WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION BASED TECHNIQUES
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
avatar
Active In SP
**

Posts: 1
Joined: Aug 2010
#1
04-08-2010, 02:48 PM


Hi this is veeru from hyderabad, im doing project and implimentation on "WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION TECHNIQUES".. If u have the code and documentation of this project and implimentation once call me or send me to my mail badri.csit58@gmail.com.. i want it urgent..My mobile number is 9399977111..
Reply
Zigbee
Active In SP
**

Posts: 153
Joined: Aug 2010
#2
05-08-2010, 07:03 PM

Hi,
visit this thread for more information. The download link to the IEEE base paper is also provided with it.
topicideashow-to-watermarking-relational-databases-using-optimization-based-techniques
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#3
08-10-2010, 11:13 AM


.pdf   Cluster based watermarking technique for relation database.pdf (Size: 331.86 KB / Downloads: 80)
Cluster-Based Watermarking Technique for Relational Database



Kaiyin Huang
School of Economics & Management, South China
Normal University, PRC (510631)
GuangZhou, China

Min Yue , Pengfei Chen, Yanshan He ,
Xiaoyun Chen
School of Information Science & Engineering, Lanzhou
University, PRC (730000)
LanZhou, China


Abstract—

Database watermarking is an efficient method for database security. This paper proposes a cluster-based database watermarking technique which first applies cluster theory to the database watermarking technology. The cluster theory is used to cluster the source data and the clustering results determine the quantity of embedded watermark information and embedded position. This method makes the watermark information more disperse and hidden. This paper also introduces an odd-even modifying method to denote the watermarking information to decline the modification of original database. The results of experiment show this technique has a good performance on invisibility and is able to defend all kinds of subset attacks.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  eye movement based human computer interaction techniques ppt jaseelati 0 382 23-12-2014, 03:56 PM
Last Post: jaseelati
  Test case Reduction-An Experimental Analysis through Coverage Techniques seminar addict 1 705 18-03-2014, 02:37 PM
Last Post: Guest
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 50 30,676 22-10-2013, 03:28 PM
Last Post: Guest
  Ant Colony Optimization PPT seminar projects maker 0 332 26-09-2013, 04:22 PM
Last Post: seminar projects maker
  IMAGE ADAPTIVE & FRAGILE WATERMARKING ppt seminar projects maker 0 416 14-09-2013, 12:44 PM
Last Post: seminar projects maker
  Radiation optimization and image processing algorithms in the identi- fication study tips 0 284 20-08-2013, 04:28 PM
Last Post: study tips
  Embedded Palm Device For Guiding Applications Using ARM-7 and RFID Techniques. seminar paper 1 1,012 12-08-2013, 11:07 PM
Last Post: tamilarasi.k
  Implementation of Heterogeneous and Homogenous Distributed Databases Report study tips 0 324 31-07-2013, 12:48 PM
Last Post: study tips
  Report on Digital Watermarking study tips 0 339 20-07-2013, 04:12 PM
Last Post: study tips
  Intrusion Detection Techniques for Mobile Wireless Networks pdf study tips 0 329 16-07-2013, 04:52 PM
Last Post: study tips