Computer Science ›› 2014, Vol. 41 ›› Issue (5): 182-185.doi: 10.11896/j.issn.1002-137X.2014.05.038

Previous Articles     Next Articles

Database Watermarking Algorithm Research Based on (t,n) Threshold

WANG Ju-long and CHEN Ji-hong   

  • Online:2018-11-14 Published:2018-11-14

Abstract: A new watermark technology for databases based on (t,n) threshold was presented in this paper.Firstly,(t,n) threshold is used to divide watermark into some shade shares.Secondly,the tuples of relational database are marked by their hash values.The position for watermark embedding is based on the parity deference between mark and Most Significant Bits of the attributes.Finally,the watermark information is embedded into the numerical attributes of the database based on a new matching rule.Experimental results show that this algorithm is safe and effective to prevent various of attacks.

Key words: Database,Threshold,Lagreange interpolation formula,Watermark

[1] 朱勤,陆志明.基于信息隐藏的外包数据库版权保护系统[J].计算机科学,2010,37(1):163-166
[2] 张勇,赵东宁,李德毅.关系数据库数字水印技术[J].计算机工程与应用,2003,39(25):193-195
[3] Agrawal R,Kiernan J.Watermarking Relational Databases[C]∥Proceedings of the 28th VLDB Conference.Hong Kong,China,2002
[4] Sion R,Atallah M.Sunil Prabhakar Rights Protection for Rela-tional Data[C]∥Proceedings of ACM SIGMOD.2003
[5] 牛夏牧,赵亮,黄文军,等.利用数字水印技术实现数据库的版权保护[J].电子学报,2003,31(12):2050-2053
[6] 蒙应杰,吴超,是垚,等.关系数据库零水印的构造算法[J].兰州大学学报:自然科学版,2003,4(3):1-5
[7] Shamir A.How to share a secret[J].Communications of theACM,1979,24(11):612-613
[8] Blakley G R.Safeguarding cryptographic keys[C]∥Proceedings of the National Computer Conference,American Federation of Information Processing Societies.1979,48:313-317
[9] 黄德才,姚瑶,刘瑞阳,等.基于(t,n)门限的关系型数据库水印算法[J].计算机应用与软件,2009,26(7):81-84
[10] 郑光明,欧阳竟成.基于拉格朗日插值的关系数据库数字水印[J].计算机工程与设计,2008,29(6):1585-1587
[11] 马瑞敏,陈继红.基于二维空间元素匹配的数据库水印算法[J].计算机应用,2012,32(8):2268-2270

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!