This document presents a watermarking technique for proving ownership of outsourced relational databases, addressing vulnerabilities found in previous methods. The proposed method employs a secure embedding of an imperceptible watermark and uses optimization techniques to ensure resilience against common watermark attacks, such as tuple deletion and alteration. Through experiments, the technique demonstrates improved resilience and effective watermark decoding using an optimal threshold to minimize errors.