skip to main content
10.1145/3358528.3358596acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdtConference Proceedingsconference-collections
research-article

Database Watermarking Scheme Based on Clustering with Size Constraint

Published:28 August 2019Publication History

ABSTRACT

The improved fuzzy C-means clustering algorithm is used in the process of selecting data to embed watermark. Firstly, aiming at the problem of unstable data size in the traditional fuzzy C-means clustering in the clustering results, the fuzzy C-means clustering algorithm was optimized. Moreover, the data category was further determined on basis of the addition conditional constraints to the clustering. Each tuple of the database can be preliminarily clustered due to the introduced algorithm for database watermark. Then, in each category, the user can select one or several types of data utilized the key control to embed into the watermark. Before embedding the watermark, the proportion parameter is set according to the sparse degree of the watermark, which reflects the principle that the user controls the copyright.

References

  1. He Q, Zhao J H, Research on Digital Watermarking Algorithm[J]. China Computer & Communication, 2017(7):82--83.Google ScholarGoogle Scholar
  2. Zhu Q, Yu S J, Le J J,Research Work and Progress in Database Watermarking[J].Computer Engineering and Applications,2006, 42(29): 198--201.Google ScholarGoogle Scholar
  3. Yu J, On the Fuzziness Index of the FCM Algorithms[J]. Chinese Journal of Computers,2003, 26(8):968--973.Google ScholarGoogle Scholar
  4. Gao X B, Xie W X, Optimal Choice of weighting exponent in a Fuzzy C-Means Clustering Algorithm[J]. Moshi Shibie yu Rengong Zhineng,2000, 13(1):7--11.Google ScholarGoogle Scholar
  5. LIU C S, XU Q L,Fuzzy C-means clustering algorithm based on density peak value optimization[J]. Computer Engineering and Applications,2018, 54(14):158--162.Google ScholarGoogle Scholar
  6. Höppner F, Klawonn F. Clustering with Size Constraints[J]. Studies in Computational Intelligence,2008, 137:167--180.Google ScholarGoogle Scholar
  7. Agarwal N, Singh A K, Singh P K. Survey of robust and imperceptible watermarking[J]. Multimedia Tools and Applications,2019(3).Google ScholarGoogle Scholar
  8. Zhang Y, NIU X M, Reversible Watermark Technique for Relational Databases[J]. Acta Electronica Sinica,2006, 34(S1):2425--2428.Google ScholarGoogle Scholar
  9. Xiao D, Ma Q Q, Wang L, et al. Cloud-assisted Secure Digital Watermarking Based on Sparse Representation[J]. Netinfo Security, 2017(1):1--7.Google ScholarGoogle Scholar
  10. YIN H, Lin C, Qiu F, et al. A Survey of Digital Watermarking[J]. Journal of Computer Research and Development,2005, 42(7):1093--1099.Google ScholarGoogle Scholar

Index Terms

  1. Database Watermarking Scheme Based on Clustering with Size Constraint

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICBDT '19: Proceedings of the 2nd International Conference on Big Data Technologies
      August 2019
      382 pages
      ISBN:9781450371926
      DOI:10.1145/3358528

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 August 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader