Outsourced database enquiry and verification method based on fragile watermark
A technology of fragile watermarking and verification method, applied in electrical digital data processing, instruments, program/content distribution protection, etc., can solve the problems of inability to further achieve tampering, positioning, qualitative and even data recovery, huge overhead, and data integrity damage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] Such as figure 1 As shown, this is the basic structural model of the fragile watermark-based outsourced database query verification method of the present invention. The two most critical components in this model are the watermark embedder and the watermark detector, which are the programs that run the fragile watermark embedding algorithm and the fragile watermark detection algorithm respectively, and are located in the data owner client and the database user client respectively. According to the structural model, the outsourced database query verification method based on the fragile watermark of the present invention is:
[0067] The data owner first uses the key to run the fragile watermark embedding algorithm on the data that needs to be stored or updated to embed the fragile watermark in the data, and then submits the data with the fragile watermark embedded to the outsourced database server for storage;
[0068] When using data, database users first submit a query...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 