透過您的圖書館登入
IP:3.14.143.91
  • 學位論文

數位浮水印技術於資料庫驗證與所有權保護之研究

A Study of Database Authentication and Ownerships Protection Based on Digital Watermarking

指導教授 : 吳憲珠
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


本論文主要探索數位浮水印技術應用於資料庫的保護上的成效,這樣的技術稱之為資料庫浮水印技術。數位浮水印技術是一種資訊隱藏技術, 它可分為兩個部分,一個是以保護資料版權為目的的強韌型浮水印技術,而另一個是以偵測完整性為目的的碎型浮水印技術。針對資料庫而言可以藉由這兩種浮水印技術來達到對資料庫內容的版權驗證或完整性驗證的目的。目前的資料庫浮水印的研究都需要更改表格內的資料值以達到嵌入浮水印的目的,然而,資料庫內的資料大多是敏感性的資料,一旦經過修改之後其所代表的意義將跟著被破壞。因此,本論文提出一個基於不破壞資料庫內的資料意義之原則即可達成保護目的的資料庫浮水印技術方法。這個方法利用找出每筆值組的特徵值後與一張數位浮水印影像內的像素值做個別的結合來達到嵌入強韌型浮水印目的,同時利用每筆值組的特徵做配對成組的法則並藉由比對以達成嵌入碎型浮水印的目的。實驗結果證明本方法除了具備驗證資料庫的擁有者之版權的功能外也具有偵測資料庫內的資料是否遭受到竄改的功能。 另一方面,本論文還提出兩個可逆式的資料庫浮水印技術來保護資料庫裡的資料。這兩個方法可以在取回浮水印的時候將因嵌入而遭受到修改的資料還原回原始資料,並透由取出來的浮水印來證明資料庫的所有權或驗證資料庫的完整性。第一個方法從每個屬性中擷取出特徵值並利用這些特徵值建立一棵四元樹以產生可逆式的浮水印嵌入技術。當使用者做完資料庫的驗證處理之後,除了可以藉由取出的資訊值還原浮水印以達版權所有的驗證功能外,還可以將資料庫裡的資料完整的恢復。實驗結果顯示本方法在不同機率的竄改攻擊與屬性欄位值被調換的攻擊之下仍可取出清晰的浮水印影像以證明版權所有。第二個方法利用了De-clustering分群的方法達成可逆式的浮水印技術。本方法從每一個屬性擷取的特徵值做分成四群,每一群各自代表著不同的浮水印資訊。之後利用每一屬性的特徵值與相對映的浮水印資訊的所屬群內的各個特徵值做差值比較,使用差值較小的特徵替換原始特徵值來達到嵌入浮水印的目的。使用者除了可以藉由取回的浮水印做完整性驗證的功能外,同時還可以將嵌入過浮水印的資料還原回原值。實驗結果顯示本方法除了可以藉由取出的浮水印驗證資料的完整性外,還在可以在取出驗證資訊後100%的還原資料庫裡的資料。 關鍵詞:數位浮水印技術、版權保護、資料庫浮水印、雙重浮水印技術、所有權驗證、完整性驗證、可逆式浮水印技術、De-Clustering Technique

並列摘要


This thesis focuses on digital watermarking and its applications in database protection. Digital watermarking is a kind of information hiding techniques, it can partition into two parts: one is robust watermarking for copyright protection, the other is fragile watermarking for tampering detection. Database watermarking is used to protect the database by embedding digital watermarks into the protected database. Hence digital watermarking can be used to achieve database ownership verification and tampering detection. In recent years, most existing database watermarking schemes altered the data of tables to embed watermarks. However, most data in a database are sensitive. When some data are modified, it would let the data become useless. Hence, how to embed watermark without modifying any data is very important. In this thesis, a database watermarking schemes is proposed that it embed watermark into databases without destroying any protected data’s meaning. This scheme extracts a feature from each tuple to combine with each pixel of a watermark image for embedding a robust watermark, and the features of each couple of t uples are compared to embed a fragile watermark by an embedding rule. The experimental results showed that the proposed scheme can not only copyright verification but also tampering detection, and have a significant achievement. In addition, this thesis proposed two reversible watermarking schemes to protect database. These schemes can restore original data after extracting watermark and verify ownership or integrity according to extracting watermark. The first scheme is a robust reversible watermarking scheme by building quart-tree to embed a watermark. The first reversible watermarking scheme utilizes extracting features from every attributes to build quarter-tree. When user verified ownership according to the extracted watermark, the data in the database can restore its original value. The experimental results showed that the first reversible watermarking scheme can not only achieve copyright verification by extracting watermark under different alteration rate attacks and attribute out-of-order attacks but also restore original data after extracting watermark image. The second scheme is a fragile reversible watermarking by using de-clustering technique to embed a watermark. The second reversible watermarking scheme utilizes extracting features from every attribute to group four groups for representing watermark information. It utilizes features of every attributes to find the small least value from the corresponding watermark group and utilizes the fined value to change the original feature of the attribute for embedding watermark. When users verified database integrity according to the extracted watermark, the data can restore the original value in the same time. The experimental results showed that the second reversible watermarking scheme not only verifies integrity of database but also restores original data in 100% rate after extracting watermark. Keywords: Digital watermarking, copyright protection, database watermarking, dual watermarking, ownership verification, integrity verification, reversible watermarking, de-clustering technique.

並列關鍵字

無資料

參考文獻


[1] R. Agrawal and J. Kiernan, "Watermark Relational Databases," in Proceedings of the 28th international conference on Very Large Data Base, Hong Kong, 2002, pp. 155-166.
[2] R. Agrawal, P.J. Hass, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis, " The VLDB Journal, Vol. 12, No. 2, 2003, pp. 157-169.
[3] M. T. Fang, R. C. T. Lee, and C. C. Change, "The Idea of De-Clustering and Its Applications," in Proceedings of the 12th international conference on Very Large Data Base, Kyoto, 1986, pp. 181-188.
[4] G. Gautam and B. B Chaudhuri, "A Novel Genetic Algorithm for Automatic Clustering," Pattern Recognition Letters, Vol. 25, 2004, pp. 173-187.
[6] H. Guo, Y. Li, A. Liu, and S. Jajodia, "A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations," Information Sciences, Vol. 176, No. 10, May 2006, pp. 1350-1378.

延伸閱讀