A Reversible Watermarking Technique for Social Network Data Sets for Enabling Data Trust in Cyber, Physical, and Social Computing
Abstract—Social network data are being mined for extracting interesting patterns. Such data are collected by different researchers and organizations and are usually also shared via different channels. These data usually have huge volume because there are millions of social network users throughout the world. In this context, ownership protection of such data sets with huge volume becomes relevant. Digital watermarking is a more demanding solution than any other technique for ensuring rights protection and integrity of the original data sets. The objective of this project is to devise a reversible watermarking technique for the social network data to prove ownership rights and also provide a mechanism for data recovery. Robustness of the proposed technique is evaluated through two attacks (delete and insert) analysis using experimental study. In this project, Z notation-based formal specification is also provided to show the working of the proposed reversible watermarking technique for social network data sets for enabling data trust in Cyber, Physical, and Social Computing (CPSCom).
PROPOSED TECHNIQUE
The main architecture of the proposed technique is presented in below fig It includes the following four major phases: 1) pre-processing; 2) watermark encoding; 3) watermark decoding; and 4) data recovery.
The main architecture of the proposed technique is presented in below fig It includes the following four major phases: 1) pre-processing; 2) watermark encoding; 3) watermark decoding; and 4) data recovery.
Main architecture of the proposed technique.
The proposed technique handles big data in a systematic way with logical grouping. For instance, for nonnumerical/numerical data encoding, similar records for the same employees get hashed to same values and make logical groups; thus, the data size does not increase. Moreover, the data owner has more interest in acquiring ownership rights and data recovery. She gets her data watermarked only once, and watermarking is usually done offline; this is to say that it is done on the machine of the data owner and data are delivered to the recipient only after completing the embedding process. Thus, she can afford large computation time for providing ownership rights and data recovery. For datasets involving a large number of features or a large number of rows “Big Data,” the data owner may use a
separate machine, with high computation power, to watermark the datasets. This might incur some cost but gain the owner more security (false claim of ownership can be tackled by watermark encoding and decoding). The computational time of the proposed technique is (ω ∗ R ∗ F) where ω is the watermark length, R is the total number of tuples in the dataset, and F is the feature selected for watermarking. The number of tuples is usually much larger compared with the number of features in databases and the watermark length ω; hence, F R and ω R. Therefore, for large databases, (R termed as n) the time complexity of the proposed technique for watermark encoding and decoding is O(n) (it is worth mentioning here that the time for computing the GA-based optimal value is not included in this calculation because it is part of preprocessing.
Simulation Video Demo
thanks for sharing. nice post.IEEE Projects in Marthandam | IEEE Project Centre in Nagercoil
ReplyDelete