SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1817
Genetic Algorithm Based Reversible Watermarking Approach for
Numeric and Non-Numeric Relational Data
Gayatri R. Ghogare1, Prof. Aparna Junnarkar 2
1Student, ME, Department of Computer Engineering, P.E.S Modern College of Engineering,
Shivajinagar, Pune-05, Maharashtra, India.
2Assistant Professor, Department of Computer Engineering, P.E.S Modern College of Engineering,
Shivajinagar, Pune-05, Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - With the course of time, immense growthintheuse
of Internet has led to the generation and consumption of huge
amount of relational data. Relational databases are made
remotely available for the users within collaborative
environments for knowledge gain and decision making
purposes. But, eventually, this has led to the relational data
thefts and datadegradationthreats. Reversiblewatermarking
has proved a best candidate solution for overcoming such
tedious threats. Reversiblewatermarkingschemesareused for
imposing ownership rights and tackling data tampering. But,
these schemes are not effective against protecting relational
databases from active malicious attacks such as insertion,
alteration and deletion attacks. Also, relational data is
modified to a very large extent resulting in data quality
degradation. In this paper, a genetic algorithm(GA) based
reversible watermarking scheme for numeric and non-
numeric(text) relational data is proposed. This scheme
ensures: i) recovery of original relational data along with the
embedded watermark; i) data quality; and iii) attack
resilience against various malicious attacks. Experimental
studies prove the effectiveness and performance ofthescheme
for both numeric as well as non-numeric relational database.
Keywords: Data Quality, Data Recovery, Feature
Extraction, Genetic Algorithm, Numerical Data, Non-
numerical Data, Reversible Watermarking, Robustness,
Relational Databases.
1. INTRODUCTION
Digitization has encouraged various organizations in
making their relational databases openly accessibleover the
Internet. But with this, organizations have to face various
relational database related threats such as data loss, data
degradation, malicious attacks on databases.,etc. Digital
watermarking for relational databases has proved to be a
prominent solution for imposing copyright protection,
tamper detection and preserving database integrity.
However, the core process involved in watermarking
relational databases is far different than that of the
multimedia watermarking due to difference in the type of
data, structure of data storage, etc.
Watermarking ofrelational databasesneedstobeperformed
in such a way that the data quality will not get compromised
and it will be later useful in decision making as well as in
planning process. Reversible watermarking is a relatively
new and emerging area for maintaining integrity of the
relational databases. The data formatofthe relational data is
different than that of audio, video, images and natural
languages. The techniques used in watermarking relational
databases needs to consider following constraints: i) a
database consists of tuples/records, which is where the
watermark needs to be embedded; ii) the ordering of the
records in a database relation; and iii) data operations such
as insertion, deletion and alteration that occurs normally in
the database. Additionally, a proper embedding mechanism
to embed some information along with the type of data
stored in the database should be taken into consideration to
achieve better results.
Irreversible watermarking helps in protecting
ownership rights, but in these schemes the embedding
process alters the data to a large extent. Reversible
watermarking consists of same process as that of
irreversible watermarking i.e., encoding and decoding
process with third additional data recovery process. In
genetic algorithm(GA) based reversible watermarking
approach for numeric and non-numeric relational data, the
concept of Mutual Information(MI)isusedwhichstatistically
measures the correlation between the features(i.e.
dependency of the features on each other in terms of
information stored in the relational databases).Thisconcept
makes it easier in embedding the secret parameter values
and manipulating the database information so that the
suspicious attackers are unable to attack the databases. The
importance of the featuresin watermark embeddingprocess
is not taken into account in previous works. The GA based
reversible watermarking method considers the importance
of database features and performs the embedding
mechanism accordingly. This technique gives a robust data
recovery option which is reversible in nature and attack
resilient. Also, it paves a way for efficient decision making
and knowledge discovery using relational databases within
shared environments.
2. Literature Review
Reversible watermarking has proved to be the most
prominent technique for protecting relational databases in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1818
present era. Reversible watermarking has paved a way in
increased use of relational databasesinknowledgediscovery
and decision making purposes. Several techniques are
introduced and implemented for securing relational
databases and maintaining database consistency. Some of
the popularly known approaches used in ownership
protection are fingerprinting, data hashing and serial codes.
Also, encryption is the oldest method used in achieving data
security. Fingerprinting is one of the widely used aspect of
encryption approaches. Fingerprinting i.e. transactional
watermarks are used to keep track and locate digital
ownership by embedding all thecopiesofcontentseach with
different individual watermarks for differentrecipients. One
of the main disadvantage fingerprinting in encryption holds
is that once it is stolen it can be easily used by attacker. This
results in a privacy issue in using bio-metric schemes. Also,
in encryption, data aretransformedaltogetherandcannot be
used in any decision making and planning operations.
Whereas, watermarking approaches encodethedata insuch
a manner that it remains helpful for recipients in latter
use[14].
The first and foremost approach used in irreversible
watermarking technique lackedthecapabilityto retrieve the
original relational data along with the preservation of it’s
data quality[20]. The histogram expansion technique
describes the first reversible watermarkingmethodusedfor
watermarking the relational databases. In thisapproach,the
selective nonzero digits of errors are used to form
histograms and are then reversibly watermarked. Here, the
original data can be fully reconstructed using the
untampered watermarked relational datasets. In this
technique, with the use of validationof datasetsonlythedata
owner has the capability to recover the original database
state. But, this scheme is not suitable against malicious
attacks that are subjected to a large number of tuples [15].
In Difference Expansion Watermarking(DEW)
technique, a concept of difference expansion is applied on
integers and reversibility is achieved in watermarking of
relational databases. Here, arithmeticoperationsarecarried
out on numeric features and transformations areperformed
for manipulating data within database. The important
advantages of this scheme are reversed to huge condition of
original content, legitimate owner recognition, resistance
against subordinate attacks, and storing of the original
dataset at a protected secondary storage is not at all
required. The key generation here is based on hash of the
secret key and primary key[12], [13]. The advanced version
of DEW technique is based on support vector
regression(SVR) prediction for watermarking relational
databases. This scheme aims at providing ownership proof
and safeguard the database from been tampered. However,
this scheme is prone to alteration attacks which makes the
original database recovery difficult and nearly impossible
[5].
Genetic Algorithm based on Difference Expansion
Watermarking(GADEW) technique provides a better
solution over the drawbacks of DEW technique. In DEW
approach, only two features of the selected record are taken
into consideration depending on the amount of distortion
tolerated which in turn results in low amount of watermark
capacity and higher amount of distortion rate. In GADEW
technique, geneticalgorithm alongwithdifference expansion
is implemented for minimizing the distortion rate in the
data. But, with this, the watermark capacity is decreased
with the increase in watermarked tuples[2]. A Prediction-
Error Expansion Watermarking (PEEW) technique
incorporates a predictor in place of difference operator to
select candidate pixelsorfeaturesforembeddingwatermark
information. PEEW technique has been extended to handle
the situation where the multiple owners claim the
ownership of watermarked data. PEEW scheme is able to
embed a large watermark into the image with relatively low
distortion by implementing a new adaptive embedding and
pixel selection strategies. This results in better quality of
restored image after watermark extraction [16], [17], [18].
Web-based databases are watermarked usinga robust,
resilient and reversible watermarking method. In this
method, an algorithm is proposed which uses public
watermarks forwatermarkingbasedonparameterizedtuple
partitioning and white spaces. This technique resultsin high
distortion rate within the tuples indatabase[6].Arobustand
reversible watermarking technique using genetic algorithm
is favorable method to secure data fromgettingmanipulated
and maintaining the data integrity. In this technique, Mutual
Information(MI) concept provides an appropriate
mechanism for embedding watermark information. Here, a
robust data recovery with high data qualityisachievedalong
with protection of data from active malicious
attacks(insertion, alteration and deletion attacks)[1].
These schemes only considered the numeric features
for watermarking relational data. This provides a way for
attacker to attack the relational database using certain
mechanisms for non-numericdatasets.Arobusttechniqueof
embedding watermarks in a relational database with text
attributes is implemented where non-numeric features are
considered for watermarking. Here, an attribute is selected
using a pseudorandom generator and the watermark is
embedded into it. In this technique, minor changes are
embedded such that the usability of database is not
degraded and copyright protection is also achieved[4]. This
method is robust against different malicious attacks such as
subset deletion, addition and modification attacks.
3. System Architecture
The genetic algorithm(GA) based reversible
watermarking approach for numeric and non-numeric
relational data focuses on recovering the relational data
completely along with successful watermark detection.Also,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1819
the goal is to maintain the data consistency in presence of
various active malicious attacks such as insertion, alteration
and deletion. These goals can be achieved through
appropriate selection of secret parameter value and
watermark string which can be utilized for encoding and
decoding the watermark easily. Appropriate conditions are
applied to improve the performance of Genetic
Algorithm(GA) and decrease the computation cost. The
system architecture provides the process for watermarking
the relational database using numeric and non-numeric
attributes of database aiming to recover the watermarked
data successfully. The architecturein“Figure1”comprisesof
following four phases: 1)Watermark pre-processing phase;
2)Watermark Encoding phase; 3)Watermark Decoding
phase; and 4)Data Recovery.
Figure 1: Architecture Diagram of Genetic Algorithm(GA)
based Reversible Watermarking Technique.
The processing of the phases takes place as follows:
1) Watermark Pre-processing Phase:
In pre-processing phase, different parameters for defining
most favorable watermark value are calculated. A secret
threshold is defined using which user can analyze and rank
the features according to their importance. This phase
consists of following two tasks:
 FeatureAnalysisandSelection:Fornonnumeric(textual)
attributes, we cannot watermark these attributes in
string format. For this purpose, initially the textual data
is converted to numeric values and weight of each is
calculated. This weight is further usedfor employingthe
Mutual information(MI)amongstthefeatures. Asuitable
non-numeric data feature is selected for watermark
embedding. Here, all the features are ranked according
to their importance and mutual dependence. The MI
concept is used for defining the correlation betweenone
feature with the other. The probability distribution
amongst the features iscalculatedanda secretthreshold
range is defined within which the watermark
mechanism should be incorporated. Here the feature
whose MI value is less than the threshold is selected for
watermarking. This provides a way of protecting data
from attacker as the proper knowledge of embedding
process is not known to the attacker.
 Watermark Creation: Here, an optimizationalgorithmis
used for finding optimal watermark value. Genetic
Algorithm(GA), an optimization technique is used for
calculating an appropriate watermark string and the
fitness parameter i.e., Beta value. This beta value
provides the amount of change that is tolerable in the
selected features while watermark embedding. For
finding an optimal solution, an iterative mechanism is
followed by GA that evolves a population of
chromosomes. The basic genetic operations to these
chromosomes in GA are: selection, crossover, mutation
and replacement. Here, the fitness value is calculated
based upon generation of binary string, calculating
parent chromosome by applying the tournament
selection, offspring creation using crossover and
mutation operation and lastly by applying the elitism
strategy two individuals are obtained. This results in
finally in generation of optimal watermark string and
the best fitness value beta. The MI values for original
data and watermarked data arecomparedfornumberof
generations. The mean and variance provide the results
for preserving the data quality of the obtained
watermarked relational data.
2) Watermark Encoding:
This phase aims at embedding the watermark in the
Database such that the usability of the data is not affected
even after the insertion of the watermark information. For
embedding the watermark, the best fitness value and the
optimal watermark string obtained are used. A secret
threshold defined by the owner gives the right to owner to
decide the number of features to be watermarked in the
database. The watermark information should be embedded
in such a way that data should be protected against any sort
of attack and the data quality should be maintained at the
time of data recovery. An attacker channel is assumed
consisting of insertion, deletion and alteration attacks.
3) Watermark Decoding:
In watermark decoding phase, the embedded data is
extracted which is assumed to be received from untrusted
data channel. For this purpose, initially the data features
which are marked are located and then extraction processis
carried from LSB towards MSB. The original data and
recovered data with watermark
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1820
is compared to note the data quality and recovery
percentage results.
4) Data Recovery:
This is the final phase where the original data along with
the watermark is recovered. With some pre-processing the
decoded watermark bits is converted to achieve watermark
information. The optimized value of beta and string
generated using GA is used for reconstruction of original
data. The results are compared and tested for effectiveness
of the recovery process.
4. Experimental Setup
4.1 Software and Hardware Requirements:
Experiments are conducted on Intel Core i3 processor
with CPU of 2.5GHz and 4GB RAM with 64 bit operating
system. The front end used is JAVA jdk 1.8 with Netbeans
IDE 8.0.2 and the system is implemented on Windows 7
operating system. Various data-sets are available from UCI
Machine Learning repository which includes, Cleveland
Heart Disease data-set, MAGIC Gamma Telescope data-set
and PAMAP2 Physical Activity Monitoring data-set. Here,
experiment is carried on Heart DiseaseMedical data-set.The
processing is performed on both numeric and non-numeric
data features within data-set. The implemented method is
analyzed for the following constraints,viz., i)effect on the
data quality; ii)robustness against malicious attacks; and
iii)data recovery and iv) performance of GA. A part of data-
set is used to illustrate the entire process step by step.
4.2 Performance Parameters
The implemented watermarking technique isexpected
to provide better results than the existing approaches. Here,
following Keep Performance Indicator(KPI) are used to
compare the performance of the system:
1) Data Distortion Ratio
The watermark should be embedded by using optimum
bandwidth. Here, the technique used is expectedtomaintain
the quality of data without any modification within the
database. Distortion effect on original data is negligible.
2) Resilience against Attack Ratio
The watermarking approaches should be robust and
resilient to attacks. The GA based reversible watermarking
technique is expected to provide results which depicts
efficient recovery against attacks. Here, resilience against
attacks such as alteration, insertion and deletion is analyzed
and performance of the scheme is determined.Robustnessis
an important constraint in relational database concepts.
3) Watermark Detection
The proposed GA based reversible watermarking method is
analyzed for detecting watermark with or without presence
of the malicious attacks.
4) Data Recovery
As the GA based watermarking technique is reversible in
nature, it is expected to recover the original data with or
without attacks.
5. Results
To prove the efficiency of the implemented technique,
extensive attack analysis is performed forgeneratingresults
which shows the robustness of genetic algorithm based
reversible watermarking technique. Here, operations are
performed on the numeric and non-numeric features of the
relational dataset. “Table 1”, illustrates the features that are
considered for watermarking. The Mutual Information (MI)
of original data (MIo) and the watermarked data(MIw) is
compared for verifying the data quality that is preserved.
After comparison it is observed that the relational data
content is preserved without any loss in data quality. Also,
the data is recovered fully in presenceoftheintruderattacks
such as insertion, deletion and alteration attacks.
Table 1: Mutual Information of Selected Features Before
and After Watermarking.
Table 2: Genetic Algorithm Parameters
“Table 2” provides the GA parameters that are
considered while performing the mechanism to obtain best
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1821
fitness value(beta) and optimal watermark string. The
performance of genetic algorithm has improved with
decrease in computational time as compared to existing
technique. ”Figure 2” provides the graphical representation
depicting decrease in the computation time for GA. “Figure
3” shows comparative results for data recovery after
insertion attacks. It is observed that 100% relational data is
recovered for insertion attack in the implemented system.
Due to use of majority voting scheme even when duplicate
tuples are inserted by the attacker, the data quality is not
compromised and data recovery is successful.
Figure 2: Computation Time for Genetic Algorithm
“Figure 4” depicts the results for data recovery after
alteration attacks. For alteration attack, with decoding
process the original data and unaltered tuples can be
recovered. Also, some of the altered tuples can be retain if
their usability remains unaffected after alteration attack.
Here, it is difficult for attacker to corrupt the watermarked
relational data as the secret variables are inaccessible. As
compared to existing system, the implemented systemgives
better results in data recovery for alteration attacks. Also,
“Figure 5” for data recovery after deletion attack provides
details for successful data recovery even when 100% of the
data is deleted. Additionally, the scheme is robust to recover
the actual relational data successfully in presence of attacks.
Figure 3: Data Recovery after Insertion Attacks.
Figure 4: Data Recovery after Alteration Attacks.
Here, the experimental studies shows the effectiveness
of GA based reversible watermarking technique and proves
the performance accuracy in terms of data recovery,
watermark detection, data quality and resilience to
attacks(insertion, alteration and deletion) which is up tothe
mark as compared to the existing techniques.GA based
reversible watermarking approach gives 100% watermark
identification even when most of the tuples areattacked, but
previous techniques do not provide suchbetterresults.Also,
here in presence of heavy attacks data recovery is achieved
completely. The performance of GA has improved
significantly as compared to previous schemes.
Figure 5: Data Recovery after Deletion Attacks.
6. Conclusion
Watermarking techniques for relational databases are
enforced to protect the ownership of the data and prevent
relational data from getting interfered from unauthorized
access. The numericandnon-numericattributesinrelational
database contains important sensitive information in
proportion. Both attributes should be considered for
watermarking of relational databases in equal proportion.
The significant drawback oftheirreversiblewatermarkingis
modification in relational data such that data quality is
compromised to a large extent. Reversible watermarking
techniques are able to overcome these drawbacks but are
not effective against malicious attacks. In this paper, a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1822
genetic algorithm based robust and reversible method for
watermarking numeric and non-numeric relational
databases is implemented. The Mutual Information(MI)
concept used helps in obtainingthe best watermark valuefor
embedding and data recovery purposes. This approach is
effective against various active malicious attacks.
Experimental study shows that genetic algorithm based
reversible watermarking is able to reconstruct embedded
watermark and original relational data. Also, it gives good
results as compared to the previously used techniques. The
technique implemented gives better results in terms of
performance of genetic algorithm as compared to existing
schemes. A number of experiments proves that genetic
algorithm based watermarking technique ensures data
quality, data reversibility and is resilient to different active
malicious attacks(insertion, alteration and deletion).
The watermarking of shared databases in distributed
environments using the robustandreversiblewatermarking
needs to be addressed in future.
ACKNOWLEDGEMENT
With the completion of this paper, I would like to take this
opportunity to express my gratitude and deep regards to
thank my guide Prof.(Ms) Aparna Junnarkar, Computer
Engineering Department, for her constant support and
valuable guidance. I also express my sincere appreciation to
the Computer Engineering Department as well as College
Library. Lastly, I am thankful tomyparentsandwell-wishers
for their continuous upliftment at each and every step in
fulfillment of the work.
REFERENCES
[1] Saman Iftikhar, M. Kamran and Zahid Anwar, “RRW - A
Robust and Reversible Watermarking Technique for
Relational Data”, in ProceedingsofIEEETransactionson
Knowledge and Data Engineering, val X, No : XX ,2015.
[2] K. Jawad and A. Khan, “Genetic algorithm and difference
expansion based reversible watermarkingfor relational
databases”, Journal of Systems and Software, 2013.
[3] Kamran M, Suhail S, Farooq M., “A robust, distortion
minimizing technique for watermarking relational
databases using once-for-all usability constraints”,IEEE
Transactions on KnowledgeandData Engineering2013;
25(12): 26942707.
[4] Vidhi Khanduja, Anik Khandelwal, Ankur Madharaia,
Dipak Saraf, Tushar Kumar, “A Robust Watermarking
Approach for Non Numeric Relational Database”, in
International Conference on Communication,
Information Computing Technology (ICCICT), IEEE,
2012.
[5] J.-N. Chang and H.-C. Wu, “Reversible fragile database
watermarking technology using difference expansion
based on svr prediction”, Computer, Consumer and
Control (IS3C), 2012 International Symposium on IEEE,
2012, pp. 690693.
[6] E. Sonnleitner , “A robust watermarking approach for
large databases”, in Satellite Telecommunications
(ESTEL), 2012 IEEE FirstAESSEuropeanConferenceon.
IEEE, 2012, pp. 16.
[7] M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen,
and M. K. Khan, “A blind reversible method for
watermarking relational databases based on a time-
stamping protocol”, Expert Systems with Applications,
vol. 39, no. 3, pp. 31853196, 2012.
[8] M. Kamran and M. Farooq , “An information-preserving
watermarking scheme for right protection of emr
systems”, Knowledge and Data Engineering, IEEE
Transactions on, vol. 24, no. 11, pp. 19501962, 2012.
[9] Coatrieux G, Chazard E, Beuscart R, Roux C., “Lossless
watermarking of categorical attributes for verifying
medical data base integrity”, IEEE Annual International
Conference of the Engineering in Medicine and Biology
Society, EMBC, 2011, IEEE,Boston,MA,2011;81958198.
[10] Zhang L, Gao W, Jiang N, Zhang L, Zhang Y., “Relational
databases watermarking for textual and numerical
data”, 2011 International Conference on Mechatronic
Science, Electric Engineering andComputer(MEC),IEEE,
Jilin, China, 2011; 16331636.
[11] Y.-R. Wang, W.-H. Lin, and L. Yang, “An intelligent
watermarking method based on particle swarm
optimization”, ExpertSystemswith Applications,vol.38,
no. 7, pp. 8024 8029, 2011.
[12] G. Gupta and J. Pieprzyk, “Database relation
watermarkingresilientagainstsecondarywatermarking
attacks”, in Information Systems Security. Springer,
2009, pp. 222236.
[13] G. Gupta and J. Pieprzyk , “Reversible and blind
database watermarking using difference expansion”, in
Proceedings of the 1st international conference on
Forensic applications and techniques in
telecommunications, information, and multimedia and
workshop. ICST (Institutefor ComputerSciences,Social-
Informatics and Telecommunications Engineering),
2008, p. 24.
[14] S. Subramanya and B. K. Yi,“Digital rightsmanagement”,
Potentials, IEEE, vol. 25, no. 2, pp. 3134, 2006.
[15] Y. Zhang, B. Yang, and X.-M. Niu , “Reversible
watermarking for relational database authentication”,
Journal of Computers, vol. 17, no. 2, pp. 5966, 2006.
[16] M. E. Farfoura and S.-J. Horng , “A novel blind reversible
method for watermarking relational databases”, in
Parallel and Distributed Processing with Applications
(ISPA), 2010 International Symposium on. IEEE, 2010,
pp. 563569.
[17] D. M. Thodi and J. J. Rodriguez , “Prediction-error based
reversible watermarking”, in Image Processing, 2004.
ICIP04. 2004 International Conference on, vol. 3. IEEE,
2004, pp. 15491552.
[18] D. M. Thodi and J. J. Rodriguez , “Reversible
watermarking by prediction-error expansion”,inImage
Analysis and Interpretation, 2004. 6th IEEE Southwest
Symposium on. IEEE, 2004, pp. 2125.
[19] A. M. Alattar , “Reversible watermark using difference
expansion of triplets”, in Image Processing, 2003. ICIP
2003. Proceedings. 2003. International Conference on,
vol. 1. IEEE, 2003, pp. I501.
[20] R. Agrawal and J. Kiernan , “Watermarking relational
databases”, in Proceedings of the 28th international
conference on Very Large Data Bases. VLDB
Endowment, 2002, pp 155-166.

More Related Content

What's hot

online Record Linkage
online Record Linkageonline Record Linkage
online Record LinkagePriya Pandian
 
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical ReviewIRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET Journal
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
IOSR Journals
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
IJARIIT
 
4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis4.Video Conferencing and Diagnosis
4.Video Conferencing and DiagnosisVideoguy
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET Journal
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
 
Tim Malthus_Towards standards for the exchange of field spectral datasets
Tim Malthus_Towards standards for the exchange of field spectral datasetsTim Malthus_Towards standards for the exchange of field spectral datasets
Tim Malthus_Towards standards for the exchange of field spectral datasetsTERN Australia
 
ESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPXESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPX
Catalogic Software
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing
Rezgar Mohammad
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ijcsit
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET Journal
 
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
IJCI JOURNAL
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
 
A Comparative Analysis of Relational Databases and Graph Databases
A Comparative Analysis of Relational Databases and Graph DatabasesA Comparative Analysis of Relational Databases and Graph Databases
A Comparative Analysis of Relational Databases and Graph DatabasesDarroch Greally
 
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-CodeSharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
IRJET Journal
 
A Deterministic Eviction Model for Removing Redundancies in Video Corpus
A Deterministic Eviction Model for Removing Redundancies in Video Corpus A Deterministic Eviction Model for Removing Redundancies in Video Corpus
A Deterministic Eviction Model for Removing Redundancies in Video Corpus
IJECEIAES
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
idescitation
 

What's hot (19)

online Record Linkage
online Record Linkageonline Record Linkage
online Record Linkage
 
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical ReviewIRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
 
4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
 
Tim Malthus_Towards standards for the exchange of field spectral datasets
Tim Malthus_Towards standards for the exchange of field spectral datasetsTim Malthus_Towards standards for the exchange of field spectral datasets
Tim Malthus_Towards standards for the exchange of field spectral datasets
 
ESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPXESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPX
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
A Comparative Analysis of Relational Databases and Graph Databases
A Comparative Analysis of Relational Databases and Graph DatabasesA Comparative Analysis of Relational Databases and Graph Databases
A Comparative Analysis of Relational Databases and Graph Databases
 
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-CodeSharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
 
A Deterministic Eviction Model for Removing Redundancies in Video Corpus
A Deterministic Eviction Model for Removing Redundancies in Video Corpus A Deterministic Eviction Model for Removing Redundancies in Video Corpus
A Deterministic Eviction Model for Removing Redundancies in Video Corpus
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 

Similar to Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data

IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational DatabaseIRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET Journal
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET Journal
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEEMEMTECHSTUDENTPROJECTS
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
IRJET Journal
 
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey:  Enhanced Block Level Message Locked Encryption for data DeduplicationA Survey:  Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
IRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
 
IRJET- Cross User Bigdata Deduplication
IRJET-  	  Cross User Bigdata DeduplicationIRJET-  	  Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
IRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
acijjournal
 
Analysis on Deduplication Techniques for Storage of Data in Cloud
Analysis on Deduplication Techniques for Storage of Data in CloudAnalysis on Deduplication Techniques for Storage of Data in Cloud
Analysis on Deduplication Techniques for Storage of Data in Cloud
IRJET Journal
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
IRJET Journal
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
IRJET Journal
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET Journal
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET Journal
 
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storageSurvey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
eSAT Journals
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
IAEME Publication
 
50120140507005
5012014050700550120140507005
50120140507005
IAEME Publication
 
Rrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataRrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational data
ieeepondy
 

Similar to Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data (20)

IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational DatabaseIRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey:  Enhanced Block Level Message Locked Encryption for data DeduplicationA Survey:  Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET- Cross User Bigdata Deduplication
IRJET-  	  Cross User Bigdata DeduplicationIRJET-  	  Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
Analysis on Deduplication Techniques for Storage of Data in Cloud
Analysis on Deduplication Techniques for Storage of Data in CloudAnalysis on Deduplication Techniques for Storage of Data in Cloud
Analysis on Deduplication Techniques for Storage of Data in Cloud
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
 
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storageSurvey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
50120140507005
5012014050700550120140507005
50120140507005
 
Rrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataRrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational data
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 

Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1817 Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data Gayatri R. Ghogare1, Prof. Aparna Junnarkar 2 1Student, ME, Department of Computer Engineering, P.E.S Modern College of Engineering, Shivajinagar, Pune-05, Maharashtra, India. 2Assistant Professor, Department of Computer Engineering, P.E.S Modern College of Engineering, Shivajinagar, Pune-05, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the course of time, immense growthintheuse of Internet has led to the generation and consumption of huge amount of relational data. Relational databases are made remotely available for the users within collaborative environments for knowledge gain and decision making purposes. But, eventually, this has led to the relational data thefts and datadegradationthreats. Reversiblewatermarking has proved a best candidate solution for overcoming such tedious threats. Reversiblewatermarkingschemesareused for imposing ownership rights and tackling data tampering. But, these schemes are not effective against protecting relational databases from active malicious attacks such as insertion, alteration and deletion attacks. Also, relational data is modified to a very large extent resulting in data quality degradation. In this paper, a genetic algorithm(GA) based reversible watermarking scheme for numeric and non- numeric(text) relational data is proposed. This scheme ensures: i) recovery of original relational data along with the embedded watermark; i) data quality; and iii) attack resilience against various malicious attacks. Experimental studies prove the effectiveness and performance ofthescheme for both numeric as well as non-numeric relational database. Keywords: Data Quality, Data Recovery, Feature Extraction, Genetic Algorithm, Numerical Data, Non- numerical Data, Reversible Watermarking, Robustness, Relational Databases. 1. INTRODUCTION Digitization has encouraged various organizations in making their relational databases openly accessibleover the Internet. But with this, organizations have to face various relational database related threats such as data loss, data degradation, malicious attacks on databases.,etc. Digital watermarking for relational databases has proved to be a prominent solution for imposing copyright protection, tamper detection and preserving database integrity. However, the core process involved in watermarking relational databases is far different than that of the multimedia watermarking due to difference in the type of data, structure of data storage, etc. Watermarking ofrelational databasesneedstobeperformed in such a way that the data quality will not get compromised and it will be later useful in decision making as well as in planning process. Reversible watermarking is a relatively new and emerging area for maintaining integrity of the relational databases. The data formatofthe relational data is different than that of audio, video, images and natural languages. The techniques used in watermarking relational databases needs to consider following constraints: i) a database consists of tuples/records, which is where the watermark needs to be embedded; ii) the ordering of the records in a database relation; and iii) data operations such as insertion, deletion and alteration that occurs normally in the database. Additionally, a proper embedding mechanism to embed some information along with the type of data stored in the database should be taken into consideration to achieve better results. Irreversible watermarking helps in protecting ownership rights, but in these schemes the embedding process alters the data to a large extent. Reversible watermarking consists of same process as that of irreversible watermarking i.e., encoding and decoding process with third additional data recovery process. In genetic algorithm(GA) based reversible watermarking approach for numeric and non-numeric relational data, the concept of Mutual Information(MI)isusedwhichstatistically measures the correlation between the features(i.e. dependency of the features on each other in terms of information stored in the relational databases).Thisconcept makes it easier in embedding the secret parameter values and manipulating the database information so that the suspicious attackers are unable to attack the databases. The importance of the featuresin watermark embeddingprocess is not taken into account in previous works. The GA based reversible watermarking method considers the importance of database features and performs the embedding mechanism accordingly. This technique gives a robust data recovery option which is reversible in nature and attack resilient. Also, it paves a way for efficient decision making and knowledge discovery using relational databases within shared environments. 2. Literature Review Reversible watermarking has proved to be the most prominent technique for protecting relational databases in
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1818 present era. Reversible watermarking has paved a way in increased use of relational databasesinknowledgediscovery and decision making purposes. Several techniques are introduced and implemented for securing relational databases and maintaining database consistency. Some of the popularly known approaches used in ownership protection are fingerprinting, data hashing and serial codes. Also, encryption is the oldest method used in achieving data security. Fingerprinting is one of the widely used aspect of encryption approaches. Fingerprinting i.e. transactional watermarks are used to keep track and locate digital ownership by embedding all thecopiesofcontentseach with different individual watermarks for differentrecipients. One of the main disadvantage fingerprinting in encryption holds is that once it is stolen it can be easily used by attacker. This results in a privacy issue in using bio-metric schemes. Also, in encryption, data aretransformedaltogetherandcannot be used in any decision making and planning operations. Whereas, watermarking approaches encodethedata insuch a manner that it remains helpful for recipients in latter use[14]. The first and foremost approach used in irreversible watermarking technique lackedthecapabilityto retrieve the original relational data along with the preservation of it’s data quality[20]. The histogram expansion technique describes the first reversible watermarkingmethodusedfor watermarking the relational databases. In thisapproach,the selective nonzero digits of errors are used to form histograms and are then reversibly watermarked. Here, the original data can be fully reconstructed using the untampered watermarked relational datasets. In this technique, with the use of validationof datasetsonlythedata owner has the capability to recover the original database state. But, this scheme is not suitable against malicious attacks that are subjected to a large number of tuples [15]. In Difference Expansion Watermarking(DEW) technique, a concept of difference expansion is applied on integers and reversibility is achieved in watermarking of relational databases. Here, arithmeticoperationsarecarried out on numeric features and transformations areperformed for manipulating data within database. The important advantages of this scheme are reversed to huge condition of original content, legitimate owner recognition, resistance against subordinate attacks, and storing of the original dataset at a protected secondary storage is not at all required. The key generation here is based on hash of the secret key and primary key[12], [13]. The advanced version of DEW technique is based on support vector regression(SVR) prediction for watermarking relational databases. This scheme aims at providing ownership proof and safeguard the database from been tampered. However, this scheme is prone to alteration attacks which makes the original database recovery difficult and nearly impossible [5]. Genetic Algorithm based on Difference Expansion Watermarking(GADEW) technique provides a better solution over the drawbacks of DEW technique. In DEW approach, only two features of the selected record are taken into consideration depending on the amount of distortion tolerated which in turn results in low amount of watermark capacity and higher amount of distortion rate. In GADEW technique, geneticalgorithm alongwithdifference expansion is implemented for minimizing the distortion rate in the data. But, with this, the watermark capacity is decreased with the increase in watermarked tuples[2]. A Prediction- Error Expansion Watermarking (PEEW) technique incorporates a predictor in place of difference operator to select candidate pixelsorfeaturesforembeddingwatermark information. PEEW technique has been extended to handle the situation where the multiple owners claim the ownership of watermarked data. PEEW scheme is able to embed a large watermark into the image with relatively low distortion by implementing a new adaptive embedding and pixel selection strategies. This results in better quality of restored image after watermark extraction [16], [17], [18]. Web-based databases are watermarked usinga robust, resilient and reversible watermarking method. In this method, an algorithm is proposed which uses public watermarks forwatermarkingbasedonparameterizedtuple partitioning and white spaces. This technique resultsin high distortion rate within the tuples indatabase[6].Arobustand reversible watermarking technique using genetic algorithm is favorable method to secure data fromgettingmanipulated and maintaining the data integrity. In this technique, Mutual Information(MI) concept provides an appropriate mechanism for embedding watermark information. Here, a robust data recovery with high data qualityisachievedalong with protection of data from active malicious attacks(insertion, alteration and deletion attacks)[1]. These schemes only considered the numeric features for watermarking relational data. This provides a way for attacker to attack the relational database using certain mechanisms for non-numericdatasets.Arobusttechniqueof embedding watermarks in a relational database with text attributes is implemented where non-numeric features are considered for watermarking. Here, an attribute is selected using a pseudorandom generator and the watermark is embedded into it. In this technique, minor changes are embedded such that the usability of database is not degraded and copyright protection is also achieved[4]. This method is robust against different malicious attacks such as subset deletion, addition and modification attacks. 3. System Architecture The genetic algorithm(GA) based reversible watermarking approach for numeric and non-numeric relational data focuses on recovering the relational data completely along with successful watermark detection.Also,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1819 the goal is to maintain the data consistency in presence of various active malicious attacks such as insertion, alteration and deletion. These goals can be achieved through appropriate selection of secret parameter value and watermark string which can be utilized for encoding and decoding the watermark easily. Appropriate conditions are applied to improve the performance of Genetic Algorithm(GA) and decrease the computation cost. The system architecture provides the process for watermarking the relational database using numeric and non-numeric attributes of database aiming to recover the watermarked data successfully. The architecturein“Figure1”comprisesof following four phases: 1)Watermark pre-processing phase; 2)Watermark Encoding phase; 3)Watermark Decoding phase; and 4)Data Recovery. Figure 1: Architecture Diagram of Genetic Algorithm(GA) based Reversible Watermarking Technique. The processing of the phases takes place as follows: 1) Watermark Pre-processing Phase: In pre-processing phase, different parameters for defining most favorable watermark value are calculated. A secret threshold is defined using which user can analyze and rank the features according to their importance. This phase consists of following two tasks:  FeatureAnalysisandSelection:Fornonnumeric(textual) attributes, we cannot watermark these attributes in string format. For this purpose, initially the textual data is converted to numeric values and weight of each is calculated. This weight is further usedfor employingthe Mutual information(MI)amongstthefeatures. Asuitable non-numeric data feature is selected for watermark embedding. Here, all the features are ranked according to their importance and mutual dependence. The MI concept is used for defining the correlation betweenone feature with the other. The probability distribution amongst the features iscalculatedanda secretthreshold range is defined within which the watermark mechanism should be incorporated. Here the feature whose MI value is less than the threshold is selected for watermarking. This provides a way of protecting data from attacker as the proper knowledge of embedding process is not known to the attacker.  Watermark Creation: Here, an optimizationalgorithmis used for finding optimal watermark value. Genetic Algorithm(GA), an optimization technique is used for calculating an appropriate watermark string and the fitness parameter i.e., Beta value. This beta value provides the amount of change that is tolerable in the selected features while watermark embedding. For finding an optimal solution, an iterative mechanism is followed by GA that evolves a population of chromosomes. The basic genetic operations to these chromosomes in GA are: selection, crossover, mutation and replacement. Here, the fitness value is calculated based upon generation of binary string, calculating parent chromosome by applying the tournament selection, offspring creation using crossover and mutation operation and lastly by applying the elitism strategy two individuals are obtained. This results in finally in generation of optimal watermark string and the best fitness value beta. The MI values for original data and watermarked data arecomparedfornumberof generations. The mean and variance provide the results for preserving the data quality of the obtained watermarked relational data. 2) Watermark Encoding: This phase aims at embedding the watermark in the Database such that the usability of the data is not affected even after the insertion of the watermark information. For embedding the watermark, the best fitness value and the optimal watermark string obtained are used. A secret threshold defined by the owner gives the right to owner to decide the number of features to be watermarked in the database. The watermark information should be embedded in such a way that data should be protected against any sort of attack and the data quality should be maintained at the time of data recovery. An attacker channel is assumed consisting of insertion, deletion and alteration attacks. 3) Watermark Decoding: In watermark decoding phase, the embedded data is extracted which is assumed to be received from untrusted data channel. For this purpose, initially the data features which are marked are located and then extraction processis carried from LSB towards MSB. The original data and recovered data with watermark
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1820 is compared to note the data quality and recovery percentage results. 4) Data Recovery: This is the final phase where the original data along with the watermark is recovered. With some pre-processing the decoded watermark bits is converted to achieve watermark information. The optimized value of beta and string generated using GA is used for reconstruction of original data. The results are compared and tested for effectiveness of the recovery process. 4. Experimental Setup 4.1 Software and Hardware Requirements: Experiments are conducted on Intel Core i3 processor with CPU of 2.5GHz and 4GB RAM with 64 bit operating system. The front end used is JAVA jdk 1.8 with Netbeans IDE 8.0.2 and the system is implemented on Windows 7 operating system. Various data-sets are available from UCI Machine Learning repository which includes, Cleveland Heart Disease data-set, MAGIC Gamma Telescope data-set and PAMAP2 Physical Activity Monitoring data-set. Here, experiment is carried on Heart DiseaseMedical data-set.The processing is performed on both numeric and non-numeric data features within data-set. The implemented method is analyzed for the following constraints,viz., i)effect on the data quality; ii)robustness against malicious attacks; and iii)data recovery and iv) performance of GA. A part of data- set is used to illustrate the entire process step by step. 4.2 Performance Parameters The implemented watermarking technique isexpected to provide better results than the existing approaches. Here, following Keep Performance Indicator(KPI) are used to compare the performance of the system: 1) Data Distortion Ratio The watermark should be embedded by using optimum bandwidth. Here, the technique used is expectedtomaintain the quality of data without any modification within the database. Distortion effect on original data is negligible. 2) Resilience against Attack Ratio The watermarking approaches should be robust and resilient to attacks. The GA based reversible watermarking technique is expected to provide results which depicts efficient recovery against attacks. Here, resilience against attacks such as alteration, insertion and deletion is analyzed and performance of the scheme is determined.Robustnessis an important constraint in relational database concepts. 3) Watermark Detection The proposed GA based reversible watermarking method is analyzed for detecting watermark with or without presence of the malicious attacks. 4) Data Recovery As the GA based watermarking technique is reversible in nature, it is expected to recover the original data with or without attacks. 5. Results To prove the efficiency of the implemented technique, extensive attack analysis is performed forgeneratingresults which shows the robustness of genetic algorithm based reversible watermarking technique. Here, operations are performed on the numeric and non-numeric features of the relational dataset. “Table 1”, illustrates the features that are considered for watermarking. The Mutual Information (MI) of original data (MIo) and the watermarked data(MIw) is compared for verifying the data quality that is preserved. After comparison it is observed that the relational data content is preserved without any loss in data quality. Also, the data is recovered fully in presenceoftheintruderattacks such as insertion, deletion and alteration attacks. Table 1: Mutual Information of Selected Features Before and After Watermarking. Table 2: Genetic Algorithm Parameters “Table 2” provides the GA parameters that are considered while performing the mechanism to obtain best
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1821 fitness value(beta) and optimal watermark string. The performance of genetic algorithm has improved with decrease in computational time as compared to existing technique. ”Figure 2” provides the graphical representation depicting decrease in the computation time for GA. “Figure 3” shows comparative results for data recovery after insertion attacks. It is observed that 100% relational data is recovered for insertion attack in the implemented system. Due to use of majority voting scheme even when duplicate tuples are inserted by the attacker, the data quality is not compromised and data recovery is successful. Figure 2: Computation Time for Genetic Algorithm “Figure 4” depicts the results for data recovery after alteration attacks. For alteration attack, with decoding process the original data and unaltered tuples can be recovered. Also, some of the altered tuples can be retain if their usability remains unaffected after alteration attack. Here, it is difficult for attacker to corrupt the watermarked relational data as the secret variables are inaccessible. As compared to existing system, the implemented systemgives better results in data recovery for alteration attacks. Also, “Figure 5” for data recovery after deletion attack provides details for successful data recovery even when 100% of the data is deleted. Additionally, the scheme is robust to recover the actual relational data successfully in presence of attacks. Figure 3: Data Recovery after Insertion Attacks. Figure 4: Data Recovery after Alteration Attacks. Here, the experimental studies shows the effectiveness of GA based reversible watermarking technique and proves the performance accuracy in terms of data recovery, watermark detection, data quality and resilience to attacks(insertion, alteration and deletion) which is up tothe mark as compared to the existing techniques.GA based reversible watermarking approach gives 100% watermark identification even when most of the tuples areattacked, but previous techniques do not provide suchbetterresults.Also, here in presence of heavy attacks data recovery is achieved completely. The performance of GA has improved significantly as compared to previous schemes. Figure 5: Data Recovery after Deletion Attacks. 6. Conclusion Watermarking techniques for relational databases are enforced to protect the ownership of the data and prevent relational data from getting interfered from unauthorized access. The numericandnon-numericattributesinrelational database contains important sensitive information in proportion. Both attributes should be considered for watermarking of relational databases in equal proportion. The significant drawback oftheirreversiblewatermarkingis modification in relational data such that data quality is compromised to a large extent. Reversible watermarking techniques are able to overcome these drawbacks but are not effective against malicious attacks. In this paper, a
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1822 genetic algorithm based robust and reversible method for watermarking numeric and non-numeric relational databases is implemented. The Mutual Information(MI) concept used helps in obtainingthe best watermark valuefor embedding and data recovery purposes. This approach is effective against various active malicious attacks. Experimental study shows that genetic algorithm based reversible watermarking is able to reconstruct embedded watermark and original relational data. Also, it gives good results as compared to the previously used techniques. The technique implemented gives better results in terms of performance of genetic algorithm as compared to existing schemes. A number of experiments proves that genetic algorithm based watermarking technique ensures data quality, data reversibility and is resilient to different active malicious attacks(insertion, alteration and deletion). The watermarking of shared databases in distributed environments using the robustandreversiblewatermarking needs to be addressed in future. ACKNOWLEDGEMENT With the completion of this paper, I would like to take this opportunity to express my gratitude and deep regards to thank my guide Prof.(Ms) Aparna Junnarkar, Computer Engineering Department, for her constant support and valuable guidance. I also express my sincere appreciation to the Computer Engineering Department as well as College Library. Lastly, I am thankful tomyparentsandwell-wishers for their continuous upliftment at each and every step in fulfillment of the work. REFERENCES [1] Saman Iftikhar, M. Kamran and Zahid Anwar, “RRW - A Robust and Reversible Watermarking Technique for Relational Data”, in ProceedingsofIEEETransactionson Knowledge and Data Engineering, val X, No : XX ,2015. [2] K. Jawad and A. Khan, “Genetic algorithm and difference expansion based reversible watermarkingfor relational databases”, Journal of Systems and Software, 2013. [3] Kamran M, Suhail S, Farooq M., “A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints”,IEEE Transactions on KnowledgeandData Engineering2013; 25(12): 26942707. [4] Vidhi Khanduja, Anik Khandelwal, Ankur Madharaia, Dipak Saraf, Tushar Kumar, “A Robust Watermarking Approach for Non Numeric Relational Database”, in International Conference on Communication, Information Computing Technology (ICCICT), IEEE, 2012. [5] J.-N. Chang and H.-C. Wu, “Reversible fragile database watermarking technology using difference expansion based on svr prediction”, Computer, Consumer and Control (IS3C), 2012 International Symposium on IEEE, 2012, pp. 690693. [6] E. Sonnleitner , “A robust watermarking approach for large databases”, in Satellite Telecommunications (ESTEL), 2012 IEEE FirstAESSEuropeanConferenceon. IEEE, 2012, pp. 16. [7] M. E. Farfoura, S.-J. Horng, J.-L. Lai, R.-S. Run, R.-J. Chen, and M. K. Khan, “A blind reversible method for watermarking relational databases based on a time- stamping protocol”, Expert Systems with Applications, vol. 39, no. 3, pp. 31853196, 2012. [8] M. Kamran and M. Farooq , “An information-preserving watermarking scheme for right protection of emr systems”, Knowledge and Data Engineering, IEEE Transactions on, vol. 24, no. 11, pp. 19501962, 2012. [9] Coatrieux G, Chazard E, Beuscart R, Roux C., “Lossless watermarking of categorical attributes for verifying medical data base integrity”, IEEE Annual International Conference of the Engineering in Medicine and Biology Society, EMBC, 2011, IEEE,Boston,MA,2011;81958198. [10] Zhang L, Gao W, Jiang N, Zhang L, Zhang Y., “Relational databases watermarking for textual and numerical data”, 2011 International Conference on Mechatronic Science, Electric Engineering andComputer(MEC),IEEE, Jilin, China, 2011; 16331636. [11] Y.-R. Wang, W.-H. Lin, and L. Yang, “An intelligent watermarking method based on particle swarm optimization”, ExpertSystemswith Applications,vol.38, no. 7, pp. 8024 8029, 2011. [12] G. Gupta and J. Pieprzyk, “Database relation watermarkingresilientagainstsecondarywatermarking attacks”, in Information Systems Security. Springer, 2009, pp. 222236. [13] G. Gupta and J. Pieprzyk , “Reversible and blind database watermarking using difference expansion”, in Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop. ICST (Institutefor ComputerSciences,Social- Informatics and Telecommunications Engineering), 2008, p. 24. [14] S. Subramanya and B. K. Yi,“Digital rightsmanagement”, Potentials, IEEE, vol. 25, no. 2, pp. 3134, 2006. [15] Y. Zhang, B. Yang, and X.-M. Niu , “Reversible watermarking for relational database authentication”, Journal of Computers, vol. 17, no. 2, pp. 5966, 2006. [16] M. E. Farfoura and S.-J. Horng , “A novel blind reversible method for watermarking relational databases”, in Parallel and Distributed Processing with Applications (ISPA), 2010 International Symposium on. IEEE, 2010, pp. 563569. [17] D. M. Thodi and J. J. Rodriguez , “Prediction-error based reversible watermarking”, in Image Processing, 2004. ICIP04. 2004 International Conference on, vol. 3. IEEE, 2004, pp. 15491552. [18] D. M. Thodi and J. J. Rodriguez , “Reversible watermarking by prediction-error expansion”,inImage Analysis and Interpretation, 2004. 6th IEEE Southwest Symposium on. IEEE, 2004, pp. 2125. [19] A. M. Alattar , “Reversible watermark using difference expansion of triplets”, in Image Processing, 2003. ICIP 2003. Proceedings. 2003. International Conference on, vol. 1. IEEE, 2003, pp. I501. [20] R. Agrawal and J. Kiernan , “Watermarking relational databases”, in Proceedings of the 28th international conference on Very Large Data Bases. VLDB Endowment, 2002, pp 155-166.