A Novel approach for Hybrid Database

In the current world of economic crises, the cost control is one of the chief concerns for all types of industries, especially for the small venders. The small vendors are suppose to minimize their budget on Information Technology by reducing the initial investment in hardware and costly database servers like ORACLE, SQL Server, SYBASE, etc. for the purpose of data processing and storing. In other divisions, the electronic devices manufacturing companies want to increase the demand and reduce the manufacturing cost by introducing the low cost technologies. The new small devices like ipods, iphones, palm top etc. are now-a-days used as data computation and storing tools. For both the cases mentioned above, instead of going for the costly database servers which additionally requires extra hardware as well as the extra expenses in training and handling, the flat file may be considered as a candidate due to its easy handling nature, fast accessing, and of course free of cost. But the main hurdle is the security aspects which are not up to the optimum level. In this paper, we propose a methodology that combines all the merit of the flat file and with the help of a novel steganographic technique we can maintain the utmost security fence. The new proposed methodology will undoubtedly be highly beneficial for small vendors as well as for the above said electronic devices manufacturer

[1]  Lisa M. Marvel,et al.  A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[2]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[3]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[4]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[5]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[6]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[7]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[8]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[9]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[10]  Juan E. Tapiador,et al.  Steganography in games: A general methodology and its application to the game of Go , 2006, Comput. Secur..

[11]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .