Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Text-type attribute-based relational database watermark embedding method

A technology of watermark embedding and text attribute, applied in the field of database security

Inactive Publication Date: 2012-11-28
SHENYANG INSTITUTE OF CHEMICAL TECHNOLOGY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, for a text-type non-numeric attribute with any number of words, how to realize the addition and blind detection of the watermark, and the database watermarking method to ensure that the performance of the text data after embedding the watermark is not distorted, has not yet been publicly reported

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Text-type attribute-based relational database watermark embedding method
  • Text-type attribute-based relational database watermark embedding method
  • Text-type attribute-based relational database watermark embedding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] A watermark embedding method for a relational database based on text-type attributes. The watermark embedding means that the database owner mixes the binary watermark image with the text-type data in the database through a watermark embedding algorithm to protect the copyright of the database. The specific calculation steps are as follows:

[0055] (1) Set the database owner to determine some secret information: binary watermark image W, user key Key and group adjustment factor N.

[0056] (2) Digitize the binary watermark image into a binary sequence Wm_Bits represented by 0 and 1, calculate the watermark symbol length Wm_length, and calculate the group size e by formula (6).

[0057] (3) Based on the group size e, calculate the tuple mark and the hash remainder r according to the formulas (1) and (7) i .mod(1≤i≤η), and hash the remainder r i .mod (1≤i≤η) sorts the tuples in increasing order to realize the grouping of tuples.

[0058] (4) Embed each watermark symbol ...

Embodiment 2

[0062] A watermark extraction method for relational databases based on text attributes. If the owner A of the database R suspects that the database R' used by the user B is an illegal copy of R, then A can obtain the binary data hidden in R' through the watermark extraction algorithm. Value image watermark, in order to prove that the database R' is illegally embezzled. Watermark extraction is the reverse of watermark embedding process. The specific calculation steps of the extraction method are as follows:

[0063] (1) Some secret information known by A: user key Key, image watermark symbol length Wm_length (Wm_length=watermark image length Width×watermark image width Height) and group adjustment factor N.

[0064] (2) Calculate the remainder r of each tuple according to formulas (1), (6), and (7) i .mod, 1≤i≤η. based on r i .mod(1≤i≤η) press r for all tuples of R' i .mod (1≤i≤η) is sorted in increasing order to realize dynamic grouping of tuples.

[0065] (3) The waterm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a text-type attribute-based relational database watermark embedding method, belongs to the technical field of database security, and relates to a text-type attribute-based relational database watermark embedding and extracting method. The method comprises the following steps of: designing a database watermark mechanism for embedding a watermark in a text-type attribute; and realizing the database watermark mechanism. In the method, binary states of a watermark code element are respectively mapped as a carriage return and a line break aiming at the characteristics of the text-type attribute; and the carriage return and the line break are taken as watermark embedded text attribute values. The watermark has no influence on the original appearance, the semantics and the availability of data; and the watermark extraction does not need an original database. The method is suitable for a text-type attribute-containing database, and has no limit to the number of the words of the text-type attribute. The method has immunity to tuple addition, attribute addition and attribute reordering attack, can effectively resist the tuple modification, the tuple deletion and the attribute deletion attack, and can be used for the protection of a relational database.

Description

technical field [0001] The invention relates to the technical field of database security, in particular to a method for embedding watermarks in relational databases based on text attributes. Background technique [0002] With the rapid development of digital technology, it is easy to obtain multimedia data such as text, pictures, sound and video from the Internet. Therefore, the demand for copyright protection, proof of ownership and tamper detection of digital products is becoming more and more urgent. Digital watermarking technology is considered to be an effective method that can be used to protect the intellectual property rights of digital media. Digital watermarking is to embed special information in the original data (such as multimedia data representing copyright, which is generally called a watermark), and then generate a data carrying a watermark. The existence of the watermark cannot be perceived by human observers, but it is easy to detected by a computer progr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/24G06F21/16G06F21/60
Inventor 张立忠姬晓霜陈馨蔡万鸿
Owner SHENYANG INSTITUTE OF CHEMICAL TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products