2021
DOI: 10.21817/indjcse/2021/v12i5/211205166
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Database Watermarking With Distortion Control

Abstract: Database watermarking has emerged as an effective solution to protect ownership of relational databases. Unlike images and videos, watermark insertion in databases can cause distortion leading to loss of data quality. In this paper, we propose a reversible database watermarking technique with distortion control. Firstly, we need to select optimal attributes for applying difference expansion. Pearson Correlation Coefficient (PCC) is employed to find a pair of attributes with the highest correlation. This ensure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
1
0
Order By: Relevance
“…Among distortion-based techniques, there are schemes focused on returning the data to its original quality once the watermark is extracted. This subset of distortion-based technique is defined as reversible [50]- [52]. On the contrary, distortionfree techniques aim to preserve the integrity of the protected data [53], [54].…”
Section: Related Workmentioning
confidence: 99%
“…Among distortion-based techniques, there are schemes focused on returning the data to its original quality once the watermark is extracted. This subset of distortion-based technique is defined as reversible [50]- [52]. On the contrary, distortionfree techniques aim to preserve the integrity of the protected data [53], [54].…”
Section: Related Workmentioning
confidence: 99%
“…With the development of an efficient and precise algorithm for inserting watermarks in multimedia files, the comprehensive approach under which this work is presented allows us to evaluate the algorithm's efficiency in execution time and use of resources and to guarantee the precision of the inserted watermarks through visual evaluations and numerical metrics [9,10]. In addition, the algorithm's robustness is demonstrated by subjecting it to various attacks and evaluating its recovery and resistance capacity.…”
Section: Introductionmentioning
confidence: 99%