Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Secure Digital Databases using Watermarking based on English-Character Attributes

Author(s): Khalaf Khatatneh*, Ashraf Odeh, Ashraf Mashaleh and Hind Hamadeen

Volume 13, Issue 3, 2020

Page: [477 - 481] Pages: 5

DOI: 10.2174/2213275912666190103142858

Price: $65

Abstract

Introduction: The single space and the double space (DS). In this procedure, an image is used to watermark a digital database, where the image bytes are divided into binary strings that block the text attributes of the selected database, we proposed an algorithm to defend against four common database attacks.

Objective: Perform the watermark is Embedding and makes extraction of the watermark. We also describe the principal of the Embedding and extraction the watermark.

Methods: The procedure to extract the watermark does not require knowledge of the original database that does not carry the same watermark. This feature is extremely important because it allows the discovery of a watermark in a copy of the original database, regardless of the subsequent updates to the asset. The extraction procedure is a direct reflection of the procedure used to embed the watermark is six steps.

Results: Using new algorithm ability to develop a database watermark that would make it difficult for an attacker to remove or change the watermark without discovering the value of the object. To be judged effective, the database algorithm had to be able to create a strong enough watermark that could sustain the security of the database in the face of the following four types of attack: deletion of a sub-dataset, addition of a sub-dataset.

Conclusion: The performance of the proposed algorithm was assessed in respect of its ability to defend the database against four common attacks for all tuples selection.

Keywords: Digital databases, copyright, watermark, algorithm, extraction procedure, asset.

Graphical Abstract
[1]
Y. Perwej, F. Parwej, and A. Perwej, "An adaptive watermarking technique for the copyright of digital images and digital image protection", The International Journal of Multimedia & Its Applications (IJMA), vol. 4, no. 2, April 2012.
[http://dx.doi.org/10.5121/ijma.2012.420221]
[2]
A. Bamatraf, R. Ibrahim, and M.N. Salleh, "Digital watermarking algorithm using LSB", Computer Applications and Industrial Electronics (ICCAIE), pp. 155-159, December 2010.
[3]
F. Rahman, and N.N. Mandaogade, "Digital audio watermarking techniques with musical audio feature classification", Int. J. Curr. Eng. Technol., vol. 4, no. 5, October 2014.
[4]
S. Aljawarneh, and M.B. Yassein, "A resource-efficient encryption algorithm for multimedia big data", Multimedia Tools Appl., vol. 76, no. 21, pp. 22703-22724, 2017.
[5]
S.A. Aljawarneh, A. Alawneh, and R. Jaradat, "Cloud security engineering: Early stages of SDLC", Future Gener. Comput. Syst., vol. 74, pp. 385-392, 2017.
[6]
S.S. Kshatriya, and S.S. Sane, "A study of watermarking relational databases", Int. J. Appl. Innov. Eng. Manag. (IJAIEM), vol. 3, no. 10, October 2014. ISSN 2319–4847.
[7]
H. Rashidi, "A novel watermarking scheme for detecting and recovering distortions in database tables", Int. J. Database Manage. Syst. (IJDMS), vol. 2, no. 3, August 2010.
[8]
M.K. Rathva, and G.J. Sahani, "Watermarking relational databases", Int. J. Comput. Sci. Eng. Appl. (IJCSEA), vol. 3, no. 1, p. 71, February 2013.
[9]
S.A. Aljawarneh, R.A. Moftah, and A.M. Maatuk, "Investigations of automatic methods for detecting the polymorphic worms signatures", Future Gener. Comput. Syst., vol. 60, pp. 67-77, 2016.
[10]
S. Aljawarneh, "A web engineering security methodology for e-learning systems", Netw. Secur., vol. 2011, no. 3, pp. 12-15, 2011.
[11]
S. Iftikhar, M. Kamran, and Z. Anwar, "A survey on reversible watermarking techniques for relational databases", Secur. Commun. Netw., vol. 8, no. 15, pp. 2580-2603, 2015.
[12]
A. Rehman, and T. Saba, "Neural network for document image preprocessing artificial intelligence review", Artif. Intell. Rev., vol. 42, no. 2, August 2012b.
[http://dx.doi.org/10.1007/s10462-012-9337-z]
[13]
M.S. Rahim, T. Saba, F. Nayer, and A.Z. Syed, "3D texture features mining for mri brain tumor identification", 3D Res., vol. 5, no. 1, p. 3, 2014.
[http://dx.doi.org/10.1007/s13319-013-0003-2]
[14]
S. Aljawarneh, M. Aldwairi, and M.B. Yassein, "Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model", J. Comput. Sci., vol. 25, pp. 152-160, 2018.
[15]
S.A. Aljawarneh, and M.O. Yassein, "A conceptual security framework for cloud computing issues", Int. J. Intell. Inf. Technol. (IJIIT), vol. 12, no. 2, pp. 12-24, April 2016.
[16]
R. Halder, S. Pal, and A. Cortesi, "Watermarking techniques for relational databases: Survey, classification and comparison", J. Univers. Comput. Sci., vol. 16, no. 21, pp. 3164-3190, 2010.
[17]
A.S. Alfagi, A.A. Manaf, B.A. Hamida, S. Khan, and A.A. Elrowayati, "Survey on relational database watermarking techniques", ARPN J. Eng. Appl. Sci., vol. 11, no. 1, January 2016.
[18]
A. Robust, "Distortion minimizing technique for watermarking relational databases using once-for-all usability constraints", IEEE Trans. Knowl. Data Eng., vol. 25, no. 12, pp. 2694-2707, 2013.
[19]
A. Khan, and S.A. Husain, "A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations", Sci. World J., vol. 2013, 2013.
[20]
H.-I. Choi, T. wan Kim, S.-H. Kwon, H. Pyo, S.H. Park, H.-J. Shin, and J.-K. Sohn, "Digital watermarking of polygonal meshes with linear operators of scale functions", Comput. Aided Des., vol. 42, no. 3, pp. 163-172, March 2010.
[21]
S. Aljawarneh, "Cloud security engineering: Avoiding security threats the right way", Int. J. Cloud Appl. Comput. (IJCAC), vol. 1, no. 2, pp. 64-70, 2011.
[22]
S.A. Aljawarneh, R. Vangipuram, V.K. Puligadda, and J. Vinjamuri, "G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things", Future Gener. Comput. Syst., vol. 74, pp. 430-443, 2017.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy