期刊文献+

基于分类的关系数据库零水印算法 被引量:1

Zero-Watermarking Algorithm for Relational Database Based on Classification
在线阅读 下载PDF
导出
摘要 通过分析现有数据库水印技术,将分类思想引入关系数据库零水印特征提取过程,提出了基于分类的关系数据库零水印算法。其中,提取数据类编号作为数据的特征信息,在一定程度上减少了数据库的数据类型和数据误差对水印算法的限制。该算法具有隐蔽性好的特点,且水印恢复无需原始数据库,同时支持水印信息盲检测。仿真试验验证了该算法的安全性和鲁棒性。 The classification idea is introduced to the relational database zero-watermarking char- acteristic extraction process by analyzing the watermark technology of the database. The zero-wa- termarking algorithm for relational database based on classification is proposed. The classification code of the extraction data is used as feature information to a certain extent,limits of data type and errors in database on the algorithm are decreased. The algorithm is good at hiding and does not need original database in the recover process, meanwhile, supports blind-checking of water- mark information. Finally, the simulation experiment validates the safety and the robustness of the algorithm.
出处 《指挥信息系统与技术》 2013年第6期85-89,共5页 Command Information System and Technology
关键词 数字水印 关系数据库 零水印技术 分类 版权保护 digital watermark relational database zero-watermarking technology classifica- tion copyright protection
  • 相关文献

参考文献15

二级参考文献72

共引文献92

同被引文献18

  • 1驻伊美军士兵可能因神秘照片受审[N/OL].重庆晚报,2012-11-24.http://news.upc.edu.cn/newsupc/news—gjxw—xwsd/2005/14483.shtml.
  • 2Choi K S, Lam E Y, Wong K K Y. Automatic source camera identification using the intrinsic lens radial distor- tion[J]. Optics Express, 2006, 14(24): 11551-11565.
  • 3Lukas J, Fridrich J, Goljan M. Digital camera identifi- cation from sensor pattern noise[J]. IEEE Transac- tions on Information Forensics and Security, 2006, 1 (2) : 205-214 .
  • 4Lawgaly A, Khelifi F, Bouridane A. Image sharpe- ning for efficient source camera identification based on sensor pattern noise estimation EC // Fourth lnterna tional Conference on Emerging Security Technologies. Cambridge: IEEE, 2013: 113-116.
  • 5Swaminathan A, Wu Min, Liu K J R. Nonintrusive component corensics of visual sensors using output im ages[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(1): 91-106.
  • 6Lai Chengliang, Lin Chingyi. Source camera of digital image identification base on interpolation algorithm [C // International Conference on Automatic Control and Artificial Intelligence. Xiamen: Institution of En gineering and Technology, 2012. 1886-1889.
  • 7Johnson M K, Farid H. Exposing digital forgeries in complex lighting environments[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):450 -461.
  • 8Jiang W F, Zhang R, Liu J Y. Image tamper detection based on the DCT coefficients model]-C // Proceedings of 2012 2nd International Conference on Computer Sci- ence and Network Technology. Changchun: IEEE, 2012 : 798-802.
  • 9Chen Wen, Shi Yunqing, Su Wei. Image splicing de tection using 2-D phase congruency and statistical mo- ments of characteristic functionEC // Proceedings of the International Society for Optical Engineering. San Jose: SHE, 2007: 65050R -1 -8.
  • 10Chen Chunhua, Shi Yunqing, Xuan Guorong. Steganalyz- ing texture images[C]//IEEE International Conference on Image Processing(11). Texas: IEEE, 2007: 153-157.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部