Font Size: a A A

Watermarking Algorithm Based On Numerical Attribute Characters Of Relational Database

Posted on:2007-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:C X JiangFull Text:PDF
GTID:2178360185965373Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Currently digital watermark technology mainly concentrates on the multimedia data (e.g., image, audio, and video) and great progress has been made. With the wide spread of IT technology, the question of relational database copyright protection becomes more and more important. How to insert digital watermark into the relational database has become an urgent problem that should be resolved. At present, little has been done to secure proof of copyrights over relational database, the domestic and foreign researches have only carried out a tentative study. This paper studies the watermarking algorithms based on numerical attribute characters of relational database. The main works in this paper are as follows:In the paper, we can implement ownership protection of a relational database, by embedding the ownership information into a relational database. By improving the current watermarking algorithms of relational database and introducing chaotic sequence and Hash function, a algorithm for embedding a string of bits into a relational database is proposed in this paper. The algorithm makes watermarking information hold the characters of secrecy and blind extraction. Theoretic analysis and emulated results verify the effectiveness and feasibility of the proposed method.Because of the increasing use of relational database, database-watermarking technique has become a studying focus. The paper presents a database public watermarking method based on Independent Component Analysis (ICA). The Independent components can be achieved by ICA processing to watermarking information, then, using iterative mixing embeds watermarking and extracting the watermarking by blind JADE algorithm. We can implement the extraction of watermarking information with fewer carriers. In this method, the paper presents a new watermarking solution. Which can embed gray image with great information into relational database .In the mean time, the watermarking will not affect the application of database. The solution can be also used for secret transmission of great information. Theory analysis and emulated experiment results show that the scheme is feasible.At present, amount of database watermarking research effect has been...
Keywords/Search Tags:JADE algorithm, database watermarking, iterative mixing, ICA, numerical attribute, linear correlation detection
PDF Full Text Request
Related items