A Method of Protecting Relational Databases Copyright with Cloud Watermark

With the development of Internet and databases application techniques, the demand that lots of databases in the Internet are permitted to remote query and access for authorized users becomes common, and the problem that how to protect the copyright of relational databases arises. This paper simply introduces the knowledge of cloud model firstly, includes cloud generators and similar cloud. And then combined with the property of the cloud, a method of protecting relational databases copyright with cloud watermark is proposed according to the idea of digital watermark and the property of relational databases. Meanwhile, the corresponding watermark algorithms such as cloud watermark embedding algorithm and detection algorithm are proposed. Then, some experiments are run and the results are analyzed to validate the correctness and feasibility of the watermark scheme. In the end, the foreground of watermarking relational database and its research direction are prospected.




References:
[1] LI Deyi, MENG Haijun, SHI Xuemei, 1995, Membership clouds and
membership clouds generator. Journal of Computer Research and
Development, 32(6): 15-20
[2] WANG SHULIANG, LI Deren, SHI Wenzhong, LI Deyi, WANG
Xinzhou. 2003, Cloud Model-Based Spatial Data Mining. Geographical
Information Science, 9(2):67-78.
[3] CHEN Gang, 2003, Handwriting Identification Based on Data Field.
Master dissertation, PLA University of Science and Technology, Nanjing,
PRC.(in Chinese)
[4] ZHANG Yong, ZHAO Dongning, LI Deyi, 2004, The Similar Cloud and
the Measurement Method. Information and Control, 33(2):129-132.(in
Chinese)
[5] ZHANG Yong, ZHAO Dongning, LI Deyi, 2003, Watermarking
Relational Databases. Journal of PLA University of Science and
Technology(Nature Science), 4(5):1-4.(in Chinese)
[6] Agrawal R, Kiernan J. Watermarking Relational Databases. In:
Proceeding of the 28th VLDB Conference. Hong Kong: University of
Science & Technology, Hong Kong, 2002: 155-166.
[7] Bender W, Gruhl D, Morimoto N, Lu A. Techniques for Data Hiding.
IBM Systems Journal, 1996, 35(3,4):313-336.
[8] Sion R, Atallah M, Prabhakarl S. Watermarking Relational Databases.
Technical Report. Indiana: the Center for Education and Research in
Information Assurance and Security of Purdue University, 2002.
[9] ZHANG Yong, ZHAO Dongning, LI Deyi, 2003, Digital Watermarking
for Relational Databases. Computer Engineering and Application.
39(25):193-195.(in Chinese)