分级可逆的关系数据水印方案
作者:
作者简介:

侯瑞涛(1993-),男,博士生,主要研究领域为数字水印,云存储安全.
咸鹤群(1979-),男,博士,副教授,CCF高级会员,主要研究领域为云存储安全,区块链,隐私保护,密码学.
李京(1971-),女,讲师,主要研究领域为云计算,电子商务安全.
狄冠东(1994-),男,硕士生,主要研究领域为数字水印,云存储安全.

通讯作者:

咸鹤群,E-mail:xianhq@126.com

基金项目:

山东省自然科学基金(ZR2019MF058);国家自然科学基金(61702294);信息安全国家重点实验室开放课题(2020-MS-09)


Graded Reversible Watermarking Scheme for Relational Data
Author:
Fund Project:

Natural Science Foundation of Shandong Province (ZR2019MF058); National Natural Science Foundation of China (61702294); Open Program of the State Key Laboratory of Information Security (2020-MS-09)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [39]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    关系数据可逆水印技术是保护数据版权的方法之一.它克服了传统的关系数据数字水印技术的缺点,不仅可以声明版权,而且可以恢复原始数据.现有方法在恢复原始数据时不能控制数据恢复的程度,无法调节数据的可用性.提出了一种分级可逆的关系数据水印方案,定义了数据质量等级来反映水印嵌入对数据可用性的影响,设计了用于实现分级可逆水印的分区嵌入、等级检测、水印检测以及等级提升算法.数据所有者在数据分发前预先设定若干数据质量等级,以数据分区为单位嵌入水印.每个数据分区使用独立的密钥控制水印信息的位置和取值.如果数据使用者希望提升当前数据的可用性,可向数据所有者申请或购买相关密钥,提升当前数据的数据质量等级.对于任意数据质量等级的数据,其中的数字水印均可用于证明版权.采用分区的辅助数据,实现了灵活的水印逆操作.设计了有效的哈希表冲突解决方法,降低了计算和存储开销,提高了该方案的实用性.实验结果显示,方案具有良好的计算性能以及鲁棒性,可满足现实应用场景的需求.

    Abstract:

    Reversible watermarking technique for relational data is intended to protect the copyright. It overcomes the shortcomings of traditional watermarking techniques. It can not only claim the copyright of data, but also recover the original data from the watermarked copy. However, existing reversible watermarking schemes for relational data cannot control the extent of data recovery. Aiming at this problem, a graded reversible watermarking scheme for relational data is proposed in the study. Data quality grade is defined to depict the impact of watermark embedding on the usability of data. Watermark embedding, grade detection, watermark detection, and grade enhancement algorithms are designed to achieve graded reversibility of watermark. Before distributing the data, the data owner can predefine several data quality grades, then embed the watermark into data partitions. A unique key is used in each data partition to control the position and value of the watermark information. If data users are not satisfied with the usability of data, they can require or purchase relevant keys from the owner to upgrade the data quality grade. The watermark in relational data with any data quality grade is sufficient to prove the copyright. Flexible watermark reversion is achieved via partitioned auxiliary data design. A more practical mechanism is devised to efficiently handle the hash table collision, which reduces both computational and storage overhead. Experiments on algorithms and watermark show that the proposed scheme is feasible and robust.

    参考文献
    [1] Naimi AI, Westreich DJ. Big data:A revolution that will transform how we live, work, and think. Mathematics & Computer Education, 2014,47(17):181-183.
    [2] Katzenbeisser S, Petitcolas FA. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., 2000.
    [3] Alattar AM. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. on Image Processing, 2004,13(8):1147-1156.
    [4] An L, Gao X, Li X, Tao D, Deng C, Li J. Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans. on Image Processing, 2012,21(8):3598-3611.
    [5] Cox IJ, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997,6(12):1673-1687.
    [6] Hartung F, Kutter M. Multimedia watermarking techniques. Proc. of the IEEE, 1999,87(7):1079-1107.
    [7] Agrawal R, Kiernan J. Watermarking relational databases. In:Proc. of the Int'l Conf. on Very Large Databases. 2002. 155-166.
    [8] Sion R, Atallah M, Prabhakar S. Rights protection for categorical data. IEEE Trans. on Knowledge and Data Engineering, 2005, 17(7):912-926.
    [9] Hou RT, Xian HQ, Liu HY, Gao Y, Zhang Y. Multi-verifiable Reversible Watermarking Scheme for Relational Data. Journal of Cryptologic Research, 2019,6(1):37-49(in Chinese with English abstract).
    [10] Niu XM, Zhao L, Huang WJ, Zhang H. Watermarking relational databases for ownership protection. Acta Electronica Sinica, 2004, 31(12A):2050-2053(in Chinese with English abstract).
    [11] Zhang ZH, Jin XM, Wang JM, Li DY. Watermarking relational database using image. In:Proc. of the Int'l Conf. on Machine Learning and Cybernetics, Vol.3. IEEE, 2004. 1739-1744.
    [12] Xiang Y, Li JY, Pan JF. Database watermarking algorithm based on virtual primary key. Journal of Computer Research and Development, 2009,46(Suppl.):66-70(in Chinese with English abstract).
    [13] Zhou G, Wu KM. Research on zero-watermarking model of relational databases based on improved C4.5 algorithm. Computer Applications and Software, 2015,32(1):64-67(in Chinese with English abstract).
    [14] Melkundi S, Chandankhede C. A robust technique for relational database watermarking and verification. In:Proc. of the Int'l Conf. on Communication, Information & Computing Technology. IEEE, 2015. 1-7.
    [15] Rani S, Koshley DK, Halder R. Adapting MapReduce for efficient watermarking of large relational dataset. In:Proc. of the 2017 IEEE Trustcom/BigDataSE/ICESS. 2017. 729-736.
    [16] Zhang Y, Yang B, Niu XM. Reversible watermarking for relational database authentication. Journal of Computers, 2006,17(2):59-65.
    [17] Gupta G, Pieprzyk J. Reversible and blind database watermarking using difference expansion. In:Proc. of the DBLP. 2008. 1-6.
    [18] Jawad K, Khan A. Genetic algorithm and difference expansion based reversible watermarking for relational databases. Journal of Systems & Software, 2013,86(11):2742-2753.
    [19] Imamoglu MB, Ulutas M, Ulutas G. A new reversible database watermarking approach with firefly optimization algorithm. Mathematical Problems in Engineering, 2017,2017(2):1-14.
    [20] Farfoura ME, Horng SJ. A novel blind reversible method for watermarking relational databases. In:Proc. of the Int'l Symp. on Parallel and Distributed Processing with Applications. IEEE Computer Society, 2010. 563-569.
    [21] Chang JN, Wu HC. Reversible fragile database watermarking technology using difference expansion based on SVR prediction. In:Proc. of the Int'l Symp. on Computer, Consumer and Control. IEEE, 2012. 690-693.
    [22] Zhang Y, Niu XM. Reversible watermark technique for relational databases. Acta Electronica Sinica, 2006,34(12A):2425-2428(in Chinese with English abstract).
    [23] Franco-Contreras J, Coatrieux G, Cuppens F, Cuppens-Boulahia N, Roux C. Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. on Information Forensics & Security, 2014,9(3):397-410.
    [24] Iftikhar S, Kamran M, Anwar Z. RRW-A robust and reversible watermarking technique for relational data. IEEE Trans. on Knowledge & Data Engineering, 2015,27(4):1132-1145.
    [25] Jiang CX, Cheng XH, Xu XL, Li Z. Reversible database watermark based on integer wavelet transform. Journal of Guilin University of Technology, 2017,37(1):191-195(in Chinese with English abstract).
    [26] Feng DG. Security Protocols:Theory and Practice. Beijing:Tsinghua University Press, 2011(in Chinese).
    [27] Hu Y. Research and implementation of RSA algorithm[MS. Thesis]. Beijing:Beijing University of Posts and Telecommunications, 2010(in Chinese with English abstract).
    [28] Rong HG, Mo JX, Chang BG, Sun G, Long F. Key distribution and recovery algorithm based on Shamir's secret sharing. Journal on Communications, 2015,36(3):60-69(in Chinese with English abstract).
    [29] TPC-H. 2018. http://www.tpc.org/tpch/
    附中文参考文献:
    [9] 侯瑞涛.咸鹤群.刘红燕.高原.张艺.可多次验证的关系数据可逆水印方案.密码学报,2019,6(1):37-49.
    [10] 牛夏牧,赵亮,黄文军,张慧.利用数字水印技术实现数据库的版权保护.电子学报,2004,31(12A):2050-2053.
    [12] 向玥,李军义,潘季芳.一种基于虚拟主键的数据库水印算法.计算机研究与发展,2009,46(Suppl.):66-70.
    [13] 周钢,吴克明.基于改进型C4.5算法的关系数据库零水印模型研究.计算机应用与软件,2015,32(1):64-67.
    [22] 张勇,牛夏牧.一种用于关系数据库的可逆水印技术.电子学报,2006,34(12A):2425-2428.
    [25] 姜传贤,程小辉,许鑫磊,李智.基于整数小波变换的可逆数据库水印.桂林理工大学学报,2017,37(1):191-195.
    [26] 冯登国.安全协议:理论与实践.北京:清华大学出版社,2011.
    [27] 胡云.RSA算法研究与实现[硕士学位论文].北京:北京邮电大学,2010.
    [28] 荣辉桂,莫进侠,常炳国,孙光,龙飞.基于Shamir秘密共享的密钥分发与恢复算法.通信学报,2015,36(3):60-69.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

侯瑞涛,咸鹤群,李京,狄冠东.分级可逆的关系数据水印方案.软件学报,2020,31(11):3571-3587

复制
分享
文章指标
  • 点击次数:1368
  • 下载次数: 3732
  • HTML阅读次数: 1921
  • 引用次数: 0
历史
  • 收稿日期:2017-11-09
  • 最后修改日期:2018-11-17
  • 在线发布日期: 2020-11-07
  • 出版日期: 2020-11-06
文章二维码
您是第19937664位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号