Watermarking Relational Database

Embed Size (px)

Citation preview

  • 8/2/2019 Watermarking Relational Database

    1/22

    WELCOME

    1

  • 8/2/2019 Watermarking Relational Database

    2/22

    Watermarking Relational Database Using

    Optimization-Based Techniques

    2

  • 8/2/2019 Watermarking Relational Database

    3/22

    ABSTRACT

    Proving ownerships rights on outsourced relational database is

    a crucial issue in today's internet based applicationenvironments and in many content distribution applications. Inthis paper, we present a mechanism for proof of ownership

    based on the secure embedding of a robust imperceptiblewatermark in relational data. We formulate the watermarking of

    relational databases as a constrained optimization problem anddiscus efficient techniques to solve the optimization problemand to handle the constraints. Our watermarking technique isresilient to watermark synchronization errors because it uses a

    partioning approach that does not require marker tuple.

    In this paper we are discussing about the steps that wehave completed by far in our project

    3

  • 8/2/2019 Watermarking Relational Database

    4/22

    CONTENTS

    y Watermarkingy Existing systemy Proposed systemy Modules associated with the projecty Server moduley Client moduley Dataflow diagramy Screen shotsy System Requirementsy Conclusion

    4

  • 8/2/2019 Watermarking Relational Database

    5/22

    INTRODUCTION

    The rapid growth of the Internet and relatedtechnologies has offered an unprecedented ability toaccess and redistribute digital contents. In such acontext, enforcing data ownership is an important

    requirement, which requires articulated solutions,encompassing technical, organizational, and legalaspects

    A watermark describes information that can beused to prove the ownership of data such as the owner,origin, or recipient of the content.

    5

  • 8/2/2019 Watermarking Relational Database

    6/22

    WATERMARKING

    y Robust Watermark: for proof of ownership, copyrightsprotection.

    y Fragile Watermark: for tamper proofing, data integrity

    Watermarking is technique that allow the owner of thedata to embed imperceptible watermark into the data

    .

    6

  • 8/2/2019 Watermarking Relational Database

    7/22

    Existing System

    Watermarking in Least Significant Bits(LSB).

    This technique embeds the watermark bits in the least

    significant bits of selected attributes of a selected

    subset of tuples. It uses secret key in watermarking.

    y The data partitioning technique used is based on the

    use of special marker tuples.

    7

  • 8/2/2019 Watermarking Relational Database

    8/22

    PROPOSED SYSTEM

    Watermarking embeds ownership information in

    digital content.

    Watermark describes information that can be used to

    prove the ownership of relational database. Here the embedding is hidden that the presence of

    watermarking is invisible to the user.

    y Watermark decoding is based on a threshold-based

    technique characterized by an optimal threshold that

    minimizes the probability of decoding errors.

    8

  • 8/2/2019 Watermarking Relational Database

    9/22

    THE MODULES ASSOCIATED WITH

    THIS PROJECT ARE

    ySERVER (SOURCE) MODULE

    yCLIENT (DESTINATION)MODULE

    9

  • 8/2/2019 Watermarking Relational Database

    10/22

    SERVER (SOURCE) MODULE

    THIS MODULE INCLUDES CLASSES SUCH AS

    DBCON This class establishes a connection to thedatabase using SQL SERVER.

    ACTION CONTROLLER This class initiates the processby accessing the data table.

    PARTITION This class eventually divides the tablerecords and assign partition number to it.

    10

  • 8/2/2019 Watermarking Relational Database

    11/22

    y SINGLE BIT ENCODING This class encodes thepartitioned file by adding one bit to each record.

    y ENCRYPTIONThis class gets all the encoded

    records and encrypts them as awhole file along the secret key.

    yWATERMARK EMBEDDINGThis class embedswatermark and sends it to the destination via networkconnections

    11

  • 8/2/2019 Watermarking Relational Database

    12/22

    CLIENT (DESTINATION) MODULETHE CLASSES OF THIS MODULE DOES THE REVERSE ENGINEERING

    OF THE SOURCE MODULE

    MAIN FORM - This class receives the file fromsource

    DECRYPTION -This class decrypts the file using thesecret key

    REVER

    SE PARTITIONT

    his class merge the partitionedfile or records into a single file .

    12

  • 8/2/2019 Watermarking Relational Database

    13/22

    DATAFLOW DIAGRAM

    USER

    AUTHENT-ICATION

    WEATHER

    DATABASE

    DATA

    LISTINGFOR S/W

    LISTED TABLESAND FUNCTION

    13

  • 8/2/2019 Watermarking Relational Database

    14/22

    LISTED

    DATAPARTITION

    Single bit

    encoding

    SERIALZATION

    14

  • 8/2/2019 Watermarking Relational Database

    15/22

    DES

    IMPLEMENTATION

    GENETIC

    ALGORITHM

    IMLIMENTATI

    ON

    HASHCODE

    GENERATION

    Serialized

    data

    WATERMARK

    EMBEDDED

    DATA

    15

  • 8/2/2019 Watermarking Relational Database

    16/22

    SCREENSHOT - LOGIN

    16

  • 8/2/2019 Watermarking Relational Database

    17/22

    SCREENSHOT MAIN WINDOW

    17

  • 8/2/2019 Watermarking Relational Database

    18/22

    WATERMARKING DATABASE

    18

  • 8/2/2019 Watermarking Relational Database

    19/22

    SCREENSHOT - ENCRYPTION

    19

  • 8/2/2019 Watermarking Relational Database

    20/22

    SYSTEM REQUIREMENTS

    Software Requirements:

    y Language : C#(visual studio net2005)

    y Operating System : Windows NT/XP

    y

    Back End : sqlserverHardware Requirements:

    y Processor : Pentium IV

    y RAM : 512 MB

    y Hard Disk : 40GB

    20

  • 8/2/2019 Watermarking Relational Database

    21/22

    CONCLUSION

    In this project, we propose a resilientwatermarking technique for relational data that embedswatermark bits. The watermarking problem was

    formulated as a constrained optimization problem thatmaximizes or minimizes a hiding function based on thebit to be embedded. GA and PS techniques wereemployed to solve the proposed optimization problem

    and to handle the constraints.

    21

  • 8/2/2019 Watermarking Relational Database

    22/22

    THANK YOU

    22