Effective Watermarking Techniques on Structured Datasets
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015

Effective Watermarking Techniques on Structured Datasets

Mini Joswin, Deeksha Bhardwaj

The data that floats on the web has a wide exposure to authorized and unauthorized users who may copy and reuse or manipulate the data. This can lead to serious breach in the security of the individual or organization who owns the data. Apart from unauthorized regeneration, the data may be subjected to various types of attacks. Watermarking serves as an effective measure to ensure ownership protection and attack resilience of digital data. In this paper we survey the current state-of-the-art methodologies advocated for watermarking relational databases and their effectiveness against different categories of data attacks.

Keywords: Watermarking, Robust, Reversible, Usability constraints, Data attacks

Edition: Volume 4 Issue 10, October 2015

Pages: 2153 - 2156

Share this Article

How to Cite this Article?

Mini Joswin, Deeksha Bhardwaj, "Effective Watermarking Techniques on Structured Datasets", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151030, Volume 4 Issue 10, October 2015, 2153 - 2156

Enter Your Email Address




Similar Articles with Keyword 'Watermarking'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2153 - 2156

Effective Watermarking Techniques on Structured Datasets

Mini Joswin, Deeksha Bhardwaj

Share this Article

Downloads: 108 | Weekly Hits: ⮙6 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1641 - 1646

Discrete Z Transformation based Copyright Protection on Digital Image Using Genetic Algorithm

Prashant C. Harne, Rajesh K. Nigam

Share this Article

Downloads: 108

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Downloads: 108

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Similar Articles with Keyword 'Robust'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Downloads: 63

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 93

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Similar Articles with Keyword 'Reversible'

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2153 - 2156

Effective Watermarking Techniques on Structured Datasets

Mini Joswin, Deeksha Bhardwaj

Share this Article

Downloads: 108 | Weekly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1982 - 1986

Enhanced Robust and Reversible Watermarking for Supervised Learning Data

Madhuri V. Gaikwad, Prof. R. A. Kudale

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this Article

Similar Articles with Keyword 'Data attacks'

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2153 - 2156

Effective Watermarking Techniques on Structured Datasets

Mini Joswin, Deeksha Bhardwaj

Share this Article

Downloads: 110 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 972 - 974

A Survey Paper on Data Leak Detection using Semi Honest Provider Framework

Chinar Bhandari, Dr. Srinivas Narasim Kini

Share this Article



Top