Implementation Of Invisible Watermarking Technique In Relational Database

Research Article
Radha R., Siva Sankari K and Sri Devi S
DOI: 
xxx-xxxxx-xxxx
Subject: 
science
KeyWords: 
watermark embedding, edge detection authentication, data extraction and robustness
Abstract: 

Watermarking is a recognizable pattern used to identify authenticity and it’s main aim is to maintain the ownership of relational database. WATERMARKING, without any exception, has been used for ownership protection of a number of data formats like images, video, audio, software, XML documents, geographic information system (GIS) related data, text documents, relational databases and so on and also that are used in different application domains .In this paper, we are applying watermarking techniques for relational database. As a result of it, sharing of data between its owners and legitimate users becomes secure. The watermarking technique is applied for only a particular set of data and make it difficult to identify watermarked content from hackers and it also reduce the number of tuples to be watermarked.