Font Size: a A A

Research On Relational Database Watermarking Methods

Posted on:2022-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:G D DiFull Text:PDF
GTID:2518306566491004Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the promotion and popularization of information sharing,databases have been widely used and disseminated as an information storage tool.While the database is spreading and sharing,various database infringement and piracy problems have also appeared.The database was maliciously spread and copied,causing great damage to the interests of the original database owner.Relevant scholars have proposed relational database watermarking technology on related issues,that is,by adding some minor errors to the database to prove the ownership of the database copyright.However,since most of the current database watermarking schemes only use the key and the watermark string to embed once,the watermark recovery ratio cannot be controlled during detection.Therefore,most watermarking schemes can only achieve copyright certification once.In addition,the watermark security of most of the current database watermarking schemes relies too much on the key.If the key is leaked,the watermark information is at risk of leakage.Therefore,on the basis of ensuring that the copyright of the database can be proved,how to solve the above problems has become a hot issue in the field of database watermarking research.This article proposes the following solutions for the problems existing in the current database watermarking scheme:(1)A watermarking scheme for relational database based on Fuzzy-Cmeans clusteringmethod is designed.The function of embedding a watermark in the database to provethe copyright multiple times is realized,and the practicability of the scheme is improved.(2)Using the characteristics of Fuzzy-Cmeans clustering to improve the security of the key and watermark parameters.By establishing a classifier and auxiliary table,the influence of the key on the security of the watermark is reduced,the efficiency of thewatermark scheme is improved,and the parameter leakage resistance of the watermarkscheme is enhanced.Even if all the watermark parameters are leaked,the security ofthe watermark information can still be guaranteed,and the robustness and security ofthe watermark are improved.(3)This article is user-centered,giving the watermark string a certain practical meaning.The method of generating watermark strings is improved,and the user fingerprint is used as the embedded information of the watermark scheme,which reduces the burden of the user on the memory of the watermark string.In copyright certification,compared with randomly generated random numbers,the certification using user fingerprints as the watermark string makes the scheme more convincing.In the actual copyright certification,using the user's own information as the embedded information can make the scheme more decisive evidence.At the same time,the watermark string processing using short hash hides the user's key identity information,which will not cause too much influence on the user's privacy while ensuring the security of the watermark.
Keywords/Search Tags:database watermark, key, clustering, copyright certificate
PDF Full Text Request
Related items