SlideShare a Scribd company logo
1 of 3
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
RRW - A ROBUST AND REVERSIBLE WATERMARKING TECHNIQUE FOR
RELATIONAL DATA
ABSTRACT:
Advancement in information technology is playing an increasing role in the use of
information systems comprising relational databases. These databases are used effectively in
collaborative environments for information extraction; consequently, they are vulnerable to
security threats concerning ownership rights and data tampering. Watermarking is advocated to
enforce ownership rights over shared relational data and for providing a means for tackling data
tampering. When ownership rights are enforced using watermarking, the underlying data
undergoes certain modifications; as a result of which, the data quality gets compromised.
Reversible watermarking is employed to ensure data quality along-with data recovery. However,
such techniques are usually not robust against malicious attacks and do not provide any
mechanism to selectively watermark a particular attribute by taking into account its role in
knowledge discovery. Therefore, reversible watermarking is required that ensures; (i) watermark
encoding and decoding by accounting for the role of all the features in knowledge discovery;
and, (ii) original data recovery in the presence of active malicious attacks. In this paper, a robust
and semiblind reversible watermarking (RRW) technique for numerical relational data has been
proposed that addresses the above objectives. Experimental studies prove the effectiveness of
RRW against malicious attacks and show that the proposed technique outperforms existing ones.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
Relational data in particular is shared extensively by the owners with research
communities and in virtual data storage locations in the Cloud. The purpose is to work in a
collaborative environment and make data openly available so that it is useful for knowledge
extraction and decision making. Take the case of Walmart- a large multinational retail
corporation that has made its sales database available openly over the Internet so that it may be
used for the purposes of identifying market trends through data mining.
PROPOSED SYSTEM:
Technique that keeps the data useful for knowledge discovery. Data modifications are
allowed to such extent that the quality of the data before embedding watermark information and
after extracting is acceptable for knowledge extraction process. Consequently, knowledge
discovery becomes successful in decision support systems where high quality data recovery is
imperative. Reversible watermarking techniques are already available in literature; however, to
the best of our knowledge, no work has been conducted on overcoming the problems of
reversible watermarking techniques in the presence of malicious attacks. Achieving robustness
(attack resilience) in the presence of reversibility (ability to recover the watermark and the
original data) is a challenging task.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server

More Related Content

Viewers also liked

Evaluating websites linear
Evaluating websites linearEvaluating websites linear
Evaluating websites linearwhowk
 
La iniciativa T2T RiesgodeFractura.com
La iniciativa T2T RiesgodeFractura.comLa iniciativa T2T RiesgodeFractura.com
La iniciativa T2T RiesgodeFractura.comriesgodefractura
 
Trabajo de computo
Trabajo de computoTrabajo de computo
Trabajo de computomoooooonn
 
Unternehmenskommunikation im Zeitalter des Social Media Marketing
Unternehmenskommunikation im Zeitalter des Social Media MarketingUnternehmenskommunikation im Zeitalter des Social Media Marketing
Unternehmenskommunikation im Zeitalter des Social Media MarketingOliver T. Hellriegel
 
Catalogo LLUMM Studios
Catalogo LLUMM StudiosCatalogo LLUMM Studios
Catalogo LLUMM StudiosLLUMMStudios
 
Quality medical service 2011 julio
Quality medical service 2011   julioQuality medical service 2011   julio
Quality medical service 2011 juliocentromedicoqms
 
Reunión Proveedores YPF
Reunión Proveedores YPFReunión Proveedores YPF
Reunión Proveedores YPFASINMET Mendoza
 
Uk regional card fraud 2009
Uk regional card fraud 2009Uk regional card fraud 2009
Uk regional card fraud 2009CPPGroup Plc
 
IR 2.0 DIRK AIRA-Workshop München 021211
IR 2.0  DIRK AIRA-Workshop München 021211IR 2.0  DIRK AIRA-Workshop München 021211
IR 2.0 DIRK AIRA-Workshop München 021211Kristin Koehler
 
Tipos de servicios en la red y comercio electrónico
Tipos de servicios en la red y comercio electrónicoTipos de servicios en la red y comercio electrónico
Tipos de servicios en la red y comercio electrónicoInstitución Educativa
 
Branding Passion: How to Create a Compelling Campaign for Social Change
Branding Passion: How to Create a Compelling Campaign for Social ChangeBranding Passion: How to Create a Compelling Campaign for Social Change
Branding Passion: How to Create a Compelling Campaign for Social ChangeRule29
 
Biology in Focus - Chapter 7
Biology in Focus - Chapter 7Biology in Focus - Chapter 7
Biology in Focus - Chapter 7mpattani
 
List of comparatives and superlatives - Short adjectives
List of comparatives and superlatives - Short adjectivesList of comparatives and superlatives - Short adjectives
List of comparatives and superlatives - Short adjectivesrfl1971
 
Chapter 1 What is Public Relations?
Chapter 1 What is Public Relations?Chapter 1 What is Public Relations?
Chapter 1 What is Public Relations?Barbara Nixon
 

Viewers also liked (20)

Evaluating websites linear
Evaluating websites linearEvaluating websites linear
Evaluating websites linear
 
La iniciativa T2T RiesgodeFractura.com
La iniciativa T2T RiesgodeFractura.comLa iniciativa T2T RiesgodeFractura.com
La iniciativa T2T RiesgodeFractura.com
 
1 Introducción al Software Libre
1 Introducción al Software Libre1 Introducción al Software Libre
1 Introducción al Software Libre
 
Trabajo de computo
Trabajo de computoTrabajo de computo
Trabajo de computo
 
Libro feng shui
Libro feng shuiLibro feng shui
Libro feng shui
 
Unternehmenskommunikation im Zeitalter des Social Media Marketing
Unternehmenskommunikation im Zeitalter des Social Media MarketingUnternehmenskommunikation im Zeitalter des Social Media Marketing
Unternehmenskommunikation im Zeitalter des Social Media Marketing
 
Nº19
Nº19Nº19
Nº19
 
Catalogo LLUMM Studios
Catalogo LLUMM StudiosCatalogo LLUMM Studios
Catalogo LLUMM Studios
 
Quality medical service 2011 julio
Quality medical service 2011   julioQuality medical service 2011   julio
Quality medical service 2011 julio
 
Reunión Proveedores YPF
Reunión Proveedores YPFReunión Proveedores YPF
Reunión Proveedores YPF
 
Uk regional card fraud 2009
Uk regional card fraud 2009Uk regional card fraud 2009
Uk regional card fraud 2009
 
IR 2.0 DIRK AIRA-Workshop München 021211
IR 2.0  DIRK AIRA-Workshop München 021211IR 2.0  DIRK AIRA-Workshop München 021211
IR 2.0 DIRK AIRA-Workshop München 021211
 
Catalogo 2013 es
Catalogo 2013 esCatalogo 2013 es
Catalogo 2013 es
 
Funcion palpebral
Funcion palpebralFuncion palpebral
Funcion palpebral
 
Tipos de servicios en la red y comercio electrónico
Tipos de servicios en la red y comercio electrónicoTipos de servicios en la red y comercio electrónico
Tipos de servicios en la red y comercio electrónico
 
Branding Passion: How to Create a Compelling Campaign for Social Change
Branding Passion: How to Create a Compelling Campaign for Social ChangeBranding Passion: How to Create a Compelling Campaign for Social Change
Branding Passion: How to Create a Compelling Campaign for Social Change
 
Paramount textile ltd
Paramount textile ltdParamount textile ltd
Paramount textile ltd
 
Biology in Focus - Chapter 7
Biology in Focus - Chapter 7Biology in Focus - Chapter 7
Biology in Focus - Chapter 7
 
List of comparatives and superlatives - Short adjectives
List of comparatives and superlatives - Short adjectivesList of comparatives and superlatives - Short adjectives
List of comparatives and superlatives - Short adjectives
 
Chapter 1 What is Public Relations?
Chapter 1 What is Public Relations?Chapter 1 What is Public Relations?
Chapter 1 What is Public Relations?
 

Similar to Robust reversible watermarking technique

Rrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataRrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataieeepondy
 
Dynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataShakas Technologies
 
Dynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataShakas Technologies
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection systemShakas Technologies
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Shakas Technologies
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Shakas Technologies
 
K nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedK nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedShakas Technologies
 
Rrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataRrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataLeMeniz Infotech
 
Data Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big DataData Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big Datarahulmonikasharma
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...Shakas Technologies
 
On the security of a public auditing mechanism for shared cloud data service
On the security of a public auditing mechanism for shared cloud data serviceOn the security of a public auditing mechanism for shared cloud data service
On the security of a public auditing mechanism for shared cloud data serviceShakas Technologies
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudLeMeniz Infotech
 
A secure client side deduplication scheme in cloud storage environments
A secure client side deduplication scheme in cloud storage environmentsA secure client side deduplication scheme in cloud storage environments
A secure client side deduplication scheme in cloud storage environmentsShakas Technologies
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksLeMeniz Infotech
 
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...IRJET Journal
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Shakas Technologies
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsRamakant Gawande
 
Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...Hari Rajagopalan
 

Similar to Robust reversible watermarking technique (20)

Rrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataRrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational data
 
Dynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud data
 
Dynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud data
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection system
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
K nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedK nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encrypted
 
Rrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataRrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational data
 
Data Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big DataData Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big Data
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
On the security of a public auditing mechanism for shared cloud data service
On the security of a public auditing mechanism for shared cloud data serviceOn the security of a public auditing mechanism for shared cloud data service
On the security of a public auditing mechanism for shared cloud data service
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
A secure client side deduplication scheme in cloud storage environments
A secure client side deduplication scheme in cloud storage environmentsA secure client side deduplication scheme in cloud storage environments
A secure client side deduplication scheme in cloud storage environments
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networks
 
2015 dot net list
2015 dot net list2015 dot net list
2015 dot net list
 
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
 
Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Robust reversible watermarking technique

  • 1. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com RRW - A ROBUST AND REVERSIBLE WATERMARKING TECHNIQUE FOR RELATIONAL DATA ABSTRACT: Advancement in information technology is playing an increasing role in the use of information systems comprising relational databases. These databases are used effectively in collaborative environments for information extraction; consequently, they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data tampering. When ownership rights are enforced using watermarking, the underlying data undergoes certain modifications; as a result of which, the data quality gets compromised. Reversible watermarking is employed to ensure data quality along-with data recovery. However, such techniques are usually not robust against malicious attacks and do not provide any mechanism to selectively watermark a particular attribute by taking into account its role in knowledge discovery. Therefore, reversible watermarking is required that ensures; (i) watermark encoding and decoding by accounting for the role of all the features in knowledge discovery; and, (ii) original data recovery in the presence of active malicious attacks. In this paper, a robust and semiblind reversible watermarking (RRW) technique for numerical relational data has been proposed that addresses the above objectives. Experimental studies prove the effectiveness of RRW against malicious attacks and show that the proposed technique outperforms existing ones.
  • 2. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM: Relational data in particular is shared extensively by the owners with research communities and in virtual data storage locations in the Cloud. The purpose is to work in a collaborative environment and make data openly available so that it is useful for knowledge extraction and decision making. Take the case of Walmart- a large multinational retail corporation that has made its sales database available openly over the Internet so that it may be used for the purposes of identifying market trends through data mining. PROPOSED SYSTEM: Technique that keeps the data useful for knowledge discovery. Data modifications are allowed to such extent that the quality of the data before embedding watermark information and after extracting is acceptable for knowledge extraction process. Consequently, knowledge discovery becomes successful in decision support systems where high quality data recovery is imperative. Reversible watermarking techniques are already available in literature; however, to the best of our knowledge, no work has been conducted on overcoming the problems of reversible watermarking techniques in the presence of malicious attacks. Achieving robustness (attack resilience) in the presence of reversibility (ability to recover the watermark and the original data) is a challenging task.
  • 3. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server