Data Management

Review on Data Leakage Detection

Date Added: Dec 2011
Format: PDF

In this paper, the authors present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. They formulate the watermarking of relational database as a constraint optimization problem and discuss efficient techniques to solve the optimization problem and handle the constraint. They study the following problem proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In this paper, they present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data.