期刊文献+

基于扩展的Asmuth-Bloom体系的数据库水印算法 被引量:3

Watermarking algorithm of database based on expanded Asmuth-Bloom scheme
下载PDF
导出
摘要 Asmuth-Bloom体系是一种基于中国剩余定理的密钥分存门限方案。将Asmuth-Bloom体系思想应用于数据库水印算法,可以使水印具有好的安全性和抗子集攻击能力。但是,该算法对水印信息的分存处理,扩张了水印数据,相对减少了数据库可容纳水印信息量。将Asmuth-Bloom体系思想加以扩展,调整参数取值,不仅使水印具有很好的安全性和抗子集攻击能力,能够基于部分数据恢复水印信息,而且水印数据扩张大量减少,可嵌入的水印信息量大量增加,算法性能进一步提高。在数据库的版权保护中,该算法具有很好的应用价值。 Asmuth-Bloom scheme is a sharing secret algorithm based on Chinese remainder theorem.Using Asmuth-Bloom scheme in a database watermark can make the algorithm have a good effect of hiding and resisting subset attack.But,sharing watermark expands the watermark data and reduces the information capacity of the database.By expanding Asmuth-Bloom scheme and adjusting the parameters'value,this algorithm has a good effect of security and resisting subset attack,embedded information increases,and the performance improves much.In protecting the copyright of database,this algorithm has good application.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第7期179-181,共3页 Computer Engineering and Applications
基金 湖南省教育厅自然科学基金项目(No.05C408) 湖南省自然科学基金(the Natural Science Foundation of Hunan Province of China un-der Grant No.06JJ5116)
关键词 数字水印 数据库水印 关系数据库 密钥分存 Asmuth—Bloom体系 digital watermarking database watermark relational database sharing secret Asmuth-Bloom scheme
  • 相关文献

参考文献8

  • 1陈明奇,钮心忻,杨义先.数字水印的研究进展和应用[J].通信学报,2001,22(5):71-79. 被引量:107
  • 2Agrawal R,Kiernan J.Watermarking relational databases[C]//Proceeding of the 28^th VLDB Conference,Hong Kong,China,2002:155-156.
  • 3张桂芳,孙星明,肖湘蓉,彭沛夫.基于中国剩余定理的数据库水印技术[J].计算机工程与应用,2006,42(7):135-136. 被引量:7
  • 4Shamir A.How to Share a secret[J].Communications of the ACM,1979,24(11):612-613.
  • 5Blakley G R.Safeguarding cryptographic keys[C]//Proceedings of the National Computer Conference,1979,American Federation of Information Processing Societies,1979,48:313-317.
  • 6Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
  • 7彭沛夫,林亚平,张桂芳,胡斌.基于有效位数的数据库数字水印[J].计算机工程与应用,2006,42(11):166-168. 被引量:9
  • 8Atallah M,Wagstaff S.Watermarking with quadratic residues[C]//Proc of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents,USA:SPIE,January 1999.

二级参考文献24

  • 1牛夏牧,赵亮,黄文军,张慧.利用数字水印技术实现数据库的版权保护[J].电子学报,2003,31(z1):2050-2053. 被引量:69
  • 2Zhao J,Commun ACM,1998年,41卷,7期,67页
  • 3Podilchuk C I,IEEE J Select Areas Commun,1998年,16卷,4期,525页
  • 4KOC H E,Proc 1995 IEEE Workshopon Nonlinear Signal and Image Processing,1995年
  • 5Ingemar J Cox,Matthew L Miller,Jeffrey A Bloom.Digital Watermarking[M].电子工业出版社,2003 -07
  • 6R Agrawal,P J Hass,J Kiernan.Watermarking Relational Databases[C].In:28th Int'l Conference on Very Large Databases,Hong Kong,2002-08
  • 7R Sion,M Atallah,S Prabhakar.On watermarking numeric sets[C].In:Proceedings of IWDW 2002,Lecture Notes in Conputer Science,CERIASTR 2001-60,Springer-Verlag,2002
  • 8A Shamir.How to Share a Secret[J].Commun ACM,1979;22(11):612~613
  • 9N Komatus,H Tominaga.Authentication System Using Concealed Images in Telematics[J].Memoirs of the School of Science and Engineering,Waseda University,1988,52:45~60
  • 10K Tanaka,Y Nakamura,K Matsui.Embedding secret information into a dithered multi-level image[C].In:Proc of 1990 IEEE Military Communications Conference,1990:216~220

共引文献115

同被引文献24

  • 1张宇,刘挺,陈毅恒,赵世奇,李生.自然语言文本水印[J].中文信息学报,2005,19(1):56-62. 被引量:51
  • 2钮心忻.信息隐藏与数字水印的研究及发展[J].计算机教育,2005(1):22-24. 被引量:17
  • 3Cox I J,Miller M L.The first 50 years of electronic watermarking[J].Journal of Applied Signal Processing,2002,2:126-132.
  • 4Brassil J T,Low S,Maxemchuk N F.Copyright protection for the electronic distribution of text documents[J].Proceedings of the IEEE,1999,87(7).
  • 5Low S H,Fmaxemchuk N,Lapone A M.Document identification for copyrisht protection for copyright protection using eentrnid detection[J].IEEE Transactions on Communications,1998,46(5):372-383.
  • 6Atallah M J,Raskin V,Hempelmann C,et al.Natural language watermarking and tamperproofing[J].lnformation Hiding,2002:196-212.
  • 7Collberg C, Thomborson C, Townsend G; Dynamic Graph-basedSoftware Fingerprinting[J]. ACM Transactions on Programming Languages and Systems, 2007, 29(6): 35-102.
  • 8Asmuth C, Bloom J. A Mokular Approach to Key Safeguarking[J]. IEEE Transactions on Information Theory, 1983, 29(2): 208-210.
  • 9Palsberg J, Krishnaswamy S, Kwon M, et al. Experience withSoftware Watermarking[C]//Proc. of the 16th Annual ComputerSecurity Applications Conference. Washington D. C., USA: IEEE Computer Society, 2000:308-316.
  • 10辛友强,刘东苏.一种基于汉字特征和语义的文本数字水印算法[J].计算机应用,2007,27(B12):134-135. 被引量:10

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部