首页 | 本学科首页   官方微博 | 高级检索  
     

数据库水印模型及其算法综述
引用本文:王春东,杨蕾,万福金,刘哲理,朱立坤.数据库水印模型及其算法综述[J].电子学报,2019,47(4):946-954.
作者姓名:王春东  杨蕾  万福金  刘哲理  朱立坤
作者单位:天津理工大学计算机科学与工程学院,天津300384;天津理工大学"计算机视觉与系统"教育部重点实验室,天津300384;南开大学网络空间安全学院,天津,300350
基金项目:国家自然科学基金;天津市科委重大项目;国家自然科学基金;天津市自然科学基金;教育部-中国移动科研基金
摘    要:大数据时代迅速发展的同时,如何解决数据的版权保护、信息保存、叛逆溯源等安全问题,也变得越来越重要.数据库水印技术是最有效的防护技术,其面临的最大挑战是如何在不影响用户使用的前提下嵌入水印,且保证在不影响水印信息提取的前提下抵挡各种常见的水印攻击.本文首先描述了数据库水印的基本概念和工作原理;然后,介绍了常见的数据库水印技术,并进行了分类;进而,总结了针对数据库水印的攻击行为,分析了特定水印技术的抗攻击性;接着详细分析了基于失真与基于无失真的典型水印技术,并简要分析了数据库指纹的现有技术手段;最后,指出各种现有的技术研究的关键与不足,提出了下一步可研究的方向.

关 键 词:数据库水印  数据库指纹  版权声明  鲁棒性
收稿时间:2018-05-28

Survey on Database Watermarking Models and Algorithms
WANG Chun-dong,YANG Lei,WAN Fu-jin,LIU Zhe-li,ZHU Li-kun.Survey on Database Watermarking Models and Algorithms[J].Acta Electronica Sinica,2019,47(4):946-954.
Authors:WANG Chun-dong  YANG Lei  WAN Fu-jin  LIU Zhe-li  ZHU Li-kun
Affiliation:1. School of Computer Science and Engineering, Tianjin University of Technology, Tianjin 300384, China; 2. College of Cyberspace Security, Nankai University, Tianjin 300350, China; 3. Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, Tianjin 300384, China
Abstract:With the rapid development of big data,it becomes more and more important to effectively solve the problems of copyright protection of data,preservation of data information,traceability of data,etc.Database watermarking is the most effective protection technique.The biggest challenge of this technology is how to carry out the embedded watermarking without affecting the data,and how to withstand the various attacks without affecting the extraction of watermark information.In this paper,we first describe the basic concepts and principles of database watermarking;Then,we introduce and classify common database watermarking techniques;Next,we summarize the attack behavior against database watermarking and analyze the anti-attack ability of specific watermarking technology;Moreover,we analyze the typical watermarking technologies based on distortion or not and the existing technical methods of database fingerprint briefly;Finally,we point out the key and shortcomings of current researches,and propose the development direction in the future.
Keywords:database watermarking  database fingerprint  copyright statement  robustness  
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号