期刊文献+

一种关系数据库的多媒体多重水印 被引量:1

A Multiple Watermarking of Multi-Media for Relational Databases
下载PDF
导出
摘要 针对关系数据库水印算法的一些不足,提出了一种保护关系数据库的多重水印方法.该方法将密钥和语音等多媒体信号结合在一起作为水印嵌入关系数据库,实现了多重水印在关系数据库中的嵌入和提取,并且多重水印提取时不需要原始数据的参与.实验表明,该方法有效地平衡透明性与稳健性之间的关系,对子集选择攻击和子集改变攻击具有较好的稳健性. A multiple watermarking algorithm is proposed to protect relational databases copyright for some lacks of the existing multi -- watermarking algorithms. The novel multiple watermarking scheme, which embeds multi -- media watermarks into relational database. The watermark embedding and extraction algorithms are specified. The algorithm is "blind" in that it isn't requires original data in order to detect a watermark. The results of the corresponding watermark experiments and the attack experiments verify that the proposed method is correct feasible and robust.
出处 《微电子学与计算机》 CSCD 北大核心 2013年第9期122-125,共4页 Microelectronics & Computer
基金 国家自然科学基金(41171341) 河南省科技厅科技攻关项目(102102210453)
关键词 数据库 数字水印 数据库水印 信息隐藏 database digital watermarking database watermarking information hiding
  • 相关文献

参考文献8

  • 1Francese Sebe, Josep Domingo-Ferrer. Agusti solanas noise-robust watermarking for numerical datasets[C] //Proceeding of the MDAI 2005, Berlio Heidelberg.. Springer-verlag, 2005 : 134-143.
  • 2牛夏牧,赵亮,黄文军,张慧.利用数字水印技术实现数据库的版权保护[J].电子学报,2003,31(z1):2050-2053. 被引量:69
  • 3张勇,赵东宁,李德毅.关系数据库数字水印技术[J].计算机工程与应用,2003,39(25):193-195. 被引量:40
  • 4Yingjiu Li, Huiping Guo, Sushil Jajodia. Tamper De- tection and Localization for CategoriealData Using Fragile Watermarks[C]//Proeeeding of the DRM' 04, Washington, DC, USA: IEEE,2004: 210-221.
  • 5肖湘蓉,孙星明.基于水印的数据库安全控制研究[J].计算机工程与应用,2005,41(6):175-177. 被引量:8
  • 6Radu Sion, Mikhail Atallah, Sunil Prabhakar. Owner- ship proofs for categorical data [J]. IEEEJournal of Transactions on Knowledge and Data Engineering IEEE TKDE, 2005, 17(7) :223-225.
  • 7C Constantin, D Gross-- Amblard et M Guerrouani. Watermill: an Optimized Fingerprinting Tool for Highly Constrained Data [C]//ACM Workshop on Multimedia and Security(MMSec), New York, USA.. IEEE,2005, (08) : 143-155.
  • 8Yingjiu Li, Vipin Swarup. Fingerprinting relational databases schemes and specialties [J]. IEEE Transac- tion on Dependable and Secure Computing, 2005, 2 (1) : 34-45.

二级参考文献29

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1240
  • 2萨师煊 王珊.数据库系统概论[M].北京:高等教育出版社,1990..
  • 3王秋生.[D].哈尔滨工业大学,2001-12.
  • 4[6]B Schneier. Applied Cryptography [ M]. USA: John Wiley & Sons, Inc.1996.
  • 5[7]Radu Sion, Mikhail Atallah, Sunil Prabhakar. On watermarking numeric sets [ A]. Proceedings of the Workshop on Digital Watermarking [ C ].USA: IWDW. 2002.
  • 6[1]Stefan Katzenbeisse, Fabien A P Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking [ M ]. Boston, London: Artech House, 1999.
  • 7[3]Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases[A]. Proceeding of the 28th VLDB Conference [ C]. Hongkong, China:28 VLDB, 2002.
  • 8[4]Radu Sion, Mikhail Atallah, Sunil Prabhakar. Rights protection for relational data [ A ]. Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data San Diego [ C ]. California: ACM SIGMOD,2003.98- 109.
  • 9[5]M Atallah, S Wagstaff. Watermarking with quadratic residues [ A ].Proc. of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents [ C]. USA:SPIE, January 1999.
  • 10王秋生.[D].哈尔滨工业大学,2001—12.

共引文献90

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部