基于图像的数据库水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着教育信息化程度的提高,现代远程教育为学习者提供了丰富的数字资源,这些资源很容易复制、修改和传播,大大推进了优质教育资源的共享。作为远程教育资源主要的载体,数据库的版权保护问题更亟待解决。关系数据库水印技术是保护数据库版权的一种有效手段,本文对现有关系型数据库水印算法分析研究的基础上,提出了一种在关系数据库中嵌入图像信息的图像数据库水印算法,主要研究内容及成果如下:
     首先,本文提出了基于图像的关系数据库水印技术,在关系数据中嵌入一张可识别的图像,用来描述版权信息。该算法实现了基于数据库的部分内容恢复水印信息,且算法具有隐蔽性好,水印恢复不需要原始数据库等特点。
     其次,在基于图像的关系数据库水印的基础上,通过引入混沌随机序列,利用混沌理论对版权信息进行加密,使所嵌入的水印信息具有保密性,攻击者即使知道水印嵌入算法,也无法知道版权信息的确切信息,水印的检测处理过程是极细微的、安全的、可信的且能够抵抗攻击。
     最后,本文对基于图像的多重关系数据库水印算法进行了探讨,提出了两种基于图像多重数据库水印的方案,且对多重关系库水印中的主要问题进行了分析并提出了相应的解决方法。
     本文重点介绍了基于图像的数据库水印算法、基于混沌理论的图像数据库水印算法和基于图像的多重数据库水印算法,水印算法的过程均包括水印信息的生成、水印信息的嵌入和水印的检测三个过程。理论分析和实验表明该算法性能好,抗攻击能力强,在关系数据库的版权保护中具有很好的应用价值,对数据库版权信息的保护具有很好的现实意义和理论意义。
With the development of information education, more and more digital educational resources are available on the internet. They are so easy to obtain, to spread even to tamper with that the copyright of these digital resources while sharing them has become a hotspot. As databases act as a major carrier of knowledge, the copyright protection of databases need be solved urgently. Relational database watermarking technique is an effectual method of copyright protection to protect the database. Base on analyzing the existing relational database watermarking algorithms, we present an image based algorithm for watermarking relational databases. The main research content and result are as follows:
     First, we present an image based algorithm for watermarking relational databases. Insert an identifiable image which can be described the copyright into database. By this algorithm, watermark information can be recovered from only a fraction of tuples of a database. The algorithm bears virtues of sound robustness, high security and bland detecting.
     Secondly, base on the first step, we use the chaos theory to encrypt copyright information. By introducing chaotic sequence as watermark, the embedded watermark information becomes more confidential. The attacker can't recover the correct watermark image even he knows the algorithms. Watermark detection process is very subtle, security, credible and able to resist the attack.
     Finally, we give a discussion on algorithms of watermarking relational database using multiple watermarks. We propose two watermark algorithms, analyze possible problems that multiple database watermark algorithm may encounter and give the corresponding solution.
     Thus the main contributions of this paper including three parts: an image based algorithm for watermarking relational databases, a chaotic encrypt image based algorithm for watermarking relational databases and an image based algorithm for watermarking relational databases using multiple watermarks. All algorithms consist of three parts: watermark generation, embedding and extraction procedure. The experimental results show that the proposed algorithms give excellent performance.
引文
[1]孙圣和,陆哲明,牛夏牧等.数字水印技术及应用[M].北京:科学出版社,2004.129—130.
    [2]Stefan Katzenbeisse,FabienA P Petitcolas.Information Hiding Techniques for Stefan grapy and Digital Watermarking M.Boston[C],Lon 2don:Artech House,1999.452-453.
    [3]刘振华,尹萍.信息隐藏技术及应用[M].北京:科学出版社,2002,123—124.
    [4]黄敏,张浩,曹加恒.一种基于关系数据库的水印技术[J].计算机工程与应用,2005,10:153—155.
    [5]朱勤,于守健,乐嘉锦.数据库水印研究与进展[J].计算机工程与应用,2006,(29):152—153.
    [6]张勇,赵东宁,李德毅.关系数据库数字水印技术[J].计算机工程与应用,2003,(25):123-124.
    [7]Rakesh Agrawal,Jerry Kiernan.Watermarking Relational Databases[C].Proceeding of the 28th VLDB Conference,Hongkong,China,2002,480-491.
    [8]Sion.R,Atallah.M,Sunil Prabhakar.Watermarking relational databases[R].Indiana:the Center for Education and Research in Information Assurance and Security of Purdue University,2002.
    [9]张勇,赵东宁,李德毅.水印关系数据库[J].解放军理工大学学报(自然科学版),2003,(5):146—147.
    [10]Zhihao Zhang,Xiaoming Jin,Jianmin Wang.Watermarking relational database using image[C].Proceedings of the Third International Conference on Machine Learning and Cybernetics,Shanghai,26-29,August 2004,1739-1744..
    [11]姜传贤.基于关系数据库数值型属性特征的水印算法[D].湖南大学,2006.
    [12]W Bender,D Gruhl,N Morimoto.Technique for Data Hiding[J].Proceedings of the SPIE 2420 storage and retrieval for image and video database,1995,(6):164-173.
    [13]肖湘蓉,孙星明.基于水印的数据库安全控制研究[J].计算机工程与应用,2005,(5):236—237.
    [14]Bruce Schneier.Applied Cryptography[M].John Wiley,second edition,1996.
    [15]张浩,黄敏,曹加恒.数据库水印中的标记算法[J].计算机应用研究,2005,(5):42—43.
    [16]Xinchun Cui,Xiaolin Qin,Gang Sheng.A Weighted Algorithm for Watermarking Relational Databases[J].Wuhan University Journal of Natural Sciences,2007,(1):12-13.
    [17]Frey D R.Chaotic digital encoding:An approach to secure communication[J].IEEE Trans Circuit and Systems.1993,40(10):660-666.
    [18]范延军,孙燮华,阎晓东等.一种基于混合混沌序列的图像置乱加密算法[J].中国图象图形学报,2006,(3):159-160.
    [19]丁存生,肖国镇.流密码学及其应用[M].北京:国防工业出版社,1994.
    [20]欧珊瑚,张珩.基于混沌特性和视觉模型的小波数字水印算法研究[J].中国图象图形学报,2004,9(3):345-351.
    [21]纪震,李慧慧,肖薇薇等.基于混沌序列的数字水印信号研究[J].电子学报,2004,32(7):1131-1134.
    [22]赵健,齐华,田泽等.改进的小波域混沌数字水印算法实现[J].光子学报,2004,33(10):1236-1238.
    [23]王虹,丁源源,黄俊波.基于混沌的数字图像置乱和水印算法[J].信息技术,2004,28(8):26-29.
    [24]冯国瑞,蒋铃鸽,合晨.扩频数字水印中混沌序列的选取[J].上海交通大学学报,2004,38(11):1802-1805.
    [25]张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101.
    [26]陈士华,陆君安.混沌动力学初步[M].武汉:武汉水利电力大学出版社,1998.
    [27]Multipurpose watermarking for image authentication and protection[J].IEEE Trans.on Image Processing,2001,(10):1579-1592.
    [28]罗永,毛紫阳,成礼智,吴翊.多重水印技术的模糊关系与应用[J].模糊系统与数学,2006,(1):165-167.
    [29]WONG PHW,AU OC.A Novel Blind Multiple Watermarking Technique[C].Proceedings of the 2003 International Symposium on Circuits and Systems,IEEE,2003,936-939.
    [30]唐明,王丽娜,张焕国.动态多重数字水印设计方案[J].计算机应用研究,2006,(3):167-168.
    [31]Yingjiu Li,VipinSwarup.Fingerprinting Relational Databases Schemes and Specialties [C].IEEE Transaction on Dependable and Secure Computing.2005,2134-45.
    [32]Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences,2006,(26):1350-1378.
    [33]Bender.W,Gruhl.D,MorimotoNetal.Techniques for data hiding[J].BM System Journal,1996,35(3 &4):313-336.
    [34]Zhao.J,Koch.E.Embedding robust labels into images for copyright protection.In:Proceedings of the Know Right' 95 Conference on Intellectual Property Rights and New Technologies[C].Vienna,Austria,1995,241-251.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700