Analyzing Database Security and A Study of Ownership Protection using Watermarking Algorithm

Authors

  • Saikat Baul  Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh
  • Md. Ratan Rana  Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh

DOI:

https://doi.org/10.32628/CSEIT228620

Keywords:

Database Security, Ownership Protection, Watermarking Algorithm

Abstract

This paper is an analysis of database security and a study of ownership protection using the watermarking algorithm. Information is a crucial component of a database, and customers rely on service providers to have a solid system in place to guard against malicious attacks and data breaches. To boost the database security level, a few different types of approaches are used. The watermarking algorithm is one of those approaches. Digital watermarking is an important sub-field of information concealment technology research. It is a technology that incorporates identifying data into digital works. To protect digital product copyright, the basic idea is to embed confidential information in digital products such as images, audio, and video to achieve data fusion. The current digital watermarking technology has made significant progress in the field of multimedia information (such as images, audio, and video). It is resistant to frequent database attacks.

References

  1. T.D. Vale, “Principles of Security and Integrity of Databases,” 15, pp. 401-405, 2014.
  2. U.P. Rao, D.R. Patel, and P.M. Vikani, “Relational Database Watermarking for Ownership Protection,” Procedia, 6, pp. 988-995 Technology, 2012.
  3. M. Şerban, “Methods to Increase Search Performance for Encrypted Databases,” Procedia Economics and Finance, 3, pp. 1063-1068 (2012)
  4. N. Vurukonda and B.T. Rao, “A Study on Data Storage Security Issues in Cloud,” Computing. Procedia Computer Science, 92, pp. 128-135, 2016.
  5. D. Trivedi, P. Zavarsky, and S. Butakov, “Enhancing Relational Database Security by Metadata Segregation,” Procedia Computer Science, 94, pp. 453-458, 2016.
  6. Cao, Z., Shi, G. and Wu, Q., 2019. Research on database watermarking based on Independent Component Analysis and multiple rolling. International Journal of Distributed Sensor Networks, 15(4), p.1550147719841004.
  7. Natarajan M, Makhdumi G. Safeguarding the digital contents: Digital watermarking. DESIDOC Journal of Library & Information Technology. 2009 May 1;29(3):29.
  8. Pan N, Wu X, Chi YL, et al. Acoustical diagnosis for gear box combined failures based on frequency domain blind deconvolution. J Vib Shock 2013; 32(7): 154–158.
  9. Wang Y, See J, Oh YH, et al. Effective recognition of facial micro-expressions with video motion magnification. Multimed Tools Appl 2017; 76: 21665–21690.

Downloads

Published

2022-12-30

Issue

Section

Research Articles

How to Cite

[1]
Saikat Baul, Md. Ratan Rana, " Analyzing Database Security and A Study of Ownership Protection using Watermarking Algorithm" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 6, pp.208-216, November-December-2022. Available at doi : https://doi.org/10.32628/CSEIT228620