期刊文献+

一种基于关系数据库数值型属性特征的公开水印算法

A Public Watermarking Algorithm Based on Numerical Attribute Characters of Relational Database
在线阅读 下载PDF
导出
摘要 通过在关系型数据库中所嵌入的版权信息,从而实现数据库的版权保护。结合现有的关系型数据库水印算法基础上,引入混沌随机序列和哈希函数的方法,提出了一种在数据库中嵌入具有实际意义的水印信息的算法,该方法所嵌入的水印信息具有保密性强、能盲提取等特征。理论分析和仿真试验表明了该方法的有效性和可行性。 Ownership protection of a relational database is implemented, by embedding the ownership information into a relational database. By improving the current watermarking algorithms of relational database and introducing chaotic sequence and Hash function, a algorithm for embedding a string of bits into a relational database is proposed. The algorithm makes watermarking information hold the characters of secrecy and blind extraction. Theoretic analysis and emulated results verify the effectiveness and feasibility of the proposed method.
出处 《科学技术与工程》 2005年第22期1724-1727,共4页 Science Technology and Engineering
基金 国家自然科学基金(60373062) 教育部科研(03092) 湖南省杰出中青年基金(02JJYB012)资助
关键词 数据库水印 数值型属性 混沌随机序列 database watermarking numerical attribute chaotic random sequence
  • 相关文献

参考文献8

  • 1[1]van Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark.In: International Conference on Image Processing, 1994; (2):86-90
  • 2孙锬锋,温泉,王树勋.基于人类视觉的混沌阵列在图像上的水印算法[J].电子学报,2003,31(1):149-153. 被引量:30
  • 3[3]Zhang Zhihao, Jin Xiaoming, Wang Jianmin, Li Deyi.Watermarking relational database using image. Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference, 2004;03(08):26-29
  • 4王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 5[5]萨师煊,王珊.数据库系统概论.北京:高等教育出版社,1990
  • 6牛夏牧,赵亮,黄文军,张慧.利用数字水印技术实现数据库的版权保护[J].电子学报,2003,31(z1):2050-2053. 被引量:70
  • 7[7]Agrawal R, Kiernan J. Watermarking relational databases.Proceeding of the 28th VLDB Conference, Hong Kong, China,2002:155-166
  • 8[8]Mikhail R S, Prabhakar S. Rights protection for relational data.Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data San Diego. California: ACM SIGMOD ,2003:98-109

二级参考文献17

  • 1萨师煊 王珊.数据库系统概论[M].北京:高等教育出版社,1990..
  • 2[6]B Schneier. Applied Cryptography [ M]. USA: John Wiley & Sons, Inc.1996.
  • 3[7]Radu Sion, Mikhail Atallah, Sunil Prabhakar. On watermarking numeric sets [ A]. Proceedings of the Workshop on Digital Watermarking [ C ].USA: IWDW. 2002.
  • 4[1]Stefan Katzenbeisse, Fabien A P Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking [ M ]. Boston, London: Artech House, 1999.
  • 5[3]Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases[A]. Proceeding of the 28th VLDB Conference [ C]. Hongkong, China:28 VLDB, 2002.
  • 6[4]Radu Sion, Mikhail Atallah, Sunil Prabhakar. Rights protection for relational data [ A ]. Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data San Diego [ C ]. California: ACM SIGMOD,2003.98- 109.
  • 7[5]M Atallah, S Wagstaff. Watermarking with quadratic residues [ A ].Proc. of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents [ C]. USA:SPIE, January 1999.
  • 8Wu CF, Hsieh WS. Digital watermarking using zerotree of DCT. IEEE Trans. on Consumer Electronics, 2000,46(1):87-94.
  • 9Kutter M, Petitcolas FAP. Fair evaluation methods for image watermarking system. Journal of Electronic Imaging, 2000,9(4): 445-455.
  • 10Nikolaidis A, Pitas I. Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. on Image Processing, 2003,12(5):563-571.

共引文献145

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部