期刊文献+

基于有效位数的数据库数字水印 被引量:9

Digital Watermarking for Database Based on Effective Digit
下载PDF
导出
摘要 根据关系数据库的特殊性,文章基于数值型字段值的有效位数,结合数字通信中的差错控制理论,提出了一种可以在关系数据库中嵌入具有实际意义字符串的数据库数字水印算法。理论分析和实验结果表明,该算法具有隐蔽性好,水印恢复不需要原始数据库,水印的鲁棒性及可嵌入的信息量可以通过调整参数取值进行调节等特点。该算法在数据库的版权保护中具有较好的应用前景。 This paper proposes a digital watermarking for relational databases algorithm,some significant character strings can be embedded into relational databases.This algorithm,which based on relational databases' character and the number of quantitative data's effective bits,combines with the theory of error correction in the field of digital communication.Theoretic analysis and experimental results show that this algorithm is good at hiding and it does not need the original databases in the recover progress,and also the robustness of watermark and the built-in information quantity can be adjusted by adjusting the value of parameter.This algorithm has a wide foreground in protecting the copyright of database.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第11期166-168,共3页 Computer Engineering and Applications
基金 湖南省自然科学基金资助项目(编号:03jjy3089)
关键词 数字水印 数据库水印 关系数据库 奇偶校验 差错控制 digital watermark, database watermark, relational databases, parity check, error control
  • 相关文献

参考文献14

  • 1陈明奇,钮心忻,杨义先.数字水印的研究进展和应用[J].通信学报,2001,22(5):71-79. 被引量:107
  • 2N Komatus,H Tominaga.Authentication System Using Concealed Images in Telematics[J].Memoirs of the School of Science and Engineering,Waseda University,1988,52:45~60
  • 3K Tanaka,Y Nakamura,K Matsui.Embedding secret information into a dithered multi-level image[C].In:Proc of 1990 IEEE Military Communications Conference,1990:216~220
  • 4K Matsui,K Tanaka.Video-steganography[J].IMA Intellectual Property Project Proceedings,1994, 1 (1):187~205
  • 5I J Cox,M L Miller.The First 50 Years of Electronic Watermarking[J].J of Applied Signal Processing,2002,2:126~132
  • 6张得民编.数据通信[M].北京:科学教书文献出版社,1997-08
  • 7黄继武,谭铁牛.图像隐形水印综述[J].自动化学报,2000,26(5):645-655. 被引量:90
  • 8I J Cox,J Killian,F T Leighton et al.Secure spread spectrum watermarking for multimedia[J],IEEE Transactions on Image Processing,1997 ,6(12):1673~1687
  • 9R Agrawal,P J Hass,J Kiernan.Watermarking Relational Databases[C].In:28th Int'l Conference on Very Large Databases,Hong Kong,2002
  • 10S Radu,A Mikhail,P Sunil.Rights Protection for Relational Data[C].In:SIGMOD Conference,2003, 18:551~562

二级参考文献47

  • 1孔繁荣,朱学骏,周骏马,张耕耘,陈受宜.北京地区性病高危人群泌尿生殖道沙眼衣原体感染调查[J].中华皮肤科杂志,1994,27(3):156-157. 被引量:15
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1240
  • 3萨师煊 王珊.数据库系统概论[M].北京:高等教育出版社,1990..
  • 4李长玲 吕建进 等.83077例性传播疾病分析[J].皮肤性病学杂志,1997,3:12-14.
  • 5陈罡.[D].南京:解放军理工大学,2003.
  • 6王秋生.[D].哈尔滨工业大学,2001-12.
  • 7[6]B Schneier. Applied Cryptography [ M]. USA: John Wiley & Sons, Inc.1996.
  • 8[7]Radu Sion, Mikhail Atallah, Sunil Prabhakar. On watermarking numeric sets [ A]. Proceedings of the Workshop on Digital Watermarking [ C ].USA: IWDW. 2002.
  • 9[1]Stefan Katzenbeisse, Fabien A P Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking [ M ]. Boston, London: Artech House, 1999.
  • 10[3]Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases[A]. Proceeding of the 28th VLDB Conference [ C]. Hongkong, China:28 VLDB, 2002.

共引文献272

同被引文献52

引证文献9

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部