Reference Hub3
Data Protection Using Watermarking in E-Business

Data Protection Using Watermarking in E-Business

Alexander P. Pons, Hassan Aljifri
Copyright: © 2003 |Volume: 14 |Issue: 4 |Pages: 13
ISSN: 1063-8016|EISSN: 1533-8010|ISSN: 1063-8016|EISBN13: 9781615200603|EISSN: 1533-8010|DOI: 10.4018/jdm.2003100101
Cite Article Cite Article

MLA

Pons, Alexander P., and Hassan Aljifri. "Data Protection Using Watermarking in E-Business." JDM vol.14, no.4 2003: pp.1-13. http://doi.org/10.4018/jdm.2003100101

APA

Pons, A. P. & Aljifri, H. (2003). Data Protection Using Watermarking in E-Business. Journal of Database Management (JDM), 14(4), 1-13. http://doi.org/10.4018/jdm.2003100101

Chicago

Pons, Alexander P., and Hassan Aljifri. "Data Protection Using Watermarking in E-Business," Journal of Database Management (JDM) 14, no.4: 1-13. http://doi.org/10.4018/jdm.2003100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the past decade, the business community has embraced the capabilities of the Internet for a multitude of services that involve access to data and information. Of particular concern to these businesses have been the protection and authentication of digital data as it is distributed electronically. This paper proposes a novel approach that combines the reactive rule-based scheme of an active database management system (ADBMS) with the technology of digital watermarking to automatically protect digital data. The ADMBS technology facilitates the establishment of Event-Condition-Action (ECA) rules that define the actions to be triggered by events under certain conditions. These actions consist of the generation of unique watermarks and the tagging of digital data with unique signatures. Watermarking is a technology that embeds, within the digital data’s context, information identifying its owner and/or creator. The integration of these two technologies is a powerful mechanism for protecting digital data in a consistent and formal manner with applications in e-business in establishing and authenticating the ownership of images, audio, video, and other digital materials.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.