中国移动通信有限公司研究院,北京 100053
[ "耿慧拯(1988- ),男,中国移动通信有限公司研究院安全所高级工程师,主要研究方向为数字水印、隐私计算以及数据安全。" ]
[ "郭斯栩(1996- ),男,中国移动通信有限公司研究院安全所工程师,主要研究方向为数字水印、密码学与可搜索加密。" ]
[ "刘颖卿(1989- ),女,中国移动通信有限公司研究院安全所工程师,主要研究方向为数字水印、密码学与可搜索加密。" ]
[ "粟栗(1981- ),男,博士,中国移动通信有限公司研究院安全所副所长、正高级工程师,主要研究方向为移动通信网络安全和数据安全。" ]
[ "何申(1980- ),男,博士,中国移动通信有限公司研究院安全所所长、正高级工程师,主要研究方向为网络安全、物联网安全、移动互联网安全、可信计算等。" ]
收稿:2024-07-19,
修回:2025-07-30,
纸质出版:2025-10-20
移动端阅览
耿慧拯,郭斯栩,刘颖卿等.基于中国剩余定理的强鲁棒性多级数据库图像水印嵌入方案[J].电信科学,2025,41(10):197-209.
GENG Huizheng,GUO Sixu,LIU Yingqing,et al.A strong robust multi level database image watermark embedding scheme based on the Chinese remainder theorem[J].Telecommunications Science,2025,41(10):197-209.
耿慧拯,郭斯栩,刘颖卿等.基于中国剩余定理的强鲁棒性多级数据库图像水印嵌入方案[J].电信科学,2025,41(10):197-209. DOI: 10.11959/j.issn.1000-0801.2025181.
GENG Huizheng,GUO Sixu,LIU Yingqing,et al.A strong robust multi level database image watermark embedding scheme based on the Chinese remainder theorem[J].Telecommunications Science,2025,41(10):197-209. DOI: 10.11959/j.issn.1000-0801.2025181.
随着数据逐渐成为企业的一种资产形式,为了更好地发挥数据的价值,避免出现数据“孤岛”问题,结构化数据在企业内部和外部的共享场景日益增多。然而,由于现有的数字水印方案大多只能添加一次水印信息,如果重复添加,新水印会覆盖原有水印信息,导致无法实现对数据的多级溯源。针对上述问题,提出了一种基于中国剩余定理的多级数据库图像水印嵌入方案(multi-level database image watermark embedding scheme based on the Chinese remainder theorem,MIWC)。该方案以图像水印作为载体,通过Harr小波变换、布隆过滤器等方法对图像进行预处理,形成像素点布隆过滤器,并根据中国剩余定理的性质对水印信息进行秘密分片,实现对水印信息的分级逐条添加,进而对数据整个流转链路进行记录和溯源。功能性分析表明,该方案具备现有方案所缺乏的多级水印嵌入能力,具有较高的实际应用价值。实验结果显示,该方案具备可逆性,水印的嵌入与提取均表现出较高效率。同时,方案还具有较强的鲁棒性,能够抵抗针对水印的攻击。
With data gradually becoming a form of asset for enterprises
structured data is increasingly being shared both internally and externally to better leverage its value and avoid data silos. However
due to the fact that most existing digital watermarking schemes can only add watermark information once
repeated additions will overwrite the original watermark information
making it impossible to achieve multi-level traceability of data. In response to the above issues
a multi-level database image watermark embedding scheme based on the Chinese remainder theorem (MIWC) was proposed. This scheme used image watermarking as a carrier
preprocesses the image through Harr wavelet transform
Bloom filter and other methods to form pixel Bloom filter
and secretly segmented the watermark information according to the properties of the Chinese remainder theorem. The watermark information could be added step by step in a hierarchical manner
achieving the recording and traceability of the entire data flow chain. Functional analysis proves that the solution has the ability to embed multi-level watermarks that existing solutions do not have
and has high practical application value. Experimental results have shown that this scheme has reversibility and high efficiency in embedding and extracting watermarks. At the same time
the scheme has strong robustness
it can resist attacks against watermarks.
朱勤 , 于守健 , 乐嘉锦 . 数据库水印研究与进展 [J ] . 计算机工程与应用 , 2006 , 42 ( 29 ): 198 - 201 .
ZHU Q , YU S J , LE J J . Research work and progress in database watermarking [J ] . Computer Engineering and Applications , 2006 , 42 ( 29 ): 198 - 201 .
刘珺 , 罗守山 , 吴秋新 , 等 . 基于中国剩余定理的数字水印分存技术 [J ] . 北京邮电大学学报 , 2002 , 25 ( 1 ): 17 - 21 .
LIU J , LUO S S , WU Q X , et al . Digital watermark sharing based on Chinese remainder theorem [J ] . Journal of Beijing University of Posts and Telecommunications , 2002 , 25 ( 1 ): 17 - 21 .
曾皓炜 , 白恩健 , 吴贇 . 基于中国剩余定理和混沌系统的高低位图像分治加密 [J ] . 图像与信号处理 , 2023 , 12 ( 2 ): 116 - 127 .
ZENG H W , BAI E J , WU Y . Divide-and-conquer encryption of high and low bit images based on Chinese remainder theorem and chaotic system [J ] . Journal of Image and Signal Processing , 2023 , 12 ( 2 ): 116 - 127 .
陶伟成 , 李智勇 , 李厚甫 . 基于极角扩展的可逆盲数据库水印算法 [J ] . 计算机工程 , 2010 , 36 ( 22 ): 155 - 157 .
TAO W C , LI Z Y , LI H F . Reversible and blind database watermark algorithm based on polar angle expansion [J ] . Computer Engineering , 2010 , 36 ( 22 ): 155 - 157 .
崔新春 , 贺洁 , 秦小麟 . 基于盲源分离的多重音频数据库水印算法 [J ] . 电子学报 , 2012 , 40 ( 1 ): 80 - 85 .
CUI X C , HE J , QIN X L . A multiple audio watermarking for database based on blind source separation [J ] . Acta Electronica Sinica , 2012 , 40 ( 1 ): 80 - 85 .
DELAIGLE J F , DE VLEESCHOUWER C , MACQ B M M , et al . Digital watermarking [C ] // Proceedings of the International Society for Optical Engineering(SPIE) , Piscataway : IEEE Press , 1996 : 99 - 110 .
KHALLAF F , EL-SHAFAI W , EL-RABAIE E S M , et al . A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services [J ] . Frontiers of Information Technology & Electronic Engineering , 2023 , 24 ( 7 ): 1045 - 1061 .
ZHANG Z W , WANG H , WANG G S , et al . Hide and track: towards blind video watermarking network in frequency domain [J ] . Neurocomputing , 2024 , 579 : 127435 .
CHEN X , CHEN P , HE Y , et al . A self-resilience digital image watermark based on relational database [C ] // Proceedings of International Symposium on Knowledge Acquisition & Modeling . Piscataway : IEEE Press , 2008 : 698 - 702 .
CHANG C , NGUYEN T , LIN C C . A reversible database watermark scheme for textual and numerical datasets [C ] // Proceeding of the 2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) . Piscataway : IEEE Press , 2021 : 208 - 212 .
XIAN H , LI J , LU X . Tracing mobile database with complex watermark [J ] . International Journal of Database Theory and Application , 2015 , 8 : 23 - 28 .
MONTAZER M , KHODABIN M , EZZATI R , et al . Numerical solution of stochastic Volterra integral equations based on uniform Haar wavelets by using direct method [J ] . Asian-European Journal of Mathematics , 2023 , 16 ( 10 ): 16 .
HADIAN DEHKORDI M , MASHHADI S , FARAHI S T , et al . Changeable essential threshold secret image sharing scheme with verifiability using Bloom filter [J ] . Multimedia Tools and Applications , 2024 , 83 ( 20 ): 58745 - 58781 .
IQBAL S , RAUF A , MAHFOOZ S , et al . Self-constructing fragile watermark algorithm for relational database integrity proof [J ] . World Applied Sciences Journal , 2012 , 19 ( 9 ): 1273 - 1277 .
CHOWDHURY A A , KESSERWANI G , ROUGÉ C , et al . GPU-parallelisation of Haar wavelet-based grid resolution adaptation for fast finite volume modelling: application to shallow water flows [J ] . Journal of Hydroinformatics , 2023 , 25 ( 4 ): 1210 - 1234 .
丁妍 , 姚爱琴 , 张智尊 . 基于三次B样条小波变换和Canny算法的火焰边缘检测算法 [J ] . 无损检测 , 2023 , 45 ( 4 ): 43 - 47 .
DING Y , YAO A Q , ZHANG Z Z . Flame edge detection algorithm based on cubic B-spline wavelet transform and Canny algorithm [J ] . Nondestructive Testing Technologying , 2023 , 45 ( 4 ): 43 - 47 .
张桂芳 , 孙星明 , 肖湘蓉 , 等 . 基于中国剩余定理的数据库水印技术 [J ] . 计算机工程与应用 , 2006 , 42 ( 7 ): 135 - 136, 173 .
ZHANG G F , SUN X M , XIAO X R , et al . Database watermarking based on Chinese remainder theorem [J ] . Computer Engineering and Applications , 2006 , 42 ( 7 ): 135 - 136, 173 .
PATEL R . Relational database watermarking clustering based data-mining using K-Means approach [J ] . International Journal for Scientific Research & Development , 2015 , 3 ( 3 ): 1491 - 1495 .
姚绍华 , 陈青 , 陈祥 . 一种强鲁棒性的新型彩色图像数字水印技术 [J ] . 数据通信 , 2017 ( 4 ): 27 - 30 .
YAO S H , CHEN Q , CHEN X . A novel color image digital watermarking technique with strong robustness [J ] . Data Communications , 2017 ( 4 ): 27 - 30 .
汪天琦 , 张迎周 , 邸云龙 , 等 . 基于动态差分扩展的强鲁棒数据库水印算法研究 [J ] . 网络与信息安全学报 , 2023 , 9 ( 5 ): 150 - 165 .
WANG T Q , ZHANG Y Z , DI Y L , et al . Research on strong robustness watermarking algorithm based on dynamic difference expansion [J ] . Chinese Journal of Network and Information Security , 2023 , 9 ( 5 ): 150 - 165 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621