期刊文献+

基于属性标记的关系数据库水印方法 被引量:1

Attributes Labeling Based Relational Database Watermarking Method
下载PDF
导出
摘要 数据库水印是保护数据库版权的一项重要技术。针对现有数据库水印方法无法抵抗有序关系模式变换攻击(ORSM)的问题,提出了一种基于属性标记的关系数据库水印方法。首先给出了有序关系模式变换攻击的定义,然后通过分析现有关系数据库水印算法无法抵抗ORSM攻击的问题,提出一种能够抵抗ORSM攻击的水印算法ALBWM,包括水印嵌入算法(ALBWM-EM)和水印检测算法(ALBWM-DT)。实验结果表明,与传统数据库水印算法相比,ALBWM算法在不影响性能的前提下对ORSM攻击具有更好的鲁棒性。 Database watermarking is an important technology mainly used for copyright protection for database. Given the fact that current database watermarking methods cannot resist ordered relation schema mutation (ORSM) attack, attributes labeling based relational database watermarking (ALBWM) algorithm is proposed. Firstly, the definition of ORSM attack is given. Then, through analyzing the fragileness of current watermarking methods under ORSM attack, ALBWM is introduced which includes watermark embed algorithm(ALBWM-EM) and watermark detect algorithm(ALBWMDT). Experimental results indicate that compared with the traditional watermarking algorithms, ALBWM has better robustness against ORSM attack and does not affect performance.
出处 《南京航空航天大学学报》 EI CAS CSCD 北大核心 2012年第4期580-586,共7页 Journal of Nanjing University of Aeronautics & Astronautics
基金 国家高技术研究发展计划("八六三"计划)(2007AA01Z404)资助项目 国家自然科学基金(60673127 60973139 61103195)资助项目 江苏省科技支撑计划(BE2008135 BE2010198 BE2011844 BE2011189)资助项目 国家教育部博士点基金(20103218110017)资助项目 南京邮电大学引进人才科研启动基金(NY211043)资助项目
关键词 数据库水印 版权保护 鲁棒性 有序关系模式变换攻击 database watermarking copyright protection robustness ordered relation schema mutation attack
  • 相关文献

参考文献18

  • 1Agrawal R, Kiernan J. Watermarking relational databases [C]//Proc of the 28th International Con- ference on Very Large Data Bases. Berlin Heidel- berg : Springer-Verlag Press, 2002 : 155-166.
  • 2Agrawal R, Haas P, Kiernan J. A system for water- marking relational databases [C]///Proceeding of the 2003 ACM SIGMOD International Conference on Management of Data. New York: ACM Press, 2003: 674-675.
  • 3Agrawal R, Haas P, Kiernan J. Watermarking rela- tional data: framework, algorithms and analysis [J]. The VLDB Journal, 2003, 12(2).. 157-169.
  • 4Guo Huiping, Li Yingjiu, Liu Anyi, et al. A fragile watermarking scheme for detecting malicious modifi- cations of database relations [J]. Information Sci- ences, 2006, 176(10): 1350-1378.
  • 5Li Yingjiu, Guo Huiping, Jajodia S. Tamper detec- tion and localization for categorical data using fragile watermarks[C]//Proc of the 4th ACM workshop on Digital Rights Management. New York: ACM Press, 2004: 73-82.
  • 6Prasannakumari V, Balu V. Audio database water- marking for tamper detection[J]. Communications in Computer and Information Science, 2011, 142 (3) : 446-448.
  • 7Li Yingjiu, Swarup V, Jajodia S. Fingerprinting re- lational databases: schemes and specialties [J ]. IEEE Transactions on Dependable and Secure Com- puting, 2005, 2(1): 34-45.
  • 8Lafaye J, Gross-Amblard D, Constantin C, et al. Watermill: an optimized fingerprinting system for databases under constraints [J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(4): 532-546.
  • 9David G. Query-preserving watermarking of rela- tional databases and XML documents [J]. ACM Transactions on Database Systems (TODS). 2011, 36(1) : 3185-3196.
  • 10郑吉平,秦小麟,崔新春.基于数字水印的数据库角色访问控制模型[J].电子学报,2006,34(10):1906-1910. 被引量:4

二级参考文献21

  • 1萨师煊 王珊.数据库系统概论[M].北京:高等教育出版社,1990..
  • 2[6]B Schneier. Applied Cryptography [ M]. USA: John Wiley & Sons, Inc.1996.
  • 3[7]Radu Sion, Mikhail Atallah, Sunil Prabhakar. On watermarking numeric sets [ A]. Proceedings of the Workshop on Digital Watermarking [ C ].USA: IWDW. 2002.
  • 4[1]Stefan Katzenbeisse, Fabien A P Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking [ M ]. Boston, London: Artech House, 1999.
  • 5[3]Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases[A]. Proceeding of the 28th VLDB Conference [ C]. Hongkong, China:28 VLDB, 2002.
  • 6[4]Radu Sion, Mikhail Atallah, Sunil Prabhakar. Rights protection for relational data [ A ]. Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data San Diego [ C ]. California: ACM SIGMOD,2003.98- 109.
  • 7[5]M Atallah, S Wagstaff. Watermarking with quadratic residues [ A ].Proc. of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents [ C]. USA:SPIE, January 1999.
  • 8R Sandhu,E coyne,H Feinstein,et al.Role-based access control models[J].IEEE Computer,1996,29 (2):38-47.
  • 9Fabien A P Petitcolas,Ross J Anderson,Markus G kuhn.Information hiding-a survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 10R Sandhu,David Ferraiolo,Richard Kuhn.The MST Model for Role-based Access Control:Towards an Unified Standard[J/OL],ACM,2000,47-63.

共引文献70

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部