期刊文献+

Watermarking Data Cubes

Watermarking Data Cubes
原文传递
导出
摘要 We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications. We propose a robust watermarking scheme and several extensions for digital right management of data cubes. The ownership information is hidden into a data cube by modifying a set of selected cell values. Its owner can use his private key to control all the watermarking parameters freely. Neither original data cube nor the watermark is required in watermark detection. Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability, robustness and efficiency. Our results show that the scheme performs well in actual applications.
作者 郭捷 邱卫东
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期117-121,共5页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China(No.60703032) the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
关键词 data cube WATERMARKING digital right management ROBUSTNESS 数据立方体 水印检测 数字版权管理 信息隐藏 控制参数 可探测性 所有权 单元格
  • 相关文献

参考文献10

  • 1ATALLAH M.A survey of watermarking techniques for non-media digital objects(invited talk)[].ACSW Frontiers.2005
  • 2SION R.Resilient rights protection for sensor streams[].Proceedings of the th VLDB Conference.2004
  • 3Guo J,LI Y,DENG R,et al.Rights protection for data cubes[].Proceedings of the th ISC Conference.2006
  • 4BELLARE M,CANETTI R,KRAWCZYK H.Keyed hash functions and message authentication[].Proceedings of Crypto‘.1996
  • 5Katzenbeisser,S.,Petitcolas,F.A.P. Information Hiding Techniques for Steganography and Digital Watermarking . 2000
  • 6Cox,J.,Miller,M.L.,Bloom,J.A. Digital Watermarking . 2001
  • 7Rakesh A,Jerry K.Watermarking Relational Databases[C]∥Proceeding of the28th VLDB Conference[]..2002
  • 8C Collberg,C Thomborson.Software Watermarking:Models and Dynamic Embeddings[].ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language(POPL).1999
  • 9Mikhail J Atallah,Victor Raskin,Christian F,et al.Natural Language Water- marking and Tamperproofing.In: 5th International Information Hiding Workshop[].Berlin.2002
  • 10Li,Y.,Swarup,V.,Jajodia,S.Fingerprinting Relational Databases: Schemes and Specialties[].IEEE Transactions on Dependable and Secure Computing.2005

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部