Digital watermark embedding and protection methods for database

A digital watermark and database technology, applied in the field of data security, can solve problems such as difficult to be detected and difficult to find

Active Publication Date: 2018-10-02
DONGFENG PEUGEOT CITROEN AUTOMOBILE
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 3) When some parts of multimedia data are tampered with, deleted, etc., it is easier to be detected visually or audibly; when such operations are performed on tuples in relational databases, it is more difficult to find out, and attackers can easily a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital watermark embedding and protection methods for database
  • Digital watermark embedding and protection methods for database
  • Digital watermark embedding and protection methods for database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] A database digital watermark embedding method, comprising:

[0066] Step 1. Score the attribute columns of the target database, and select the embedded attributes according to the scoring results, including:

[0067] Step 11, calculate the digital watermark embedding capacity

[0068]

[0069] where WME(W k ) is calculated as, if dis k L , then WME(W k )=1; if dis k ≥2 L , then WME(W k )=0.

[0070] where dis k The calculation method of is, if k=0, then dis k = 2 Lev ; if k≠0, then dis k =|m k-1 -m k |.

[0071] Among them, Lev is the number of layers of the binary tree, m k is the original value of the Kth tuple in the attribute, j is the tuple number, and max j is the maximum tuple number.

[0072] Step 12, calculate the distortion rate of the data to be embedded in the attribute relative to itself

[0073]

[0074] Judgment|m k -m k-1 |Lev Whether it is established, if so, then dis k =|m k -n k |, if not, then dis k =0, where, n k is the ...

Embodiment 2

[0094] A method for protecting a database, comprising:

[0095] Step 1, obtaining data information of users and objects to be protected;

[0096] Step 2, generating a digital watermark from the data information through a hash function;

[0097] Step 3, using the digital watermark embedding method described in Embodiment 1 to embed the digital watermark into the target database to be protected;

[0098] Step 4, encrypt the target database information (position information matrix, original watermark and information used to generate the watermark) embedded with the digital watermark in step 3, and store it in the information database.

[0099] Preferably, the data information includes the user ID and user voiceprint information corresponding to the user ID one-to-one, and the method for extracting the user voiceprint information includes: extracting the audio information of the user voice password from the background of the voice cloud, and performing Mel on the audio informatio...

Embodiment 3

[0101] A watermark generation and embedding method for an Internet automobile database, the data information also includes vehicle information.

[0102] In step 2 of this embodiment, the digital watermark generated by the data information through the hash function is

[0103] H=hash(CarInfo||VoiceInfo||CustomerID||CompanyID||DatabaseInfo)

[0104] Among them, CarInfo is vehicle information, VoiceInfo is user voiceprint information, CustomerID is user ID, CompanyID is vehicle company information, and DatabaseInfo is target database information.

[0105] A method based on voiceprint features and digital watermarking is used to perform copyright identification, copyright tracking, and integrity verification on the Internet version of the background database of vehicle models, so as to achieve the purpose of improving the above problems.

[0106] The steps of the technical solution in this paper are as follows:

[0107] 1. Obtain the voiceprint characteristics corresponding to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital watermark embedding method for a database. The method comprises the steps of scoring an attribute column of the target database, and according to a scoring result, selecting an attribute of performing embedding; by using a tuple selection algorithm and a binary tree-based histogram shifting algorithm, marking a tuple embedded with a digital watermark, and storingthe position of a mark through a mapping matrix; and according to the mapping matrix, embedding the digital watermark in the target database for multiple times repeatedly by using a watermarking algorithm of the binary tree-based histogram shifting algorithm. The invention furthermore discloses a protection method for the database and a watermark generation and embedding method for the internet car database. Compared with other methods, the method has the advantages that the robustness and imperceptibility of the digital watermark are improved through the algorithm; the attack resistance capability is stronger; the quantity of information which can be used for authentication is higher; and the effect of the digital watermark during specific application is enhanced.

Description

technical field [0001] This article relates to the field of data security technology, and specifically relates to a database watermark generation and embedding method. Background technique [0002] In the 21st century, modern enterprises attach great importance to informatization, and more and more enterprises, institutions and even individuals have begun to build their own databases and store various data in them. In many information platforms, databases play a pivotal role. Most of these databases operate in a network environment, providing users with operations such as query and modification. But access to the Internet means that the security of the database is threatened at any time, because the Internet itself does not have a mechanism to protect the security of the database. As long as the database is not physically isolated, it is theoretically insecure. Before digital watermarking technology was applied in the field of database protection, the main technologies of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/16
CPCG06F21/16
Inventor 马钰嘉乔小河冯朝曦向巍苏威刘小明
Owner DONGFENG PEUGEOT CITROEN AUTOMOBILE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products