answersLogoWhite

0


Best Answer

I don't believe this to be possible. Watermarking a data set intrinsically alters the data such that the original data cannot be recovered without knowing what the original data set was, or what pattern generated the data set. Knowing either of these would defeat the purpose of watermarking.

Watermarking is commonly used in steganography, a technique used to encrypt a payload (the watermark) within an image (the carrier). However the image is altered in such a way that while the payload can be extracted with suitable software, the original image cannot be reconstructed.

For example, the steganographer may take a 24-bit image and adjust the least significant bit of all the blue elements (every 3rd byte) to embed the watermark. An image containing 1,000 pixels could therefore be used to encrypt a 1000-bit watermark. This means that some or all of the blue elements will be changed, however the changes are so slight that anyone viewing the image is unlikely to notice the difference without having access to the original image (which they won't since that is the image the watermark is intended to protect). The payload is therefore hidden in plain sight. Even if the payload is detected and altered, it is unlikely those alterations will reproduce the original image, thus making it obvious the watermark has been tampered with. Obfuscating the payload with compression wouldn't alter the fact you retained copyright over the original uncompressed, non-watermark image, which the tamperer will not, thus proving your ownership of the original image.

But doing the same with a data pattern, perhaps be altering the least significant bit of every 3rd byte, will intrinsically alter the pattern thus making it obvious there is a payload present (because the pattern is destroyed) but ultimately rendering the data set itself completely useless because the pattern is no longer recoverable.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: You just want to make a software that can watermark numeric datasets through pattern generation technique but you don't have any idea what types of patterns can be generated for numeric datasets?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Why does a double-bar graph have a key?

Without it you would not know which bars refer to which datasets.


What are the diadvantages of using excel?

No relational linkages, long calculation times with long datasets.


Data Sanitization services?

Data Sanitization involves the secure and permanent erasure of sensitive data from datasets and media.


Difference between NON-vsam datasets and vsam datasets?

VSAM files are used when we want to store data based on some key fields(Eg: KSDS) access method is indexed. NON VSAM files like PS are used when we want to store data which is not unique and also the access is sequential.


What is geographic dataset?

A geographic dataset is a collection of geographic data that represents real-world features, such as roads, rivers, buildings, or elevation. These datasets can be used in geographic information systems (GIS) to analyze and visualize spatial relationships and patterns for various applications such as urban planning, natural resource management, and disaster response.


What is the relationship between two data sets when one data set of data values increases while the other decreases?

There is an inverse relationship between the datasets.


What has the author Thomas E Rymer written?

Thomas E. Rymer has written: 'Micromap -- a database retrieval and display manager for microcomputers' 'Data management for large volume datasets'


What would be considered as an individual identifier?

Anything that can be used to identify you. Your name is an individual identifier. Equally, in some datasets, individuals are assigned numbers that can be used to identify them. Individual identifiers are useful because they allow you to cross-reference datasets against each other to find out more information about the people in them. They are a problem, ethically, because in the event private data about an individual are attached to an identifier and that individual comes to be known, then that person's privacy is compromised.


What has the author Sue A Lindgren written?

Sue A. Lindgren has written: 'Linking uniform crime reporting data to other datasets' -- subject(s): Computer networks, Criminal statistics, Data processing


How can you justify that a DBMS is better to use than Flat-file database?

A DBMS offers quicker access to the data within the database, particularly with larger datasets. It also makes updates to the data easier.


What are the general income requirements to be eligible for section 8?

Income requirement limits vary by state for eligibility. Open the following site and click on your state for the correct limits: www.huduser.org/datasets/il/il09/index.html.


Where does bhalla get the data for his analysis?

Bhalla gathers data from a variety of sources such as official reports, academic studies, surveys, and publicly available datasets. He may also conduct his own research or obtain data through partnerships with other organizations.