Abstract

Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. This type of system is non-intrusive, resilient, blind, reversible and suitable for databases of any size with reasonable performance on embedding and extraction. Ownership rights on outsourced relational database are extremely vital subject in today’s internet surroundings and in much content sharing request, because the rapid growth of the internet and related technologies offered an unprecedented ability to access and redistribute digital content. The genetic algorithm is an optimization and search technique based on the principles of genetics and natural selection. Proposed watermarking technique is flexible one to synchronize the error. The main aim of the paper to conquer the most important weakness in previously proposed watermarking techniques. Here threshold-based techniques are used in the watermarking decoding. Six type of cross over are implemented in the genetic algorithm. In order to find the effectiveness and feasibility for the proposed crossover operator, a comparison between the results of different crossover operators used in GA is made through a three type of attacks i.e., deletion attack, alteration attack, insertion attack with various levels. In this paper compare our proposed method with five different methods. From the experimental result it is clearly observed that the proposed method of ring crossover proves better result than existing method. Proposed method gives 100% accuracy even when up to 100% of the data set size tuples were altered, deleted and inserted

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call