|Sivasri S, Parthiban R
|Related article at Pubmed, Scholar Google|
Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering
Nowadays, the use of the internet triumph over its wider enhancement. The file transferring and sensitive data transferring through internet also increases. At the time of file transferring intruders may hack the file and tries to read the sensitive data .In order to prevent sensitive data and to provide security to the sensitive data watermark technique is used. Watermark technique, which means the hiding data from the external users. In another encrypting and decrypting the data. In this survey paper it explains about the watermark technique, and how it is used in various field to protect the sensitive data from the intruders. This paper explains about the technique that is used to prevent the sensitive data using watermark technique.
|watermark technique, authentication, security, cryptography, digital watermarking.|
|In recent days, the rapid rising of internet leads development in file transfer or data distribution. To provide security to those sensitive data the watermark technique is used. Digital watermarking is a kind of watermark technique used to hide a small amount of digital data in a digital signal in such a way that it can‟t be detected by a standard playback device or viewer. Digital watermarking can embed an indelible and invisible „message‟ into both the image and the audio track of the motion picture as it passes through the server. In this paper it explains about, how the secured watermark technique is used for jpeg images to prevent sensitive data leakage. This survey paper also explains about the digital video watermarking. Digital video watermarking is one of the rising technology, that is used for the purpose of copyright fortification of the digital media. This survey paper explains about the watermark algorithm, which is used for the purpose of image authentication. This paper mainly concentrates on the copyright protection ,replication and Authentication of sensitive content.|
|In this section ,the survey papers focuses on the various watermarking technique.this reference paper explains about the video piracy. It focuses on the video watermarking. Watermarking is one of the vital role in prevention of copyright. It needs to design the robust watermarking video for precious purpose. The components that are involved in the methodologies are watermark embedding, attack, and watermark detection. The watermark embedding consists of the signal called the watermark signal that is generated to embed along with the original signal, to generate the watermark signal. After embedding of the signal the water mark content can be subjected to any type of attacks. At the time of watermark detection, detector consists of the test signal ,that can be watermarked. The methodologies used in this are correlation based method, discrete Fourier transform, single value decomposition, principle component analysis, Discrete wavelet transform. This paper solves the video piracy problem. Its deals with the security measures, privacy problem and anonymity challenges in legal peer-to-peer content distribution. The security issues of peer to peer is discussed in this survey paper. Its concentrates on the mechanisms that is used to encounter the challenges in peer-to-peer context distribution system. The mechanisms for security includes that the encryption and digital rights management in it. It also includes digital watermarking and trust management in it.|
|This survey paper needs to improve the efficiency. Strategic solutions for the problem of addresses have been given, when it have security issues in peer-to-peer network.This paper describes the digital watermarking. The classification of digital watermark includes the robust fragile. In the robust it consists of the sign copyright information. Fragile is used for the purpose of integrity protection. Along with the fragile ,the semi fragile is used to change the watermarked image. It discuss about the concept of image watermarking, video watermarking, text watermarking, and graphic watermarking. The purpose of this paper is to provide the copyright protection watermarking, and to provide tampering tip watermarking. It also discuss about the requirement of digital watermarking, which includes robustness, security, capacity, imperceptibility, modification and multiple watermarks inevitability.This survey paper deals with the method of verification, that is verifying the relational database. It discuss about the image watermark embedding algorithm. In the image watermarking embedding algorithm it consists of the components of embedded scale, key, ownership images, original RDB. After the completion of the image watermarking embedding algorithm, the image watermark extracting algorithm is used. Thus, this paper deals with the verification of relational database.This paper discuss about the integrity of the relational data and to provide the copyright protection. It discusses the types of attack. Initially, the value modification attack. In the value modification attack it includes that the bit attack. Bit attack performed randomly called as randomization. Flipping a value includes that the rounding attack, transformation and subset attack. It also discuss about the watermarked based numerical data type attribute. It discuses about the speech as the form of watermark information and genetic algorithm based watermark signal. This reference paper explains about the watermark based on categorical data type attributes. It discusses about the watermarked based on the tuple. In the watermark based on tupule it consists of fake tuple in the form of watermark information and virtual attribute. of watermark ..|
|In this paper our proposed system includes watermark technique . The importance of proposed paper is to provide security and to find sensitive data leaker. A data distributor(user) has given the sensitive data to other trusted party, with intentional or unintentional those sensitive data are leaked and accessed by unauthorized person .To avoid unauthorized accessing, watermark technique is used to find the data leaker. Watermark technique is used to send the alert message to distributor through email , when data is accessed by unauthorized user. Proposed data allocation strategies (across the agents) that improve the probability of identifying leakages. In some cases , fake data records are used to improve the chances of detecting leakage and identifying the guilty party(data leaker).|
 A Survey on Various Digital Video Watermarking Schemes.
[3 ]Rakesh Kumar1 and Savita Chaudhary “Video Watermarking Using Wavelet Transformation” International Journal of Computer Trends and Technology (IJCTT) - volume4 Issue5–May 2013.
 A survey on security, privacy and anonymity, in legal distribution of copyrighted multimedia content over peer-to-peer network.
 A survey of digital watermarking techniques, application and attacks.
 R.G. Schyndel, A. Tirkel, and C.F Osborne, ―A Digital Watermark‖, Proceedings of IEEE International conference on Image Processing, ICIP-1994, pp. 86-90, 1994.
 Christine I. Podilchuk, Edward J. Delp, ―Digital watermarking: Algorithms and applications‖, IEEE Signal processing Magazine, July 2001.
 Jiang Xuehua, ―Digital Watermarking and Its Application in Image Copyright Protection‖, 2010 International Conference on Intelligent Computation Technology and Automation.
 Ensaf Hussein, Mohamed A. Belal, ―Digital Watermarking Techniques, Applications and Attacks Applied to Digital Media: A Survey‖, IJERT, ISSN: 2278-0118, Vol. 1 Issue 7.
 Coatrieux, L. Lecornu, Members, IEEE, Ch. Roux, Fellow, IEEE, B. Sankur, Member, IEEE.
 A Review of digital image watermarking in health care‖.
 Edin Muharemagic and Borko Furht ―A Survey of watermarking techniques and applications‖ 2001.
 A method of verifying relational database ownership with image watermark ZHANG YONG
 Agrawal R, Kiernan J. Watermarking Relational Databases.In: Proceeding of the 28th VLDB Conference. HongKong: University of Science & Technology, Hong Kong,2002: 155-166.
 Sion R, Atallah M, Prabhakarl S. Watermarking RelationalDatabases. Technical Report. Indiana: the Center for Education and Research in Information Assurance and Security of Purdue University, 2002.
 Yong ZHANG, Xiamu NIU, Dongning ZHAO.2004, Amethod of protecting relational databases copyright withcloud watermark. International Conference of InformationTechnique, ICIT2004. Istanbul-Turkey, Dec.17-19, 2004.pp: 176-179.
 Bender W, Gruhl D, Morimoto N, Lu A. Techniques forData Hiding. IBM Systems Journal, 1996,35(3&4):313-336.
 Literature Survey on Distortion based Watermarking Techniques for Databases Ch. Arathi Department O fComputer Science and Engineering, Telangana University, Dichpally, Nizamabad, Andhra Pradesh, India, Pin 503322
 Abdel-Hamid et al., 2004] Abdel-Hamid, A. T., Tahar, S., and Aboulhamid, E. M. (2004). A survey on ip watermarking techniques. Design Automation for Embedded Systems, 9(3):211–227.
 Agrawal et al., 2003a] Agrawal, R., Haas, P. J., and Kiernan, J. (2003a). A system for watermarking relational databases. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data. (SIGMOD ‟03), pages 674–674, San Diego, California. ACM Press.
 [Agrawal et al., 2003b] Agrawal, R., Haas, P. J., and Kiernan, J. (2003b). Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12:157– 169.
 [Agrawal and Kiernan, 2002] Agrawal, R. and Kiernan, J. (2002). Watermarking relational databases. In Proceedings of the 28th international conference on Very Large Data Bases (VLDB ‟02), pages 155–166, Hong Kong, China. VLDB Endowment.
 [Agrawal and Srikant, 2000] Agrawal, R. and Srikant, R. (2000). Privacy-preserving data mining. ACM SIGMOD Record, 29(2):439– 450.
 [Al-Haj and Odeh, 2008] Al-Haj, A. and Odeh, A. (2008). Robust and blind watermarking of relational database systems. Journal of Computer Science, 4:1024–1029.
 [Bertino et al., 2005] Bertino, E., Ooi, B. C., Yang, Y., and Deng, R. H. (2005). Privacy and ownership preserving of outsourced medical data. In Proceedings of the 21st International Conference on Data Engineering (ICDE ‟05), pages 521–532, Tokyo, Japan. IEEE Computer Society.