基于自适应嵌入的高抗毁数据水印技术研究
Research on High Invulnerability Data Watermarking Technology Based on Adaptive Embedding
DOI: 10.12677/CSA.2021.114081, PDF,    国家科技经费支持
作者: 邹云峰, 单 超:国网江苏营销服务中心(计量中心),江苏 南京;胡 俊:安徽继远软件有限公司,安徽 合肥;于鹏飞:全球能源互联网研究院有限公司,江苏 南京;信息网络安全国网重点实验室,江苏 南京
关键词: 数据安全数据水印精准溯源Data Security Data Watermarking Accurate Traceability
摘要: 国家大数据战略下,数据需要各个环节间流转、重组、使用,同时数据的管理控制权也随之转移,数据一旦泄露,数据提供者非常希望能够精确溯源是否是数据使用环节的责任。数据水印技术通过高仿真实数据内容,并参入标识信息,数据使用者不易察觉,并且有很强的隐蔽性和抗毁性,可有效满足数据安全流转需求。文章提出了一种基于自适应嵌入的高抗毁数据水印方法,可灵活针对目标数据的特性,在保证目标数据可用性的前提下,尽可能的保证数据水印嵌入率,提高数据水印的抗毁性。
Abstract: Under the National big data strategy, data needs to be transferred, reorganized and used among every chain. At the same time, the management control of data is also transferred. Once the data is leaked, the data provider hopes to be able to accurately trace whether it is the responsibility of the data use link. Data watermarking technology can effectively meet the needs of data security circulation by highly imitating the real data content and adding identification information, which is not easy to be detected by data users, and so data watermarking technology has strong concealment and invulnerability. This paper proposes a high invulnerability data watermarking method based on adaptive embedding, which can flexibly face to the characteristics of the target data, and then ensure the embedding rate of the data watermark as much as possible and the availability of the target data, and also improve the invulnerability of the data watermark.
文章引用:邹云峰, 胡俊, 单超, 于鹏飞. 基于自适应嵌入的高抗毁数据水印技术研究[J]. 计算机科学与应用, 2021, 11(4): 795-802. https://doi.org/10.12677/CSA.2021.114081

参考文献

[1] 中共中央国务院. 关于构建更加完善的要素市场化配置体制机制的意见[N]. 新华社北京, 2020-4-9(电).
[2] 张衠. 大数据安全风险与对策研究——近年来大数据安全典型事件分析[J]. 信息安全与通信保密, 2017(6): 102-107.
[3] 张晓娟, 王文强, 唐长乐. 中美政府数据开放和个人隐私保护的政策法规研究[J]. 情报理论与实践, 2016, 39(1): 38-43.
[4] 安小米, 穆勇, 王薇,等. 我国涉及隐私的个人信息保护与管理法律法规状况及要求分析[J]. 北京档案, 2011(5): 19-21.
[5] 王铮, 曾萨, 安金肖, 等. 欧盟《一般数据保护条例》指导下的数据保护官制度解析与启示[J]. 图书与情报, 2018(5): 119-125.
[6] 中华人民共和国网络安全法(2016年11月7日第十二届全国人民代表大会常务委员会第二十四次会议通过)[EB/OL]. http://www.npc.gov.cn/wxzl/gongbao/2017-02/20/content_2007531.htm, 2017-02-20.
[7] 中华人民共和国司法部.《数据安全管理办法(征求意见稿)》[EB/OL] http://www.moj.gov.cn/news/c-ontent/2019-05/28/zlk_235861.html, 2019-08-28.
[8] Agrawa, R. and Kiernan, J. (2002) Chapter 15-Watermarking Relational Databases. VLDB '02: Proceedings of the 28th International Conference on Very Large Databases, Hong Kong, 20-23 August 2002, 155-166.
[9] Halder, R., Pal, S. and Cortesi, A. (2010) Water-marking Techniques for Relational Databases: Survey, Classification and Comparison. Journal of Universal Computer Science, 16, 3164-3190.
[10] Bhattacharya, S. and Cortesi, A. (2013) A Distortion Free Watermark Framework for Re-lational Databases. Proceedings of the International Conference on Software and Data Technologies, 2, 229-234.
[11] Hu, D.H., Zhao, D. and Zheng, S.L. (2019) A New Robust Approach for Reversible Database Water-marking With Distortion Control. IEEE Transactions on Knowledge and Data Engineering, 31, 1024-1037. [Google Scholar] [CrossRef