Outsourced database enquiry and verification method based on fragile watermark
A fragile watermark and verification method technology, which is applied in the direction of electronic digital data processing, instrumentation, program/content distribution protection, etc., can solve the problems of inability to further realize tampering positioning, qualitative and even data restoration, data integrity damage, and huge overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] As shown in Fig. 1, this is the basic structural model of the fragile watermark-based outsourced database query verification method of the present invention. The two most critical components in this model are the watermark embedder and the watermark detector, which are the programs that run the fragile watermark embedding algorithm and the fragile watermark detection algorithm respectively, and are located in the data owner client and the database user client respectively. According to the structural model, the outsourced database query verification method based on the fragile watermark of the present invention is:
[0065] The data owner first uses the key to run the fragile watermark embedding algorithm on the data that needs to be stored or updated to embed the fragile watermark in the data, and then submits the data with the fragile watermark embedded to the outsourced database server for storage;
[0066] When using data, database users first submit a query request...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 