IRJET- A Genetic Approach for Reversible Database Watermarking using Fingerprint Masking

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 07 Issue: 03 | Mar 2020

p-ISSN: 2395-0072

www.irjet.net

A Genetic Approach for Reversible Database Watermarking using Fingerprint masking J.Menaka Gandhi, T.J Shredha, S.Vishali, V.K. Vishnupriya 1Assistant

Professor, Dept. of Information Technology, Meenakshi College of Engineering, Tamil Nadu, India Dept. of Information Technology, Meenakshi College of Engineering, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract - Data mining involves the practice of breaches and cyber-attacks are anticipated to increase examining large pre-existing raw databases to generate as the computer networks expand.[1] While there are usable new information. Authenticity, privacy, and technical methods for protecting the content of the confidentiality of larger datasets are outsourced to the websites, there are tech-savvy thieves who can cloud and internet in the encrypted format. Although it probably still find their way around these protections. has wide attention because of its large storage features, Here in our proposal, we have used the Watermarking there are severe security and privacy challenges it technique where duplicate data is embedded with the brings. Watermarking is used to enforce proprietary original data to protect the original content and make it rights on shared relational databases. There are various harder to copy the item. reversible watermarking methods used to protect the rights of owners and to recover original data. Generally, Reversible watermarking techniques are also called as the methods introduced, compromise the original data to invertible that are applied where the authenticity of an a large extent that cannot achieve a good balance image has to be granted and the original content is to between robustness, data quality degradation, malicious be decoded. According to Risk Based Security research attacks, and data recovery. In this paper, we proposed a published in the year 2019, the first six months had vigorous and reversible database watermarking seen more than 3,800 publicly disclosed breaches that technique, Genetic Fingerprinting Algorithm using exposed an incredible 4.1 billion compromised records. Histogram shifting (GFAHS). The original database is The most remarkable fact is that 3.2 billion of those encoded along with the fingerprint of the owner and records were exposed by just eight breaches. As for the watermarked together. The outcomes are in terms of exposed data itself, the report has an email that existed robustness and prevention from illegal ownership in 70% of breaches and passwords of 65% at the top of violations. the pile. 2,3,4Student,

Key Words: Genetic Fingerprinting algorithm, Histogram shifting, Robustness, Watermarking, Ownership violation.

2. PRELIMINARIES AND PREVIOUS WORK

1. INTRODUCTION

This paper illustrates the reversible database watermarking that uses a firefly algorithm which is called as an optimization algorithm. This approach uses DEW (Difference Expansion watermarking) algorithm with FFA (Firefly Algorithm) called FFADEW [2]. This technique is used to embed watermark with relational databases and also reverse the watermarked database to original data after watermark extraction and verification. The drawbacks of this system includes that it does not use the notion of persistent watermarking which improves the integrity and does not discuss how to improve the existing techniques in terms of persistency.

Data mining examines large databases to generate usable new information. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users. Data Mining techniques are used to predict the hidden patterns and behaviors. This allows the businesses to analyze data from different dimensions, then categorizing and summarizing it into meaningful information. Data is an important asset to any organization and thereby, it is essential to safeguard it from online frauds [1]. Data security is not just important for organizations, but also for the remote devices that connect to an organization gets attacked by attackers to tap sensitive information. Data Š 2020, IRJET

|

Impact Factor value: 7.34

|

2.1 Firefly optimization algorithm

2.2 A Novel watermarking A reversible watermarking technique recovers the primary data from watermarked data and secure data

ISO 9001:2008 Certified Journal

|

Page 3378


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.