Professional Documents
Culture Documents
ISSN:2320-0790
I.
INTRODUCTION
a.
b.
c.
d.
e.
121
COMPUSOFT, An international journal of advanced computer technology, 2 (5), May-2013 (Volume-II, Issue-V)
APPLICATIONS OF WATERMARKING
II.
BACKGROUND
COMPUSOFT, An international journal of advanced computer technology, 2 (5), May-2013 (Volume-II, Issue-V)
III.
PROPOSED SCHEME
COMPUSOFT, An international journal of advanced computer technology, 2 (5), May-2013 (Volume-II, Issue-V)
Where:
r:
record of a relation
K: secret Key known only to owner
: number of attributes in the relation available for
marking
1/y: fraction of tuples marked
R: relation
Vp: virtual primary key
: significance level of the test for detecting a
watermark
: minimum number of correctly marked tuples
needed for detection
T: watermark
: attribute Value
n: number of tuples in the relation
w: number of tuples marked
1.
2.
COMPUSOFT, An international journal of advanced computer technology, 2 (5), May-2013 (Volume-II, Issue-V)
3.
IV.
CONCLUSION
REFERENCES
Watermark
Technique
for
Relational
Databases,Japan
Springer-Verlag
Berlin
Heidelberg 2010.
[6] S.A. Shah, Sun Xingming and Hamadou Ali , Query
Database
125
COMPUSOFT, An international journal of advanced computer technology, 2 (5), May-2013 (Volume-II, Issue-V)
Watermarking
relational
data:
framework,
algorithms and analysis. The VLDB Journal 12, 2
(Aug. 2003).
[11] Hossein Moradian Sardroudi, Subariah Ibrahim,
126