Font Size: a A A

Study And Analysis On Digital Watermark For Relational Database

Posted on:2011-10-18Degree:MasterType:Thesis
Country:ChinaCandidate:T XiaFull Text:PDF
GTID:2178360302999547Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of society, information hiding technology has become a very hot topic, one of the research has also become a hot topic. Applied to the information hidden in the technology there are many, including digital watermarking technology is very common and the better-performing technologies. It is mainly in image, audio and video aspects of the secret information embedded in order to achieve these digital products protected by copyright.With the further development of scientific technological, many of the data are transmitted through the network, these data are mostly stored in the database, the data are more or less have a strong value, so their protection have an increased the more important. Database security problem arose.Relational Database digital watermarking technology can be a good solution to the database is a copyright issue. This article focuses on how to conduct a relational database watermarking embedding and how to improve the robustness of watermark to study these issues, this article mainly based on the numeric attributes of a relational database watermarking technology and based on wavelet transform and independent analysis of database watermarking technology in-depth analysis and explanation, and the final results will be analyzed compared. In particular, based on wavelet transform and independent vector analysis of database watermarking technology involved in part of the algorithm and compared to the previous algorithm has been greatly improved and increased improve the robustness of the watermark.In this paper, the study reads as follows:First, based on the numeric attributes of a relational database watermarking technology research. In this algorithm, the introduction of technologies such as chaotic sequence, making the watermark embedded in the database with confidential information more and more not easy to be stolen and tampered with. Second, based on wavelet transform and independent vector analysis of database watermarking research. In this algorithm will be embedded in image information as a watermark, but also carried out a series of image operations to further enhance the security of the watermark information to improve the database copyright protection.This involved the algorithm has strong robustness and anti-attack capability, strong, has good application value. Short database digital watermarking technology has a good theoretical and applied value to the entire information security technology developments in the field there will be a great help.
Keywords/Search Tags:database watermarking technology, images, chaotic map, zero-watermarking, vector mapping
PDF Full Text Request
Related items