International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 154 - Issue 6 |
Published: Nov 2016 |
Authors: Manoj Kumar, O. P. Verma, Archana Saxena |
![]() |
Manoj Kumar, O. P. Verma, Archana Saxena . Elliptic Curve Cryptography (ECC) based Relational Database Watermarking. International Journal of Computer Applications. 154, 6 (Nov 2016), 20-28. DOI=10.5120/ijca2016912159
@article{ 10.5120/ijca2016912159, author = { Manoj Kumar,O. P. Verma,Archana Saxena }, title = { Elliptic Curve Cryptography (ECC) based Relational Database Watermarking }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 154 }, number = { 6 }, pages = { 20-28 }, doi = { 10.5120/ijca2016912159 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Manoj Kumar %A O. P. Verma %A Archana Saxena %T Elliptic Curve Cryptography (ECC) based Relational Database Watermarking%T %J International Journal of Computer Applications %V 154 %N 6 %P 20-28 %R 10.5120/ijca2016912159 %I Foundation of Computer Science (FCS), NY, USA
Database Watermarking methods are used for copyright protection of relational database. Many techniques have been developed for watermarking multimedia digital assets like audio, video, text, images etc. But these methods are usually not applicable with numerical database, because to insert a watermark into a data, small error is created in data, called mark. An error in relational data is usually not acceptable, so a different approach need to be develop to create a mark into the numerical database. Many different approaches have been discussed in previous researches for relational database watermarking. In this paper a new approach has been introduced for relational database watermarking using Elliptic Curve Cryptography (ECC). It has been proofed that ECC provides more security with smaller key size in comparison with other encryption techniques. Proposed approach gives better results in subset deletion and selection attacks which have been compared with other methods.