Font Size: a A A

Zero-Watermarking Algoritm For Relationnal Data

Posted on:2008-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:C WuFull Text:PDF
GTID:2178360215457242Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rife application of the database, the rapid development of Internet and the increasingly integrated applied based on them, the security problem of the. database is getting people's attention day after day. How to prevent the diffusion of the unauthorized database's contents has become one of the key issues in field of research relating to the security of database. At present, the technology of Digital Watermarking is such an effective method to protect the copyright of digital produces.In this paper, we design a mechanism of Zero-Watermarking of the database by analyzing existing Image Digital Watermarking Algorithm and using the model of Digital Zero-Watermarking. The main works and some innovative achievements reflect mainly in the following aspects:Firstly, we analyze the essence of existing Database Watermarking Algorithm in theory and compare their similarities and differences, then we construct a mechanism of Zero-Watermarking, at last, we have a greatly in-depth study on the two major phases of the structure and detection of Digital Zero-Watermarking Algorithm based on the aforementioned mechanism, the authority of watermark in the algorithm is guaranteed by the third-party authentication mechanism.Secondly, we introduce the structure of Digital Zero-Watermarking into the Chaotic Encryption Principle and use the sequence of Zero-Watermarking after breaking the initial sequence of Watermarking with the Chaotic Encryption Principle and converting into the Zero-Watermarking, at the same time, we design the Construct Algorithm of Zero-Watermarking based on the Chaotic Encryption. In addition, we analyze the influence and the relationship between the bit of Watermarking Extraction and the Threshold of Attributed Selection in the Watermarking tectonic process by the simulating experiment.Finally, we design the detection algorithm based on the existence of the Watermarking authority institution to detect the Zero-Watermarking and analyze the robustness and misjudgment rate of the detection algorithm in theory. In addition, even after the Zero-Watermarking undergoes different attacks, we verify that it has detectability. Above all, we prove the algorithm's high validity.
Keywords/Search Tags:Database, Zero-Watermarking Construction, Chaotic Encryption, Watermarking, Detection
PDF Full Text Request
Related items