簡易檢索 / 詳目顯示

研究生: 姚嘉信
Yao, Jia-Xin
論文名稱: 改良直方圖位移技術達成可逆式資料庫浮水印之研究
A study on Reversible Database Watermarking Base on Improved Histogram Shifted
指導教授: 侯廷偉
Hou, Ting-Wei
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系碩士在職專班
Department of Engineering Science (on the job class)
論文出版年: 2022
畢業學年度: 110
語文別: 中文
論文頁數: 30
中文關鍵詞: 資料庫浮水印直方圖位移可逆式資訊隱藏資訊安全所有權保護
外文關鍵詞: database watermarking, histogram shifted, reversible data hiding, information security, ownership protection
相關次數: 點閱:78下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 可逆式資料隱藏是目前被廣泛應用於保護影像的方法之一。後續有學者將浮水印的概念應用於資料庫中,以達到所有權保護或竄改證明。資訊安全管理系統(ISMS)最新版指引ISO 27002:2022中,也針對資料庫內敏感資料增加相關控制措施。為了確保資料的機密性與完整性,本論文改良直方圖位移技術,利用關聯式資料庫的欄位進行資料保護。透過嵌入影像或保護訊號,可以針對原始資料進行保護:當資料遭揭露時,非經授權者無法得知原始資料;當資料遭非法異動時,可以取出事先藏入之浮水印來宣告資料的所有權,或透過保護機制來偵測遭竄改之資料,並可無失真還原其餘資料。
    根據實驗結果本論文之方法確實具有可行性。除了針對目前可逆式資料庫浮水印強韌性不足的缺點進行改善,另可提供公司或政府機構的資料庫資料保護上,符合ISO 27001:2022資料遮罩相關規範。

    Reversible data hiding is currently one of the most widely used method to protect images. Some scholars applied watermarks to databases to achieve ownership protection or tamper proof. The ISO 27002:2022 also adds security controls about sensitive data in the database.
    In order to ensure the confidentiality and integrity, the proposed approach is to improve the histogram shifting to protect the relational databases by embedding images or protecting signals. When the data is disclosed, the original data cannot be known; when the data are illegally altered, the watermark hidden in advance can be taken out to declare the ownership of the data, or the tampered data can be detected through a protection mechanism, and the restoring the rest of the data without distortion.
    According to the experimental results, the proposed approach is indeed feasible. It can improve the shortcomings of the current reversible database watermarks. It can also provide companies or government with database data protection that complies with ISO 27001:2022 data mask related specification.

    摘要 I Extended Abstract II INTRODUCTION III MATERIALS AND METHODS IV RESULTS AND DISCUSSIONS VIII CONCLUSION X 誌謝 XI 目錄 XII 表目錄 XIV 圖目錄 XV 第一章 緒論 1 1.1研究背景 1 1.2研究動機 2 1.3論文架構 3 第二章 文獻探討 4 2.1資訊隱藏文獻探討 4 2.2資料庫浮水印文獻探討 6 第三章 演算法設計 10 3.1.資訊藏入 10 3.2.資訊取出 15 3.3.偵測竄改 16 第四章 實驗與結果 17 4.1.實驗環境 17 4.2.資料庫浮水印 17 4.3.偵測資料竄改 22 4.4.演算法表現 24 第五章 結論與未來展望 28 參考文獻 29

    1.Agrawal, R. and J. Kiernan. Watermarking relational databases. in VLDB'02: Proceedings of the 28th International Conference on Very Large Databases. Elsevier, 2002.
    2.Al-Haj, A. and A. Odeh, Robust and blind watermarking of relational database systems. Journal of Computer Science, 4(12): p..1024-1029, 2008.
    3.Asikuzzaman, M. and M.R. Pickering, An overview of digital video watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 28(9): p. 2131-2153, 2017.
    4.Bender, W., et al., Techniques for data hiding. IBM systems journal, 35(3.4): p. 313-336, 1996.
    5.Czerwinski, S., R. Fromm, and T. Hodes, Digital music distribution and audio watermarking. UCB IS, 219, 2007.
    6.Gelot, S. and C. Bigard, Challenges to developing mitigation hierarchy policy: findings from a nationwide database analysis in France. Biological Conservation, 263: p. 109343, 2021.
    7.Hou, J., et al., Reversible data hiding based on multiple histograms modification and deep neural networks. Signal Processing: Image Communication, 92: p. 116118, 2021.
    8.Hwang, M.-S., M.-R. Xie, and C.-C. Wu, A Reversible Hiding Technique Using LSB Matching for Relational Databases. Informatica, 31(3): p. 481-497, 2020.
    9.Jalil, Z. and A.M. Mirza. A review of digital watermarking techniques for text documents. in 2009 International Conference on Information and Multimedia Technology, IEEE, p. 230-234, 2009.
    10.Katzenbeisser, S. and F. Petitcolas, Digital watermarking. Artech House, London, 2: p. 2, 2000.
    11.Kumar, S., B.K. Singh, and M. Yadav, A recent survey on multimedia and database watermarking. Multimedia Tools and Applications, 79(27): p. 20149-20197, 2020.
    12.Li, X., et al., High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal processing, 93(1): p. 198-205, 2013.
    13.Li, X., et al., Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security, 10(9): p. 2016-2027, 2015.
    14.Liu, M., et al., Reducing location map in prediction-based difference expansion for reversible image data embedding. Signal Processing, 92(3): p. 819-828, 2012.
    15.Ni, Z., et al., Reversible data hiding. IEEE Transactions on circuits and systems for video technology, 16(3): p. 354-362, 2006.
    16.Ou, B., et al., Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal processing: image communication, 29(7): p. 760-772, 2014.
    17.Peng, F., X. Li, and B. Yang, Improved PVO-based reversible data hiding. Digital Signal Processing, 25: p. 255-265, 2014.
    18.Potdar, V.M., S. Han, and E. Chang. A survey of digital image watermarking techniques. in IIEEE International Conference on Industrial Informatics. 2005.
    19.Qu, X. and H.J. Kim, Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Processing, 111: p. 249-260, 2015.
    20.SagarV, R., Watermark based copyright protection for relational database. International Journal of Computer Applications, 78(2): p. 22-28, 2013.
    21.Thodi, D.M. and J.J. Rodríguez. Reversible watermarking by prediction-error expansion. in 6th IEEE Southwest Symposium on Image Analysis and Interpretation, 2004. IEEE, p. 28-30, 2004.
    22.Wu, G.-Y.L., Che-Wei, A study on new data security techniques for leaked and tampered numeric data in cloud. Signal processing, 2019.
    23.Wu, H., et al., Improved PPVO-based high-fidelity reversible data hiding. Signal Processing, 167: p. 107264, 2020.
    24.Xie, M.-R., et al., A Survey of Data Distortion Watermarking Relational Databases. Int. J. Netw. Secur., 18(6): p. 1022-1033, 2016.
    25.Zhang, Y., B. Yang, and X.-M. Niu, Reversible watermarking for relational database authentication. Journal of Computers, 17(2): p. 59-66, 2006.

    下載圖示 校內:2024-07-26公開
    校外:2024-07-26公開
    QR CODE