large scale data transfer for dynamic exchange server

G.Pradheeba,S.Nirenjena

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:4         Issue:3         Year: 26 March,2016         Pages:468-476

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Showing proprietorships rights on outsourced social database is a direct issue in todays online application circumstances and in various substance dispersal applications. In this Project, we show a part for check of proprietorship in light of the safe embeddings of an intense unclear watermark in social data. In this proposed framework the source database is moved into another framework by taking after the strides. The source table is changed over into segment by joining numerous segments into single segment. The divided table is actualized into single piece encoding and after that the substance is scrambled by utilizing AES calculation. Presently the source framework moves the information into another framework. The server framework gets the substance and unscrambles it. The unscrambled content is decoded utilizing single piece interpreting. The substance is splited into numerous segments by utilizing reverse segment technique.

Kewords

Watermarking, Encoding, Decoding, AES

Reference

[1] Radu Sion, “Database Watermarking”, Network Security and Applied Cryptography LabComputer Science, Stony Brook University. [2] R. Agrawal and J. Kiernan, “Watermarking Relational Databases”, Proc. 28th Int’l Conf. Very Large Data Bases, 2002. [3] Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, and Siming Liu, “Relational Database Watermarking Technique Based on Content Characteristics”, Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC06) [4] Mitchell D. Swanson, Mei Koba Yashi and Ahmed H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies”, Proceedings of the IEEE VOL. 86, NO. 6, JUNE 1998 [5] Julien Lafaye, “An Analysis of Database Watermarking Security”, 0- 7695-2876 7/07 $25.00 © 2007 IEEE, Third