id="info"

Review on Data Leakage Detection

In this paper, the authors present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. They formulate the watermarking of relational database as a constraint optimization problem and discuss efficient techniques to solve the optimization problem and handle the constraint. They study the following problem proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In this paper, they present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data.

Provided by: International Journal of Engineering Research and Applications (IJERA) Topic: Data Management Date Added: Dec 2011 Format: PDF

Find By Topic