期刊文献+

基于混合遗传算法的数据库水印算法研究

Study of Database Watermarking Algorithm Based on Hybrid Genetic Algorithm
原文传递
导出
摘要 将数字水印技术应用到数据库版权保护中,针对基于混合遗传算法的关系数据库水印算法实施了研究。结合标准遗传算法和禁忌搜索算法优点,克服了标准遗传算法易出现早熟以及局部寻优能力差等缺点,设计了数据库水印嵌入、检测及提取算法。 This digital watermarking technology will be applied to databases of copyright protection,in view of the relationship based on hybrid genetic algorithm to study the implementation of database watermarking.Combined with standard genetic algorithm and taboo search algorithm advantages of the standard genetic algorithm to overcome the premature and prone to poor local searching capability shortcomings,and designed the database watermark embedding,detection and extraction algorithm.
出处 《煤炭技术》 CAS 北大核心 2011年第4期172-174,共3页 Coal Technology
关键词 数据库水印 混合遗传算法 水印嵌入与检测 database watermarking hybrid genetic algorithms watermark embedding and detection
  • 相关文献

参考文献3

二级参考文献42

  • 1牛夏牧,赵亮,黄文军,张慧.利用数字水印技术实现数据库的版权保护[J].电子学报,2003,31(z1):2050-2053. 被引量:69
  • 2肖湘蓉,孙星明.基于水印的数据库安全控制研究[J].计算机工程与应用,2005,41(6):175-177. 被引量:8
  • 3郝彦军,朱琴,王丽娜,张焕国.数字水印演化设计[J].计算机工程,2006,32(6):157-159. 被引量:4
  • 4Sylvia L Osborn. Database security integration using role-based access control[C].In:IFIP Workshop on Database Security,2000:245~258.
  • 5Elisa Bertino,Sushil Jajodia,Picrangcla Samarati. A Flexible authorization mechanism for relational data management systems[J].ACMTransactions on Information Systems, 1999;17(2):101~140.
  • 6L Libkin,L Wong. On the Power of Aggregation in Relational Query Languages[C].In:Database Programming Languages(DBPL'97),Springer LNCS 1369,1997: 260~280.
  • 7孙星明,陈火旺,Lihua Yang et al. Mathematical Representation of a Chinese Character and its Applications[J].International Journal of Pattern Recognition and Artificial Intelligence,2002;16(8):735~747.
  • 8S Khanna,F Zane. Watermarking Maps:Hiding Information in Structured Data[C].In: Symposium on Discrete Algorithms (SODA), 2000.
  • 9Matunda Nyanchama,Sylvia L Osborn. Access Rights Administration in Roel-based Security Systens[C].In:IFIP Workshop on Database Security, 1994: 37~56.
  • 10Ingemar Cox,Matt L Miller,A L McKcllips.Watermarking as com munications with side information[J].Proceedings of the IEEE(USA),1999;87(7):1127~1141.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部