair of histogram bins.
Multiple sets ofhistogramsareselectedinsequencefor
data embedding and pre-process of pixel values is
carried out to avoid the overflow and underflow [4].
Blind extraction and recovery are processed by
merging a precomputed location and other data into a
watermarked image. This algorithm produces high
payload data Hiding. The drawbacks of the system
include, it has a wide-open to security threats and
malicious attacks. The system fails in pattern
recognition and authentication.
2.4 Persistent Watermarking
This paper explains Persistent watermarking of the
relational databases that combine both the Public and
Private watermark technique which allows the owner
to prove his ownership rights and allows the end-user
to demonstrate the correctness and originality of the
Information without the loss of data. The public
watermarking is based on a part of database state
which is invariant in the processing of queries and the
private watermarking technique is based on the
original database state called abstract database which
remains invariant in the processing of the associated
queries [3]. The system refuses the data coloring
method of cloud watermarking to acknowledge and
ensure the mutual reputation.
3. PROPOSED SYSTEM
The proposed system presents the method to secure
the information using the GFAHS (Genetic
Fingerprinting Algorithm using Histogram shifting).
We consider a typical multimodal system,madeupofa
Biometric authentication that operates by providing
physical access and logical access to the internal
information. This system also includes watermarking
methods. In the watermarking concept, the duplicate
data is overwritten above the originalcontext;herethe
entire information in the database is encrypted and
watermarked where no one could view the original
context. It also includes double encryption where the
fingerprint authentication is also encrypted within the
database. Group sharing in the cloud is a hot topic in
recent years. Our proposed work focused onproviding
a secure and robust feature in the group sharing in an
organization using watermarking technology [1]. The
watermarking is followed by usingageneticalgorithm.
This genetic algorithm helps in partitioning the
available database randomly into tuples and
distributes these tuples unsystematically to the
employees present in a particular team. These
employees update the database on the completion of
their tasks. The update is carried periodically where
each employee is aware of only their particular tuples
or tasks and updates their task details to their team
leader individually.Oncompletionofallthedistributed
tasks, the team leader finally combines the task and
forwards it to the HR Manager of the organization.
Here a robust biometric authentication is used by the
manager to view the task details.
3.1 ARCHITECTURE
Chart -1: FINGERPRINT AUTHENTICATION
In the data group partitioning,thedatagetspartitioned
with the help of a secret key. In the UTC Date time the
alphanumerical strings are converted into the form of
0’s and 1’s (Chart-1) and then encode the fingerprint
authentication with the watermark embedding. The
data retrieval process is carried out with the following
process which encompasses tuple identification
followed by reverse watermarking[1] to retrieve the
original content.
3.2 MODULE DESCRIPTION
The modules included in our proposed work are:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3380
Database Partitioning
Daily Update
Captcha (Private Key) generation
Information Sharing and Accessing
3.2.1: Database Partitioning
Genetic Algorithm is used to partition the database
randomly and distribute it to the team members [8].
This is the initial part of the group sharing where
available information in the database is shared evenly
and randomly to the team mates[Fig -3].
Step 1:
Generate tuples i.e.) tuples () from the group of data
and select a set of info () from the generated tuple.
Step 2:
To Calculate the fitness function, select the random
number from generated tuple which is compared with
the total length of the generated info().
if the generated value is less than the info Len() then
the value gets incremented.
Step 3:
If the fitness score is less than or equal to 0, we have
reached the target.
Step 4:
Else generate the new set of data
3.2.2: Daily Update
This system holds a hierarchical structure where the
HR Manager, Team Leaders, and their respectiveTeam
members are registered onto the organization’s
website [Fig -1]. The Manager and Team Leader are
given the privileges to accept and deny the team
members' requests [Fig -2]. Managers now hold their
respective employee’s login credentials [8]. The Team
Leader assigns the tasks to their Team Members
regularly and on submission of those tasks, a typical
document is generated as the daily report of the
ongoing project and delivered to the Team Leader [9].
Here the Team Members are not allowed the privilege
to rewrite or view the document once submitted to the
Team Leader.
3.2.3: Captcha (Private Key) generation
Captcha is the recently secured and developing
technology that is used to generate random
alphanumeric values to differentiate between the
automated computer program and human logins.Here
different captcha is generated [Fig-4] for each
document randomly [9]. And when the Team Leader
wants to access those documented files, they have to
provide the password and captcha to view. A QR code
is generated [Fig -5] at last that allows the HR manager
to view the daily updates of the Team Leader and the
Employees which can be scanned to gain access.
Step 1:
To generate a captcha, initially create a random string
combination Random() in the String
combination=0123456789ABCDEFGHIJKLMNOPQRST
UVWXYZabcdefghijklmnopqrstuvwxyz
Step 2:
The length of the captcha is six which is generated
from the list of the string combinations, which follows
with the next combination length
Step 3:
Once the captcha is generated, it displays in the image
format “GenerateCaptcha.aspx?”
3.2.4: Information Sharing and Accessing
From the information that is shared by the Team
Leader and Team Members the HR Manager can now
keep track of the details of the documents updated
daily[Fig -3]. The Manager can also navigate to the
specific document of the Team Members using the
Team Member’s Identity[10]. Once the final
documented file is updated to the Manager no one can
access or view the document. The Manager is provided
with dual authentication (fingerprints and password)
foraccess[10].Thefingerprintauthenticationiscarried
out using the SHA Algorithm which involves pixel to
pixel verification of the fingerprint image [Fig -6].
4. IMPLEMENTATION
EMPLOYEE REGISTRATION
Fig -1: Employee registration
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3381
Each member of the organizationhastoregisterbefore
communicating and sharing information among them.
TEAM LEADER LOGIN
Each member in the company has to log in before
group sharing.
Fig -2: Team leader login
EMPLOYEE DAILY UPDATES
On this page, the employee has to include their daily
updates which generate a pdf document that is sent to
both the Manager and Team Leader.
Fig -3: send information
CAPTCHA VERIFICATION
To open and view the pdf document obtained from the
employee, the Team leader has to provide the Captcha
which is used to view the information shared.
Fig - 4: Employee Update
QR CODE GENERATION
A QR-Code is generated to the manager which helps
him to view the document.
Fig -5: QR Generation
FINGERPRINT VERIFICATION
The final fingerprint authentication results in viewing
the entire document shared by the Team leader.
Fig -6: Fingerprint Verification.
5. CONCLUSION
Thus, this paper encompasses around securing the
information communicated among the project
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3382
members and also provides a robust nature, when
subjected to malicious attacks and also preventsillegal
copying and malicious attacks. This prevents the
organization’sprivateinformationfromdatabreeching
which provides high security and protection of the
database.
REFERENCES
[1] Donghui Hu, Dan Zhao and Shui Zheng "A New
Robust Approach for reversible Database
Watermarking with Distortion Control” Vol31, No.6,
June 2019.
[2] McNickle, “Top 10 data security breaches in 2012,”
Apr. 17, 2013. [Online]. Available:
http://www.healthcarefinancenews. com/news/top-
10-data-security-breaches-2012
[3] R. Agrawal and J. Kiernan, Chapter 15—
watermarking relational databases, in Proc. 28th Int.
Conf. Very Large Databases, San Francisco: Morgan
Kaufmann, 2002, pp. 155–166.
[4] R. Halder and A. Cortesi, “A persistent public
watermarking of relational databases,” in Proc. Int.
Conf. Inf. Syst. Secur., 2010, pp. 216–230.
[5]D.Gross-Amblard,“Query-preservingwatermarking
of relational databases and XML documents,” ACM
Trans. Database Syst., vol.
[6] E. B. M. Shehab and A. Ghafoor, “Watermarking
relational databa using optimization-based
techniques,” IEEE Trans. Knowl.
[7] R. Halder, S. Pal, and A. Cortesi, “Watermarking
technique for relational databases: Survey,
classification, and comparison, "J. Universal Comput.
2010
[8] M. Rabin, “Efficient dispersal of information for
security,” Journal of the ACM (JACM).
[9] J. G. et al. (2006) The expanding digital universe: A
forecast of worldwide information
[10] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song,
[11] Y.Zheng, X.Yuan, X. Wang, and X. Gui, "Toward
encrypted cloud media center with Secure
deduplication," IEEE Trans. Multimedia, vol. 19, no.
2,pp. 251-265,2017.
[12] Y. Wu, Z. Wei, and R.H. Deng, "Attribute-based
access to scalable media in the cloud- Assisted content
sharing networks," IEEE Trans. Multimedia, vol.
15,no.4,pp. 788-788,2013
[13] L. Zhou, V. Varadharajan, and M. Hitchens,
"Cryptographic role-based access control for secure
clouddatastoragesystems,”InformationForensicsand
Security IEEE Transactions on, vol. 10, no. 11, pp.
2381–2395, 2015.
[14] F. Chen, T. Xiang, Y. Yang, and S. S. M. Chow,
“Secure cloud storage meets with secure network
coding,” in IEEE INFOCOM, 2014, pp. 673–681
[15] D. He, S. Zeadally,andL.Wu,“Certificatelesspublic
auditing scheme for cloud-assisted wireless body area
networks,” IEEE Systems Journal, pp. 1–10, 2015.

More Related Content

What's hot

IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...IJCSIS Research Publications
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...IJERA Editor
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesIRJET Journal
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED
 
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...IRJET Journal
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemIOSRjournaljce
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...AM Publications
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 

What's hot (20)

IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
 
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 

Similar to IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerprint Masking

IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational DatabaseIRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational DatabaseIRJET Journal
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET Journal
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET Journal
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIRJET Journal
 
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET - Encoded Polymorphic Aspect of ClusteringIRJET - Encoded Polymorphic Aspect of Clustering
IRJET - Encoded Polymorphic Aspect of ClusteringIRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTIRJET Journal
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 

Similar to IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerprint Masking (20)

IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational DatabaseIRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
 
IRJET - Encoded Polymorphic Aspect of Clustering
IRJET - Encoded Polymorphic Aspect of ClusteringIRJET - Encoded Polymorphic Aspect of Clustering
IRJET - Encoded Polymorphic Aspect of Clustering
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership Management
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerprint Masking

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3378 A Genetic Approach for Reversible Database Watermarking using Fingerprint masking J.Menaka Gandhi, T.J Shredha, S.Vishali, V.K. Vishnupriya 1Assistant Professor, Dept. of Information Technology, Meenakshi College of Engineering, Tamil Nadu, India 2,3,4Student, Dept. of Information Technology, Meenakshi College of Engineering, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Data mining involves the practice of examining large pre-existing raw databases to generate usable new information. Authenticity, privacy, and confidentiality of larger datasets are outsourced to the cloud and internet in the encrypted format. Although it has wide attention because of its large storage features, there are severe security and privacy challenges it brings. Watermarking is used to enforce proprietary rights on shared relational databases. There are various reversible watermarking methods used to protect the rights of owners and to recover original data. Generally, the methodsintroduced,compromisetheoriginaldatato a large extent that cannot achieve a good balance between robustness, dataqualitydegradation,malicious attacks, and data recovery. In this paper, we proposed a vigorous and reversible database watermarking technique, Genetic Fingerprinting Algorithm using Histogram shifting (GFAHS). The original database is encoded along with the fingerprint of the owner and watermarked together. The outcomes are in terms of robustness and prevention from illegal ownership violations. Key Words: Genetic Fingerprinting algorithm, Histogram shifting, Robustness, Watermarking, Ownership violation. 1. INTRODUCTION Data mining examines large databases to generate usable new information. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users. Data Mining techniques are used to predict the hidden patterns and behaviors. This allows the businesses to analyze data from different dimensions, then categorizing and summarizing it into meaningful information. Data is an important asset to any organization and thereby, it is essential to safeguard it from online frauds [1]. Data security is not just important for organizations, but also for the remote devices that connect to an organization gets attacked by attackers to tap sensitive information. Data breaches andcyber-attacks are anticipated toincrease as the computer networks expand.[1] While there are technical methods for protecting the content of the websites, there are tech-savvy thieves who can probably still find their way around these protections. Here in our proposal, we have used the Watermarking technique where duplicate data is embedded with the original data to protecttheoriginalcontentandmakeit harder to copy the item. Reversible watermarking techniques are also calledas invertible that are applied where the authenticityofan image has to be granted and the original content is to be decoded. According to Risk Based Securityresearch published in the year 2019, the first six months had seen more than 3,800 publicly disclosed breaches that exposedanincredible4.1billioncompromisedrecords. The most remarkable fact is that 3.2 billion of those records were exposed by just eight breaches.Asforthe exposed data itself, the report has anemailthatexisted in 70% of breaches and passwords of 65% at the topof the pile. 2. PRELIMINARIES AND PREVIOUS WORK 2.1 Firefly optimization algorithm This paper illustrates the reversible database watermarking that uses a firefly algorithm which is calledasanoptimizationalgorithm.Thisapproachuses DEW (Difference Expansion watermarking) algorithm with FFA (Firefly Algorithm) called FFADEW [2]. This technique is used to embed watermark with relational databases and also reverse the watermarked database to original data after watermark extraction and verification.Thedrawbacksofthissystemincludesthat it does not use the notion of persistent watermarking which improves the integrityanddoesnotdiscusshow to improve the existing techniques in terms of persistency. 2.2 A Novel watermarking A reversible watermarking technique recovers the primary data from watermarked data and secure data
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3379 quality. This technique used to recover large data even after the malicious attacks and security threats[3]. RRW analysis is done where the watermarking is spotted with an increased number of decoding accuracies in various modules. It provides ownership protection over a relational database. The drawbacks of this system include, this violatesqueryprocessingin watermarking and also the distortion rate is relatively high. 2.3 Prediction errors by efficient histogram modification A Reversible imagewatermarkingalgorithmadvocates the efficiency of modifying a pair of histogram bins. Multiple sets ofhistogramsareselectedinsequencefor data embedding and pre-process of pixel values is carried out to avoid the overflow and underflow [4]. Blind extraction and recovery are processed by merging a precomputed location and other data into a watermarked image. This algorithm produces high payload data Hiding. The drawbacks of the system include, it has a wide-open to security threats and malicious attacks. The system fails in pattern recognition and authentication. 2.4 Persistent Watermarking This paper explains Persistent watermarking of the relational databases that combine both the Public and Private watermark technique which allows the owner to prove his ownership rights and allows the end-user to demonstrate the correctness and originality of the Information without the loss of data. The public watermarking is based on a part of database state which is invariant in the processing of queries and the private watermarking technique is based on the original database state called abstract database which remains invariant in the processing of the associated queries [3]. The system refuses the data coloring method of cloud watermarking to acknowledge and ensure the mutual reputation. 3. PROPOSED SYSTEM The proposed system presents the method to secure the information using the GFAHS (Genetic Fingerprinting Algorithm using Histogram shifting). We consider a typical multimodal system,madeupofa Biometric authentication that operates by providing physical access and logical access to the internal information. This system also includes watermarking methods. In the watermarking concept, the duplicate data is overwritten above the originalcontext;herethe entire information in the database is encrypted and watermarked where no one could view the original context. It also includes double encryption where the fingerprint authentication is also encrypted within the database. Group sharing in the cloud is a hot topic in recent years. Our proposed work focused onproviding a secure and robust feature in the group sharing in an organization using watermarking technology [1]. The watermarking is followed by usingageneticalgorithm. This genetic algorithm helps in partitioning the available database randomly into tuples and distributes these tuples unsystematically to the employees present in a particular team. These employees update the database on the completion of their tasks. The update is carried periodically where each employee is aware of only their particular tuples or tasks and updates their task details to their team leader individually.Oncompletionofallthedistributed tasks, the team leader finally combines the task and forwards it to the HR Manager of the organization. Here a robust biometric authentication is used by the manager to view the task details. 3.1 ARCHITECTURE Chart -1: FINGERPRINT AUTHENTICATION In the data group partitioning,thedatagetspartitioned with the help of a secret key. In the UTC Date time the alphanumerical strings are converted into the form of 0’s and 1’s (Chart-1) and then encode the fingerprint authentication with the watermark embedding. The data retrieval process is carried out with the following process which encompasses tuple identification followed by reverse watermarking[1] to retrieve the original content. 3.2 MODULE DESCRIPTION The modules included in our proposed work are:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3380 Database Partitioning Daily Update Captcha (Private Key) generation Information Sharing and Accessing 3.2.1: Database Partitioning Genetic Algorithm is used to partition the database randomly and distribute it to the team members [8]. This is the initial part of the group sharing where available information in the database is shared evenly and randomly to the team mates[Fig -3]. Step 1: Generate tuples i.e.) tuples () from the group of data and select a set of info () from the generated tuple. Step 2: To Calculate the fitness function, select the random number from generated tuple which is compared with the total length of the generated info(). if the generated value is less than the info Len() then the value gets incremented. Step 3: If the fitness score is less than or equal to 0, we have reached the target. Step 4: Else generate the new set of data 3.2.2: Daily Update This system holds a hierarchical structure where the HR Manager, Team Leaders, and their respectiveTeam members are registered onto the organization’s website [Fig -1]. The Manager and Team Leader are given the privileges to accept and deny the team members' requests [Fig -2]. Managers now hold their respective employee’s login credentials [8]. The Team Leader assigns the tasks to their Team Members regularly and on submission of those tasks, a typical document is generated as the daily report of the ongoing project and delivered to the Team Leader [9]. Here the Team Members are not allowed the privilege to rewrite or view the document once submitted to the Team Leader. 3.2.3: Captcha (Private Key) generation Captcha is the recently secured and developing technology that is used to generate random alphanumeric values to differentiate between the automated computer program and human logins.Here different captcha is generated [Fig-4] for each document randomly [9]. And when the Team Leader wants to access those documented files, they have to provide the password and captcha to view. A QR code is generated [Fig -5] at last that allows the HR manager to view the daily updates of the Team Leader and the Employees which can be scanned to gain access. Step 1: To generate a captcha, initially create a random string combination Random() in the String combination=0123456789ABCDEFGHIJKLMNOPQRST UVWXYZabcdefghijklmnopqrstuvwxyz Step 2: The length of the captcha is six which is generated from the list of the string combinations, which follows with the next combination length Step 3: Once the captcha is generated, it displays in the image format “GenerateCaptcha.aspx?” 3.2.4: Information Sharing and Accessing From the information that is shared by the Team Leader and Team Members the HR Manager can now keep track of the details of the documents updated daily[Fig -3]. The Manager can also navigate to the specific document of the Team Members using the Team Member’s Identity[10]. Once the final documented file is updated to the Manager no one can access or view the document. The Manager is provided with dual authentication (fingerprints and password) foraccess[10].Thefingerprintauthenticationiscarried out using the SHA Algorithm which involves pixel to pixel verification of the fingerprint image [Fig -6]. 4. IMPLEMENTATION EMPLOYEE REGISTRATION Fig -1: Employee registration
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3381 Each member of the organizationhastoregisterbefore communicating and sharing information among them. TEAM LEADER LOGIN Each member in the company has to log in before group sharing. Fig -2: Team leader login EMPLOYEE DAILY UPDATES On this page, the employee has to include their daily updates which generate a pdf document that is sent to both the Manager and Team Leader. Fig -3: send information CAPTCHA VERIFICATION To open and view the pdf document obtained from the employee, the Team leader has to provide the Captcha which is used to view the information shared. Fig - 4: Employee Update QR CODE GENERATION A QR-Code is generated to the manager which helps him to view the document. Fig -5: QR Generation FINGERPRINT VERIFICATION The final fingerprint authentication results in viewing the entire document shared by the Team leader. Fig -6: Fingerprint Verification. 5. CONCLUSION Thus, this paper encompasses around securing the information communicated among the project
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3382 members and also provides a robust nature, when subjected to malicious attacks and also preventsillegal copying and malicious attacks. This prevents the organization’sprivateinformationfromdatabreeching which provides high security and protection of the database. REFERENCES [1] Donghui Hu, Dan Zhao and Shui Zheng "A New Robust Approach for reversible Database Watermarking with Distortion Control” Vol31, No.6, June 2019. [2] McNickle, “Top 10 data security breaches in 2012,” Apr. 17, 2013. [Online]. Available: http://www.healthcarefinancenews. com/news/top- 10-data-security-breaches-2012 [3] R. Agrawal and J. Kiernan, Chapter 15— watermarking relational databases, in Proc. 28th Int. Conf. Very Large Databases, San Francisco: Morgan Kaufmann, 2002, pp. 155–166. [4] R. Halder and A. Cortesi, “A persistent public watermarking of relational databases,” in Proc. Int. Conf. Inf. Syst. Secur., 2010, pp. 216–230. [5]D.Gross-Amblard,“Query-preservingwatermarking of relational databases and XML documents,” ACM Trans. Database Syst., vol. [6] E. B. M. Shehab and A. Ghafoor, “Watermarking relational databa using optimization-based techniques,” IEEE Trans. Knowl. [7] R. Halder, S. Pal, and A. Cortesi, “Watermarking technique for relational databases: Survey, classification, and comparison, "J. Universal Comput. 2010 [8] M. Rabin, “Efficient dispersal of information for security,” Journal of the ACM (JACM). [9] J. G. et al. (2006) The expanding digital universe: A forecast of worldwide information [10] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, [11] Y.Zheng, X.Yuan, X. Wang, and X. Gui, "Toward encrypted cloud media center with Secure deduplication," IEEE Trans. Multimedia, vol. 19, no. 2,pp. 251-265,2017. [12] Y. Wu, Z. Wei, and R.H. Deng, "Attribute-based access to scalable media in the cloud- Assisted content sharing networks," IEEE Trans. Multimedia, vol. 15,no.4,pp. 788-788,2013 [13] L. Zhou, V. Varadharajan, and M. Hitchens, "Cryptographic role-based access control for secure clouddatastoragesystems,”InformationForensicsand Security IEEE Transactions on, vol. 10, no. 11, pp. 2381–2395, 2015. [14] F. Chen, T. Xiang, Y. Yang, and S. S. M. Chow, “Secure cloud storage meets with secure network coding,” in IEEE INFOCOM, 2014, pp. 673–681 [15] D. He, S. Zeadally,andL.Wu,“Certificatelesspublic auditing scheme for cloud-assisted wireless body area networks,” IEEE Systems Journal, pp. 1–10, 2015.