期刊文献+

一种合谋安全的数据库指纹编码与盗版追踪算法 被引量:2

Novel Algorithm of Collusion Secure Fingerprint Coding and Traitor Tracing for Relational Database
下载PDF
导出
摘要 在将数据库作为软件产品发行的应用场合,需要有相应的安全机制对叛逆用户的盗版行为进行约束。本文提出了一种基于数字指纹的关系数据库盗版追踪解决方案。以混沌二值序列将版权水印与用户指纹组合而成数据库指纹,在密钥的控制下嵌入数据库。基于混沌二值序列的随机性进行指纹提取与叛逆追踪。方案具有较高的合谋安全性,同时降低了指纹检测与叛逆追踪的运算复杂度。文中描述了数据库指纹编码与嵌入、指纹检测与提取算法,分析了算法的鲁棒性与叛逆追踪能力,并进行了实验验证。 It is necessary to provide secure mechanism to resist the piracy from the renegade users when databases are distributed as software products. In this paper, a scheme of traitor tracing for rational database based on digital fingerprinting is presented. In the proposed scheme, the database fingerprints are composed of copyright watermarks and us er's fingerprints by using the chaos binary sequence, and are embedded into the database under the control of the secret key. The fingerprints are extracted and the traitors are traced based on the randomicity of the chaos binary sequence. This scheme is collision secure and computationally simplified. The algorithms of the fingerprint coding, embedment, de tection and extraction are described. The robustness and the traitor tracing performance of the algorithms are analyzed theoretically as well as validated practically by experiments.
出处 《计算机科学》 CSCD 北大核心 2008年第8期252-257,共6页 Computer Science
基金 江苏省社会发展科技计划(BS2006524) 江苏省高校自然科学研究计划(05KJD520168)
关键词 关系数据库 数字指纹 合谋安全 叛逆追踪 Relational database,Digital fingerprinting, Collusion security,Traitor tracing
  • 相关文献

参考文献13

  • 1Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Trans. on Image Processing, 1997,6(12) : 1673-1687.
  • 2Boneh D, Shaw J. Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Information Theory, 1998,44:1897-1905.
  • 3Ferrer J D,Joancomarti J H. A Simple Collusion-Secure Fingerprinting Schemes for Images//Proceedings of the IEEE International Symposium on Information Technology:Coding and Computing (ITCC 2000). 2000 : 128-132.
  • 4Zane F. Efficient watermark detection and collusion security//LNCS 1962. Springer-Verlag, 2001 : 21-32.
  • 5Trappe W, Wu M, Wang Z J, et al. Anti-collusion Fingerprinting for Multimedia. IEEE Trans. Signal Processing, 2003,51:1069- 1087.
  • 6Yoshioka K, Shikata J, Matsumoto T. A Method of Database Fingerprinting//The 2004 Workshop on Information Security Research. 2004.
  • 7Constantin C, Gross-Amblardet D, Guerrouani M. Watermill : anOptimized Fingerprinting Tool for Highly Constrained Data// ACM Workshop on Multimedia and Security (MMSec). NewYork, USA, August 2005 : 143-155.
  • 8Li Yingjiu, Swarup V. Fingerprinting Relational Databases -Schemes and Specialties. IEEE Transaction on Dependable and Secure Computing, 2005,2 (1) : 34-45.
  • 9Agrawal R,Kiernan J. Watermarking Relational Databases//The 28th VLDB Conference. Hong Kong, China, 2002.
  • 10王彦,吕述望,徐汉良.一种二进制数字指纹编码算法[J].软件学报,2003,14(6):1172-1177. 被引量:15

二级参考文献1

  • 1An Ping LIAO,Zhong Zhi BAI Department of Mathematics. Hunan University. Changshu, 410082. P. R. China Department of Mathematics and Information Science, Changsha University, Changsha 410003. P. R. China Academy of Mathematics and System. Sciences. Chinese Academy of Sciences. Beijing 100080. P. R. China State Key Laboratory of Scientific/Engineering Computing. Chinese Academy of Sciences. Institute of Computational Mathematics and Scientific/Engineering Computing. Academy of Mathematics and System Sciences. Chinese Academy of Sciences. P. O. Box 2719. Beijing 100080. P. R. China.The Constrained Solutions of Two Matrix Equations[J].Acta Mathematica Sinica,English Series,2002,18(4):671-678. 被引量:41

共引文献14

同被引文献10

  • 1Li Y,Swarup V,Jajodia S.Constructing a Virtual Primary KeyforFingerprinting Relational Data. Proc.of Digital RightsManagement Workshop .2003.
  • 2Y. Li, V. Swarup, S. Jajodia. Fingerprinting Relational Databases:Schemes and Specialties [J]. IEEE Transactions on Dependable and SecureComputing,2005,12(1):34-45.
  • 3Lintian Qiao,Klara Nahrstedt.??Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Rights(J)Journal of Visual Communication and Image Representation . 1998 (3)
  • 4Yingjiu Li,Vipin Swarup,Sushil Jajodia.Fingerprinting Relational Databases: Schemes and Specialties. IEEE Transactions on Dependable and Secure Computing . 2005
  • 5Nasir Memon,Ping Wah Wong.A buyer-seller watermarking protocol. IEEE Transactions on Image Processing . 2001
  • 6Li Y,Swarup V,Jajodia S.Constructing a Virtual Primary Keyfor Fingerprinting Relational Data. Proc.of Digital RightsManagement Workshop . 2003
  • 7B.Pfitzmann,Michael Waidner.“Anonymous fingerprinting,”. Advances in Cryptology-EUROCRYPT’97 . 1997
  • 8J.Camenisch.Efficient anonymous fingerprinting with group signatures. ASIACRYPT 2000 . 2000
  • 9咸鹤群.机密数据库泄漏源检测与量化评估方案[J].计算机学报,2009,32(4):721-729. 被引量:3
  • 10王彦,吕述望,徐汉良.一种二进制数字指纹编码算法[J].软件学报,2003,14(6):1172-1177. 被引量:15

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部