Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Aug 2010
04-08-2010, 02:48 PM

Hi this is veeru from hyderabad, im doing project and implimentation on "WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION TECHNIQUES".. If u have the code and documentation of this project and implimentation once call me or send me to my mail badri.csit58@gmail.com.. i want it urgent..My mobile number is 9399977111..
Active In SP

Posts: 153
Joined: Aug 2010
05-08-2010, 07:03 PM

visit this thread for more information. The download link to the IEEE base paper is also provided with it.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
08-10-2010, 11:13 AM

.pdf   Cluster based watermarking technique for relation database.pdf (Size: 331.86 KB / Downloads: 81)
Cluster-Based Watermarking Technique for Relational Database

Kaiyin Huang
School of Economics & Management, South China
Normal University, PRC (510631)
GuangZhou, China

Min Yue , Pengfei Chen, Yanshan He ,
Xiaoyun Chen
School of Information Science & Engineering, Lanzhou
University, PRC (730000)
LanZhou, China


Database watermarking is an efficient method for database security. This paper proposes a cluster-based database watermarking technique which first applies cluster theory to the database watermarking technology. The cluster theory is used to cluster the source data and the clustering results determine the quantity of embedded watermark information and embedded position. This method makes the watermark information more disperse and hidden. This paper also introduces an odd-even modifying method to denote the watermarking information to decline the modification of original database. The results of experiment show this technique has a good performance on invisibility and is able to defend all kinds of subset attacks.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  eye movement based human computer interaction techniques ppt jaseelati 0 402 23-12-2014, 03:56 PM
Last Post: jaseelati
  Test case Reduction-An Experimental Analysis through Coverage Techniques seminar addict 1 705 18-03-2014, 02:37 PM
Last Post: Guest
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 50 30,817 22-10-2013, 03:28 PM
Last Post: Guest
  Ant Colony Optimization PPT seminar projects maker 0 343 26-09-2013, 04:22 PM
Last Post: seminar projects maker
  IMAGE ADAPTIVE & FRAGILE WATERMARKING ppt seminar projects maker 0 438 14-09-2013, 12:44 PM
Last Post: seminar projects maker
  Radiation optimization and image processing algorithms in the identi- fication study tips 0 291 20-08-2013, 04:28 PM
Last Post: study tips
  Embedded Palm Device For Guiding Applications Using ARM-7 and RFID Techniques. seminar paper 1 1,019 12-08-2013, 11:07 PM
Last Post: tamilarasi.k
  Implementation of Heterogeneous and Homogenous Distributed Databases Report study tips 0 332 31-07-2013, 12:48 PM
Last Post: study tips
  Report on Digital Watermarking study tips 0 355 20-07-2013, 04:12 PM
Last Post: study tips
  Intrusion Detection Techniques for Mobile Wireless Networks pdf study tips 0 334 16-07-2013, 04:52 PM
Last Post: study tips