首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--一般性问题论文--安全保密论文--加密与解密论文

Content Authentication and Rights Protection of Relational and XML Data Using Digital Watermarking

DEDICATION第5-6页
摘要第6-14页
Abstract第14-15页
List of Figures第19-20页
List of Tables第20-21页
CHAPTER 1: INTRODUCTION第21-30页
    1.1 Relational and XML Data Models第21-22页
    1.2 Overview Of Watermarking Technology第22-24页
    1.3 Watermarking Applications第24-26页
        1.3.1 Copyrights Protection by Owner Verification第24-25页
        1.3.2 Integrity Verification第25页
        1.3.3 Fingerprinting第25页
        1.3.4 Broadcast Monitoring第25页
        1.3.5 Covert Communication第25-26页
    1.4 Watermarking for Relational and XML Data第26-27页
        1.4.1 Research Question and Scope第26-27页
    1.5 Our Contribution第27-29页
        1.5.1 Relational Data Rights Protection第27-28页
        1.5.2 Relational Data Integrity Verification第28页
        1.5.3 Solution for XML Documents Security and Piracy第28-29页
    1.6 Thesis Organization第29-30页
CHAPTER 2: LITERATURE REVIEW第30-41页
    2.1 Relational Database Watermarking第30-38页
        2.1.1 Robust Watermarking Schemes for Copyrights Protection第30-36页
        2.1.2 Fragile Watermarking Schemes for Tamper Detection第36-38页
    2.2 XML Document Watermarking第38-41页
        2.2.1 Robust Watermarking Schemes for XML第38-39页
        2.2.2 Fragile Watermarking Schemes for XML Documents第39-41页
CHAPTER 3: QUERY PRESERVING WATERMARKING FOR RELATIONALDATA COPYRIGHT PROTECTION第41-54页
    3.1 Problem Statement第41-42页
    3.2 Our Scheme第42-47页
        3.2.1 Watermark Embedding第44-45页
        3.2.2 Watermark Detection Algorithm第45-47页
    3.3 Discussion第47-48页
        3.3.1 Security第47页
        3.3.2 Blind Detection第47页
        3.3.3 Query Preserving Watermark第47页
        3.3.4 Reduced Number Of Case Alterations第47-48页
    3.4 Experiments and Attacks Analysis第48-50页
        3.4.1 Tuple Deletion Attack第48-49页
        3.4.2 Data Modification Attack第49-50页
        3.4.3 Tuple Sorting Attack第50页
        3.4.4 Case Alteration Attacks第50页
    3.5 Multi-Bit Watermarking第50-52页
    3.6 Summary第52-54页
Chapter 4: SEMI-FRAGILE WATERMARKING SCHEME FOR RELATIONALDATA CONTENT AUTHENTICATION第54-70页
    4.1 Problem Statement第54-55页
    4.2 Proposed Scheme第55-60页
        4.2.1 Preliminaries第55-56页
        4.2.2 Watermark Embedding第56-59页
        4.2.3 Database Tamper Detection第59-60页
    4.3 Discussion第60-63页
        4.3.1 Semi-Fragile Watermark第61页
        4.3.2 Data Updates第61页
        4.3.3 Query Preserving Embedding第61页
        4.3.4 Alternate Solution for Non-Numeric Data第61-62页
        4.3.5 Comparison with Guo's Scheme第62-63页
    4.4 Security Analysis第63-66页
        4.4.1 Threat Model第63页
        4.4.2 Secure Embedding and Verification第63页
        4.4.3 Single Value Modification第63-64页
        4.4.4 Tuple Insertion Detection第64-65页
        4.4.5 Tuple Deletion Detection第65-66页
    4.5 Experimental Results第66-68页
        4.5.1 Relation Between 'g' and 't'第66页
        4.5.2 Experimental Setup第66-67页
        4.5.3 Multiple Value Modification第67-68页
        4.5.4 Multiple Tuple Deletion第68页
        4.5.5 Multiple Tuple Insertion第68页
    4.6 Summary第68-70页
Chapter 5: COMBINED WATERMARKING FOR XML DOCUMENTS第70-83页
    5.1 Problem Statement第71-72页
    5.2 Proposed Scheme第72-77页
        5.2.1 Watermark Embedding Algorithms第72-75页
        5.2.2 Watermark Detection第75-77页
    5.3 Discussion第77-78页
        5.3.1 Dual Purpose Watermarking第77-78页
        5.3.2 Improved Protection for Robust Watermark第78页
        5.3.3 Blind Watermark Detection第78页
        5.3.4 Distortion Free Embedding第78页
    5.4 Experiments and Results第78-82页
        5.4.1 Robust Watermark Attack Analysis第79-80页
        5.4.2 Fragile Watermark Tamper Detection第80-82页
    5.5 Summary第82-83页
Chapter 6: CONCLUSION AND FUTURE WORK第83-85页
References第85-91页
Acknowledgements第91-93页
Appendix A: Published Papers List第93-94页
Appendix B: Prototypes' Screen Shots第94-96页

论文共96页,点击 下载论文
上一篇:工程化的人抗人IgE抗体的制备
下一篇:PSMC3抑制蛋白酶体对Argonaute2的降解及机制研究