簡易檢索 / 詳目顯示

研究生: 柯祈宏
Ke, Chi-Hung
論文名稱: 關連式資料庫之浮水印技術研究
A study of watermarking in relational database
指導教授: 王明習
Wang, Ming-Shi
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系碩士在職專班
Department of Engineering Science (on the job class)
論文出版年: 2006
畢業學年度: 94
語文別: 中文
論文頁數: 97
中文關鍵詞: 關連式資料庫浮水印
外文關鍵詞: watermarking, relational database
相關次數: 點閱:173下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 資料庫系統和一般之數位資料一樣,都具有容易被複製的特性。近年來由於網路傳輸速度的不斷增加,使得資料庫更容易地被傳輸與交流。因此保護資料庫內容的智慧財產權確有其必要性以及急迫性。
    本論文除介紹目前關連式資料庫浮水印的相關技術外,並提出針對關連式資料庫中嵌入圖形浮水印的方法,藉此來保護資料庫的智慧財產權。本方法考慮對數值欄位來嵌入浮水印,且假設這些數值欄位皆允許被細微的修改,再利用量化的觀念將圖形的像素值轉換成十個阿拉伯數字符號的數字來嵌入這些數值欄位中。萃取時則利用三次多數決的方法來修正因各種攻擊所造成的誤差。本方法透過圖片易於辨識的特性來提高浮水印萃取出來的明確性,再經由重覆的嵌入圖片來增加資料庫浮水印的強韌性。實驗結果證明,本論文所提出的方法是可行的且具有相當高的強韌性。

    Like digital data, a database system is also easily to be duplicated and exchanged. To protect the content of a database system is necessary and urgent. In this thesis, except to servey the related techniques that have been used to discuss the watermarking methods for relational database, a novel watermarking method was proposed for the same purpose. The proposed method embeds an image watermark into the relational database under the assumption that the muneric attributes allowed a slight modification. The pixels values of the image watermark are quantized into ten levels to match the representing range of numeric attributes. Duplicated watermarks are embedded for increasing the robust of the proposed method. Majority voting method was adopted to extract the embedded watermarks for considering different kinds of attacks. The experimental results are verified and compared with some exsited methods. It is shown that the proposed method is practical and more robust than that of the discussed exsiting methods.

    摘 要..............................................................................................................I Abstract..........................................................................................................II 誌 謝............................................................................................................III 目 錄............................................................................................................IV 表目錄.......................................................................................................VIII 圖目錄...........................................................................................................X 第一章 緒論 .................................................1  1.1 研究背景...............................................1  1.2 研究目的與動機.........................................1  1.3 研究方法...............................................2  1.4 論文貢獻...............................................3  1.5 論文架構...............................................4 第二章 文獻探討..............................................5  2.1 浮水印的簡介...........................................5   2.1.1 浮水印的分類.......................................5   2.1.2 浮水印的基本需求...................................7   2.1.3 最少意義位元法(LSB-Least Significant Bit).........8  2.2 關連式資料庫浮水印....................................10   2.2.1 關連式資料庫浮水印的理論基礎......................10   2.2.2 關連式資料庫浮水印所面臨的挑戰....................12   2.2.3 關連式資料庫浮水印的基本需求......................13   2.2.4 關連式資料庫浮水印可能受到的攻擊..................13   2.2.5 關連式資料庫浮水印常用的方法與技術................16    2.2.5.1 最小有效數字法(LSD-Least Significant Digit)..16    2.2.5.2 訊息認證碼(MAC-Message Authentication Code)..18  2.3 過去相關的研究........................................19    2.3.1 Rakesh Agrawal 和Jerry Kiernan 所提出的方法.....19    2.3.2 Min Huang和 Jiaheng Cao等人 所提出的方法........26    2.3.3 ZHI-HAO ZHANG和 XIAO-MING等人所提出的方法.......36 第三章 關連式資料庫浮水印技術...............................41  3.1 概述..................................................41  3.2 演算法................................................41   3.2.1 基本假設..........................................42   3.2.2 參數說明..........................................44   3.2.3 區間範圍起迄表簡介................................45   3.2.4 嵌入流程..........................................48    3.2.4.1 建立區間......................................48    3.2.4.2 嵌入欄位順序..................................53    3.2.4.3 嵌入原始圖形..................................57   3.2.5 萃取流程..........................................64    3.2.5.1 重組區間......................................65    3.2.5.2 萃取欄位順序..................................66    3.2.5.3 重組原始圖形..................................68 3.3 演算法優缺點............................................72 3.4 演算法分析..............................................75 第四章 系統實驗與討論.......................................76  4.1 實驗環境..............................................76  4.2 實驗結果..............................................76   4.2.1 基本假設..........................................77   4.2.2 參數說明..........................................77   4.2.3 操作介面..........................................79   4.2.4 實驗值............................................80  4.3 相關研究的比較........................................91 第五章 結論與未來研究方向...................................93  5.1 研究結論..............................................93  5.2 後續研究建議..........................................93 參考文獻.....................................................95

    [1] 林禎吉、賴溪松,數位浮水印的技術,資訊安全通訊,第四卷,第三期,5-11頁,民87,6月。
    [2] 張真誠、黃國峰、陳同孝,電子影像技術,旗標出版股份有限公司,台北,民92,2月。
    [3] Frank Hartung and Martin Kutter, “Multimedia Watermarking Techniques”, Proceedings of the IEEE, Vol. 87, No. 7, pp.1079-1107, July 1999.
    [4] R.G. van Schyndel, A. Z. Tirkel, and C.F. Osborne, “A Digital Watermark”, The IEEE International Conference on Image Processing, Austin, Texas, USA, Vol. 2, pp.86-90, Nov. 13-16, 1994.
    [5] 張勇、趙東寧、李德毅,關係數據庫數字水印技術,計算機工程與應用,北京,中國,第25期,193-195頁,2003年,9月。
    [6] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan, “Watermarking relational data : framework, algorithms and analysis”, The International Journal on Very Large Data Bases, Vol. 12, No. 2, pp.157-169, Aug. 1, 2003.
    [7] 賴溪松、韓亮、張真誠,近代密碼學及其應用,旗標出版股份有限公司,台北,民92,2月。
    [8] Bruce Schneier, “Applied Cryptography : Protocols, Algorithms, and Source Code in C”, 2nd Edition, Wiley, New York, pp.429-460, Nov. 1995.
    [9] 國立交通大學分散式系統與網路安全實驗室。 (http://dsns.csie.nctu.edu.tw/course/intro-security/2005/book/Chap06.pdf)
    [10] Rakesh Agrawal and Jerry Kiernan, “Watermarking Relational Databases”, Proceedings of the 28th VLDB Conference, Hong Kong, China, pp. 155-166, Aug. 20-23, 2002.
    [11] 楊英一,「資料庫浮水印之研究」,碩士論文,國立高雄第一科技大學資訊管理系,民93。
    [12] Min Huang, Jiaheng Cao, Zhiyong Peng, and Ying Fang, “A New Watermark Mechanism for Relational Data”, Proceedings of the Fourth International Conference on Computer and Information Technology, Wuhan, China, pp. 946-950, Sep. 14-16, 2004.
    [13] Zhi-Hao Zhang, Xiao-Ming Jin, Jian-Min Wang, and De-Yi Li, “Watermarking relational database using image”, Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, China, pp.1739-1744, Aug. 26-29, 2004.
    [14] Radu Sion, Mikhail Atallah, and Sunil Prabhakar, “Rights Protection for Relational Data”, IEEE Knowledge and Data Engineering, Vol. 16, No. 12, pp.1509-1525, Dec. 2004.
    [15] 黃興銘,「高安全性的數位影像浮水印技術研究」,碩士論文,國立高雄第一科技大學電腦與通訊工程系,民88。
    [16] 陳淑怡,蔡阿佩,蕭如淵,「數位浮水印技術在著作權保護的探討,知識經濟、科技創新與組織管理學術研討會論文集」,台灣,銘傳大學,293-301頁,民90。

    下載圖示
    2007-08-30公開
    QR CODE