• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    2022-08-23 02:19:34KhalidElDrandalyWalidKhedrIslamMohamedandAymanMohamedMostafa
    Computers Materials&Continua 2022年6期

    Khalid A.El Drandaly,Walid Khedr,Islam S.Mohamed and Ayman Mohamed Mostafa

    1Faculty of Computers and Informatics,Zagazig University,Zagazig,44519,Egypt

    2College of Computer and Information Sciences,Jouf University,Sakaka,72314,Saudi Arabia

    Abstract: Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge, this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition, the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recover more than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely.

    Keywords: Information security; digital watermarking; information hiding;histogram shifting technique

    1 Introduction

    A relational database is a major tool for storing and managing data from information systems,which should be protected from vulnerabilities.A digital database presents a substantial value in information space.In essence,a database is created,stored,managed,and transmitted through various computer networks,leading to an overload in the contents of the security database.Thus,securing the database is considered the last line of defense for protecting data from disclosure.Recent security breaches that can disclose confidential information from databases include user privacy threats,sensitive data threats,malicious attacks,and insider attacks[1,2].These security breaches can result in data loss and information theft.Therefore,recent security research proposed digital watermarking technology as a promising strategy for maintaining the secrecy and integrity of databases[3].Digital watermarking is considered a method for information hiding; that is, it hides data from attackers.Watermarking technology can protect data by updating the database and inserting watermarks in the shape of texts, binary bits, or images known only to the data owner.Protecting data through watermarking can protect intellectual property rights, promote ownership proofing, and ensure content authentication and security[4].

    The watermarking process is conducted by embedding a watermark into the database content,known as the secure part.Watermarked data are transmitted across computer networks,which can be vulnerable to various security attacks.Once the destination host receives the watermarked data, the detection process is executed to detect the watermarked data without distortion.As a result, digital watermarking can be used to authenticate the owner who bears the sole right to modify the database content.However, the majority of research on watermarking related to non-numeric data exhibited high distortion rates.Thus, this study proposes a novel method for applying digital watermarking to non-numeric databases with low rates of data distortion to improve the security, robustness, and effectiveness of data.The paper contributes to the literature as follows:

    · For the first time, a watermark is embedded into non-numeric relational databases using the histogram shifting(HS)of the prediction error expansion technique with a low distortion rate and high watermarking capacity.

    · The proposed method is tested to verify the robustness and security of watermarked data against popular attacks,such as insertion,deletion,and alteration attacks.

    · The watermark embedding process resulted in replacing the entire word in the candidate(multiword) attribute.In this manner, the attackers cannot anticipate the watermark without using a secret key owned by the database owner.After applying the detection process, data can be recovered by 100%.

    · The proposed method does not affect the usefulness of data.Moreover,it can hide watermark bits in a large space of the database.This method is more secure due to the use of a secret key owned by the database owner.

    The remainder of the paper is structured as follows.Section 2 provides a review of the related literature.Section 3 discusses the structure of the algorithm using the HS model.Section 4 describes the design of the proposed algorithm.Section 5 presents the experimental results and data analysis of the proposed algorithm.Lastly,Section 6 presents the conclusion and recommends directions for future work.

    2 Literature Review

    An extensive literature review is conducted to explain the concept of watermarking by highlighting the major researches and techniques on watermarking database on numeric data as presented in[5–13]and non-numeric data researches as explained in[14–22].The literature is filled with substantial studies in the watermarking field for numeric data,images,audio,and videos.Agrawal and Kiernan[5]were the first to develop the database watermarking method.The technology of database watermarking has gained widespread interest.A database contains different types of data, mainly grouped under two categories,namely,numeric and non-numeric.

    2.1 Numeric Data

    Numeric data display little change with a suitable range on the least significant bit of its binary bits.Bhattacharya and Cortesi [6] proposed inserting the watermark after splitting tuples as a replacement.However, the embedding rate of difference expansion watermarking (DEW) will be reduced according to the distortion constraint.In terms of Robust Reversible Watermark (RRW),Iftikhar et al.[7] introduced a reversible and strong watermarking technique for relational data that works on numeric attributes.In this technique, features are selected using mutual information.Moreover,Wu and Shih[8]introduced a robust method that uses a genetic algorithm(GA)merged with difference expansion watermarking(GADEW)to develop a strong database watermarking solution.Alternatively,Imamoglu et al.[9]proposed a new bio-inspired optimization algorithm and developed a method for inserting watermarks into a relational database.The current study recognizes and applies DEW to achieve two objectives: reducing distortion rate and decreasing elaboration within database watermarking.As presented by Hu et al.[10],GA combined with HS watermarking produced a new robust and reversible watermarking technique called Genetic algorithm histogram shifting watermarking (GAHSW) that are applied to numeric data.Franco-Contreras and Coatrieux [11]presented a robust and lossless watermarking scheme that utilizes circular histogram modulation for relational databases.As presented by Tufail et al.[12], evolutionary techniques were applied to the proposed scheme.The MRMR-based FSS technique promotes the robustness of watermarks because it presents attackers with difficulty in anticipating altered columns.The results demonstrated that the developed WET technique outperforms recent techniques, such as DEW, GADEW, RRW(Robust Reversible Watermarking), and PEEW (Prediction-error Expansion Watermarking).Lian[13]illustrates that a reversible watermarking method based on the ant colony algorithm is combined with DEW.The results revealed its ability to maximize watermark space and promoting its robustness against several types of attack.

    2.2 Non-numeric Data

    Currently, watermarking textual data has become popular according to the large number of documents shared and produced daily.With the progress of the internet and communication worldwide, several text watermarking techniques have been developed.For example, Al-Haj and Odeh[14] presented a robust and blind database watermarking algorithm for entering watermark in the shape of binary images in non-numeric multi-word columns along specific database rows.Moreover,Sion et al.[15] and Sion [16] applied the watermarking process to categorical data by switching columns from text to numeric using particular rules.The least significant bit was updated to detect changes in attributes.Hanyurwimfura et al.[17] and Melkundi and Chandankhede [18] proposed computing the editing distance between two neighboring words and selecting two words with the lowest distance for the embedding process.Khanduja et al.[19]computed the American Standard Code for Information Interchange(ASCII)sum of primary keys to identify symbols added to columns,whose values can then be changed by adding corresponding characters at the end of it in the determined row to insert the watermark.Bedi et al.[20] demonstrated that the watermark is produced using eigenvalues based on the measured ASCII of non-numeric attributes.For each row,a relational matrix is created.Conversely,Khadam et al.[21]proposed a secure and robust digital watermarking method that provides copyright protection to a text document using data mining.Based on the experimental results,the method is robust against formatting attacks.Moreover,Li et al.[22]introduced a relational database watermarking algorithm for non-numeric attributes.This method is based on the insertion of words on an attribute to replace its value using Chinese word segmentation to detect removable words.Furthermore, the method explains the rate of similarity distortion produced by entering words.Tab.1 provides a brief overview of watermarking techniques for numeric and non-numeric relational databases.Recent research papers are compared based on their data format,watermarking information,and the percentage of recovery after insertion,alteration,and deletion attacks.

    Table 1: Classification of numeric and non-numeric watermarking techniques

    The watermarking process on non-numeric data leads to high rates of distortion of detected data after applying insertion, alteration, and deletion attacks.Thus, we proposed an effective and robust technique to minimize the distortion rate of detected data.

    3 Histogram Shifting Model

    Ni et al.[23] applied the HS technique to digital image watermarking for the first time, which became the focus of scholarly attention in the recent period[24–34].In an interval from 2006 to 2017,HS was applied to multimedia data,such as images for inserting watermarks[24].HS is superior to the existing methods in the embedding payload.Conversely, Lin et al.[25] used HS as a multilevel technique and displayed its ability to achieve high rates in reaching the acceptable range of data distortion.

    The concept of HS is based on hiding watermarks using a histogram peak value.Alghamdi et al.[35]proposed a database watermarking scheme to obtain non-zero prediction errors from two neighboring raw values in the database.Constructing the histogram involves a horizontal axis is represented by error values,whereas the frequency of each value of prediction errorPeis the vertical axis.Using Eq.(1),we compute forPeas follows:

    where:xi+1-xiare two neighboring values.A peak bin with non-zero frequency is found in the histogram,which represents prediction error asP.To create a vacancy nearP,all bits are shifted by one cell,except forP.After that,each prediction error is considered untilPis achieved.The watermark bit(w=0or w=1)is inserted,and the new prediction error valueis computed as demonstrated by Eq.(2):

    The method used is the inverse integer Harr wavelet transform [35] to generate two new attribute values,namely,and,from the calculatedThe median value of the two values is calculated,as shown in Eq.(3):

    The watermarked attribute values can be calculated as follows:

    For example,Xi= 102 andXi+1= 108 are two neighboring values.Thus,Pe= 108-102=6.Then,Xmwill be equal to(102+108)/2=105.If peak bitP=4,whereas the embedded watermark bitw=1,then the new value of=4+1=5.The new attribute values are computed as follows:

    4 Proposed Watermarking Algorithm

    This section presents the proposed algorithm for watermarking non-numeric and multi-word databases based on the HSW of prediction-error expansion.The advantage of using Histogram Shifting Model is that it provides a robust watermarking method and improves data quality for databases.In this scheme, all tuples are securely divided into non-overlapping subsets.A single watermark bit is embedded into some tuples of a subset by updating attribute values in the group.A watermark bit is embedded repeatedly into one group.Fig.1 displays the overall framework for preprocessing,embedding the watermark,and detecting the watermark.

    Based on Fig.1, the following subsections present the three main phases of watermarking nonnumeric databases.

    Figure 1:Schematics of the watermarking process

    4.1 Preprocessing Phase

    The preprocessing phase is composed of four steps:

    · Identifying candidate attributes: non-numeric candidate attributes are selected from the database for inserting or embedding watermarks.

    · Sorting non-numeric attributes: the selected non-numeric attributes are sorted alphabetically from A to Z based on headers to enhance the robustness of the proposed algorithms.

    · Computing the semantic distortion range: the distortion range of the attributes is computed using the maximum and minimum values of each attribute based on the sum of the word ASCII.For example,the ASCII of the word{‘Brand’}=66{‘B’}+114{‘r’}+97{‘a’}+110{‘n’}+100{‘d’} = 487.To compute the tolerance of attributes according to ASCII values, the tolerance of thej-th attribute can be computed using Eq.(8):

    · Grouping tuples: a random secret key is generated, and the group number of each tuple is determined using Eq.(9):

    where:

    ·Nu=a group serial number;

    · ‘‘|’’=the concatenation operation;

    · H()=a hash function;

    ·KS=the grouping secret key;

    ·tu.PK=the tuple’s primary key;

    ·Ng= the number of groups in the database, which is equal to the number of watermark bits.

    For example,if the watermark bits are equal to 48,thenNg=48.

    For a quick reference,Tab.2 contains lists of the notations used in this paper.

    Table 2: Notations used in the paper

    4.2 Embedding Phase

    The HS method is mainly dependent on embedding one watermark bit in each group.Therefore,the embedding process of the watermark is considered a repetitive process of performing consecutive steps for each group.Fig.2 depicts the process of embedding watermarks.

    The overall processes for embedding the watermark are explained as follows:

    · Determining thej-th column,whose value is altered using the following equation:

    wherejis the value of the candidate column to be watermarked, whereaszdenotes the number of non-numeric attributes in the database.

    · Constructing a histogram of each group based on the following steps:

    - First,compute thePevalue of each group using Eq.(11),then computeusing Eq.(12).The peak bin with a non-zero frequency can be calculated using the absolute value ofPebefore inserting watermarks.

    - Second,store the peak value asPin an array calledPa,which can be used as an input to the detection process.Pecan be shifted to both sides ofP.In the last step,we scan eachPeto insert a 1-bit watermarkW.is represented as Pe’s corresponding new prediction error,which is computed using Eq.(12).

    Then,the new attribute valuey′is derived using Eq.(13):

    - Lastly,embed the watermark bit in the selectedj-th attribute.

    Figure 2:Process of embedding the watermark

    The abovementioned steps are repeated for all rows in the database to be altered.Algorithm 1 explains the overall embedding process.

    Algorithm 1:Watermarking Embedding Process Input:Variables:D,W,z.//read non-numeric data from excel file.Output:DW,Pa,Mp.1:Compute tolerance of the columns based on sum of word’s ASCII numbers by Eq.(8).2:Divide tuples in database in groups by using Eq.(9).3:for w=1 to l do 4://loop will iterate for all watermark bits’w from 1 to length l of the watermark.5:for i=1 to N/Ng do 6://loop will iterate for all tuples of each group.7:j=H(KS|tu.PK)%z;8://identify marked attribute column.9:if Aij=max[j]or Aij=min[j]then 10:j=(j+1)%z;11:insert tu.PK of Aij into Mp;12:End if 13:Pe is calculated by using Eq.(11);14:End for 15:p is determined by the peak point of the histogram of the absolute value of Pe;16:insert p into pa;17:for i=1 to N/Ng do 18:P′e is calculated by using Eq.(12);19:the corresponding attribute value is watermarked by using Eq.(13);20:End for 21:End for 22:return DW,pa,Mp.

    4.3 Watermark Detection Phase

    The watermark detection and data recovery procedure are reported in detail using the following steps.

    · To detect the watermark and recover the original data,sorting non-numeric attributes alphabetically from A to Z based on headers is necessary.

    · Computing the minimum and maximum of columns based on the summation of word’s ASCII numbers(ex:‘Brand’ASCII ≥66{‘B’}+114{‘r’}+97{‘a’}+110{‘n’}+100{‘d’}=487)

    · Applying Eq.(9)to determine the group number for each tuple based on the secret key,which was used in Algorithm 1.

    · Detecting the watermark using the HS detection technique as follows:- Considery′is the value of the attribute in the watermarked database, where asy∧is the

    predictor ofy′.Thus,the new prediction errorcan be calculated using Eq.(14).

    - Consider thevalue that determines whether the inserted bit (w) is 0 or 1 and count the number of zeroes ≥(a)and ones in that group ≥(b).

    · Recovering data,the value of the attribute is restored as follows:

    After computing the original value of the entire group,determine the watermark bit based on whether(a>b) watermark bit is 0; otherwise, the watermark bit is 1.Algorithm 2 describes the detection process.

    Input:DW,z,pa,mp.//read watermarked data from excel file Output:DR,Wdet 1:Compute tolerance of columns based on sum of word’s ASCII numbers by Eq.(8)2:Divide the tuples in database in groups by using Eq.(9);3:a=0;b=0;4:For s=1 to 1 Do 5:For i=1 to N/Ng Do 6://loop will iterate for each group tuples.7:j=H(KS|tu.PK)%z;8://determine the column that it’s value is altered 9:If(AWij=max[j]or Aw ij=min[j])and find the tu.pk of Aij in mp Then 10:j=(j+1)%Z;11:End If 12:Pe’is calculated by using Eq.(13);13:If Pe’=Pa[s]Then 14:The extracted watermark bit(Wdet)is o;15:else if Pe’=Pa[s]+1 or Pe’=—(pa[s]+1)Then 16:The Extracted Watermark bit(Wdet)is 1;17:End if 18:The original attribute value is restored by using Eq.(14);19:If wdet=0 Then 20:a=a+1;//count the number of the extracted watermark bit(wdet)is 0 21:Else 22:b=b+1;//count the number of the extracted watermark bit(wdet)is 1 23:End If 24:End For 25:If a >b Then 26:wdet=0 27:Else 28:wdet=1 29:End if//the majority voting mechanism is used to identify the last watermark bit.30:wdet=Wdet+wdet 31:End for 32:Return DR Wdet

    5 Experimental Results and Data Analysis

    The performance and robustness of the technique can be evaluated by conducting experiments within the Intel Core i5 with a 2.40 GHz CPU and 8 GB RAM and with a Windows 10 operating system.The selected database was the two datasets.The first dataset[36]contains order-logs obtained from a highly reputable online shopping agency with 344 records and 27 fields.We selected eight nonnumeric attributes for the first trial as part of the experimental requirements.The second dataset was that of bank churners,which contains 1,000 records and 36 attributes.Similarly,we selected seven nonnumeric attributes for the second trial.The experiment was conducted in two parts.The first aimed to analyze the proposed method’s performance, such as computational storage cost, computation duration,and watermarking capacity.The second compared the robustness of the proposed method with other state-of-the-art approaches by subjecting them to several well-known attacks.

    5.1 Watermark Capacity,Cost,and Time Complexity Analysis

    The three criteria, namely, watermark capacity, storage cost, and time complexity, are used to analyze the performance of the proposed scheme, which can embed the watermark in each tuple for each group in the database.Thus, the watermark embedding rate was increased.High levels of watermarking capacity indicate that additional watermark information can be embedded.Thus,the watermarking capacity of the proposed method can reach 100%.In other words,the embedding rate is maximized.Meanwhile,Khanduja et al.[19]cited that the column value can be changed by adding characters at the end of the column in the specified row to insert the watermark.As such,this option consumes more storage.Second, when the value of the peak point is equal to 2, the column value can be changed by replacing each word in the specified row with another word; thus, the storage space of the memory remains the same.Thus,the original and watermarked data and the recovered data are of the same size(40 KB).The computation duration of the proposed algorithm is reported in three phases, namely, preprocessing, embedding, and detection.The time complexity of the data preprocessing phase reaches 247 ms.In contrast to other reversible watermarking methods that use the GA algorithm to select the column in which to embed the watermark, such as GAHSW and RRW,the time consumption in this phase using these techniques exceeds that of the proposed method.Meanwhile, the time complexity of embedding the watermark in the proposed method is 1,813 ms whereas the time complexity for detecting the watermark was 2,183 ms.

    5.2 Robustness Analysis

    In this section,the robustness of the proposed scheme is evaluated under three popular attacks,namely, insertion, deletion, and alteration.The evaluation consists of two parts.The first aims to measure the extent of the effect of the HSW algorithm on the first dataset(order log)after embedding the watermark at two time points.The first pertains to the time when the value of peak point P equals 1;that is,the change was made to the data by replacing the word’s first letter in each modified column.This result may influence the data negatively because it can enable an attacker to predict the original value of the attribute.The second time point is when the value of the peak point equals 2.The result denotes a change in the entire word in the altered column through the transposition and substitution of the letters of the word as a whole.In this manner,predicting the original value of the modified attribute is difficult for the attacker unless the attacker knows the secret key owned by the database owner.The study considered popular attacks,such as addition,deletion,and alteration,and conducted them on the first dataset to measure the impact of the attacks for both cases and compare the results in terms of data recovery and detection of watermark information.

    A comparison of the watermark detection of HSW on the order log dataset is performed in two cases.The first case is based on a change in the entire word and while the second case is based on a change in one letter.Figs.3–5 are presented to explain the comparison between the two cases after insertion,alteration and deletion attacks.This comparison is explained in the following subsections.

    Figure 3:Comparison of watermark detection of HSW on the order log dataset after insertion attacks

    Figure 4:Comparison of watermark detection of HSW on the order log dataset after deletion attacks

    Figure 5:Comparison of watermark detection of HSW on order log dataset after alteration attacks

    5.2.1 Insertion Attack

    During an insertion attack, attackers are dependent on adding the subset of rows to the watermarked database to facilitate watermark detection.The tuples are added to the database at ratios ranging from 10%to 90%.Fig.3 presents a comparison of the watermark detection of HSW on the order log dataset in two cases, namely, a change in the entire word and a change in one letter after insertion attacks.The watermark will be detected,and data will be recovered by different values under insertion attack that; the watermark will be detected in all cases of tuples insertion in both cases of data change.This type of attack exerts a low impact on the proposed algorithm.

    5.2.2 Deletion Attack

    Under deletion attacks,attackers randomly delete rows of the watermarked database to facilitate watermark removal.The tuples are selected from the database at ratios ranging from 10%to 90%and deleted.The watermark was detected,whereas data were recovered using different values.Fig.4 depicts a comparison of the watermark detection of HSW on the order log dataset after deletion attacks.The watermark was detected, whereas data were recovered using different values under deletion attack.However,the watermark cannot be deleted even after 90%of the database was deleted in both cases of data change.

    5.2.3 Alteration Attack

    During alteration attacks,attackers alter random rows or columns of the watermarked database to facilitate watermark detection.The tuples are selected from the database at ratios ranging from 10%to 90% and updated.The watermark is detected, whereas data are recovered using different values.Fig.5 indicates that the watermark will be detected and that data will be recovered even after 90%of the database is altered in both data change cases.This type of attack was ineffective against the proposed algorithm because the watermark is embedded in more than 50%of the database.

    The second part of the evaluation aims to measure the robustness of the proposed method on a different dataset,which is larger than the first dataset in terms of the number of records,to measure the data distortion rate after embedding the watermark.The experimental results demonstrate that the watermark information can be embedded in a large space of the database and that the entire word in the candidate(multi-word)attribute can be replaced.Common attacks are considered and conducted on this dataset,such as addition,deletion,and alteration.Fig.6 presents a comparison of watermark detection rate after three different attacks namely, insertion, alteration and deletion attacks on the second dataset(bank churners).

    Figure 6:Comparison of watermark detection rate after insertion,alteration and deletion attacks on bank churners’dataset

    The results indicate that the higher the insertion attack rate, the lower the watermark detection rate.The percentage of detection rate was 90% since the percentage of the insertion attack is 10%.When the rate of the insertion attack reached 90%,the watermark detection rate was 58%.This finding implies that the data did not lose its usability.Also illustrates that during an alteration attack, the watermark detection rate increased with the decrease in the rate of attack.

    The percentage of watermark detection reached 94%at attack rates of 10%and 90%.Thus,the watermark can be detected at more than 50%, with a percentage reach to 55%.Therefore, this type of attack was ineffective against the proposed algorithm.In the case of deletion attacks on the same dataset.The watermark recovery rates ranged from 90%and 75%to 30%and 22.5%.

    Even when 90%of the dataset is deleted,the watermark is detected at 22.5%with the increase in the attack rate.Figs.7–9 compare the two datasets in terms of data recovery and watermark match.However,the watermark will be detected,whereas data will be recovered regardless of the number of tuples inserted,deleted,or updated on the watermark database.

    Figure 7:Insertion attack

    Figure 8:Alteration attack

    Tab.3 presents the overall result of watermark detection after various attacks on the watermark detection from the two databases at ratios ranging from 10%to 90%.The table demonstrates that the watermark is sufficiently detected,indicating that the proposed algorithm can recover more than half of the embedded watermark in all addition and alteration attacks cases.Although 90% of the data were deleted,the watermark detection in one of the datasets remains unclear.Nevertheless,data can be detected and restored.

    Figure 9:Deletion attack

    Table 3: Watermark detection rates of data after insertion,alteration,and deletion attacks

    After comparing the two datasets,we find the data detection rate decreases with the increase in the percentage of attacks in all cases of attacks at ratios that range from 10%to 90%.The first data set (order log) indicates that the detection rate reached 55%.However, in the second dataset (bank churners), the detection rate can reach 58%, even at an attack rate of 90%.Therefore, the proposed algorithm can recover more than half of the watermark in all addition and alteration attacks cases.In the case of deletion attacks,however,the detection rates achieved for the first and second datasets are 50%and 22%,respectively,at a deletion rate of 90%.

    6 Conclusion and Future Works

    Currently, scholarly attention is mainly focused on database watermarking because it can solve the problems of ownership proofing and copyright protection in the process of sharing databases.The reversible watermarking technique can retrieve the original data and fully preserve data quality.This study presented a novel robust and reversible watermarking method for non-numeric relational databases.The experimental results demonstrate that the proposed method minimizes distortion and promotes watermarking robustness.The method used the grouping and the majority voting mechanism;thus,it can outperform other methods in detecting the majority of watermark information and recovering a large portion of data in all types of attacks regardless of the size of the tested data.Conversely,the results suggest that despite exposing the database to an insertion attack at 50%,75% of the watermark is retained.Thus, the proposed algorithm can recover more than half of the embedded watermark in all addition and alteration attacks cases,retain watermark information,and restore data completely.Future directions of this research can be conducted on applying watermarking techniques for securing confidential data on cloud computing.The main process is to perform digital watermarking using encryption techniques to maintain the privacy of cloud services and authentication of cloud users.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors have no conflicts of interest to report regarding the present study.

    你懂的网址亚洲精品在线观看| 国产精品一国产av| 91aial.com中文字幕在线观看| 日韩伦理黄色片| 日本猛色少妇xxxxx猛交久久| 欧美日韩国产mv在线观看视频| 韩国av在线不卡| 亚洲三级黄色毛片| 午夜福利网站1000一区二区三区| 五月玫瑰六月丁香| 99久国产av精品国产电影| 国产爽快片一区二区三区| 欧美激情 高清一区二区三区| 两个人的视频大全免费| 成人国产av品久久久| 五月天丁香电影| 国产69精品久久久久777片| 国产色婷婷99| 中文天堂在线官网| 一边亲一边摸免费视频| a 毛片基地| 少妇精品久久久久久久| 在线天堂最新版资源| 亚洲性久久影院| 久久人人爽av亚洲精品天堂| 亚洲久久久国产精品| 亚洲国产毛片av蜜桃av| 男男h啪啪无遮挡| 桃花免费在线播放| freevideosex欧美| 日韩人妻高清精品专区| 人妻夜夜爽99麻豆av| 免费观看av网站的网址| 伊人久久精品亚洲午夜| 日韩成人伦理影院| 国产又色又爽无遮挡免| 国产又色又爽无遮挡免| 尾随美女入室| 欧美激情国产日韩精品一区| 狠狠婷婷综合久久久久久88av| www.av在线官网国产| 日本-黄色视频高清免费观看| 亚洲国产av影院在线观看| 久久久久久久精品精品| 纯流量卡能插随身wifi吗| 欧美激情国产日韩精品一区| 26uuu在线亚洲综合色| 久久久久久久精品精品| 999精品在线视频| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 久久久久久人妻| 免费大片黄手机在线观看| av免费观看日本| 色视频在线一区二区三区| 久久精品国产亚洲网站| 免费黄网站久久成人精品| 黑人巨大精品欧美一区二区蜜桃 | 国产 精品1| 久久鲁丝午夜福利片| 国产成人一区二区在线| 国产精品.久久久| 久久久久久久久久人人人人人人| 欧美激情极品国产一区二区三区 | 免费av中文字幕在线| 黄色怎么调成土黄色| 少妇人妻精品综合一区二区| 成人综合一区亚洲| 久久精品人人爽人人爽视色| 国产黄色免费在线视频| 亚洲欧洲日产国产| 成人影院久久| 日韩亚洲欧美综合| 婷婷色av中文字幕| 亚洲少妇的诱惑av| 亚洲,欧美,日韩| 亚洲国产精品一区二区三区在线| 午夜av观看不卡| 少妇的逼好多水| 丝袜美足系列| 丰满饥渴人妻一区二区三| 一级爰片在线观看| 亚洲国产日韩一区二区| 日韩一本色道免费dvd| 日本vs欧美在线观看视频| 制服人妻中文乱码| 久久久亚洲精品成人影院| 亚洲精品乱码久久久久久按摩| 久久精品国产自在天天线| 国产精品免费大片| 人人澡人人妻人| 精品卡一卡二卡四卡免费| 2021少妇久久久久久久久久久| 久久精品国产亚洲网站| 日韩免费高清中文字幕av| 久久久久国产精品人妻一区二区| 热re99久久精品国产66热6| 内地一区二区视频在线| 亚洲第一av免费看| 伊人久久精品亚洲午夜| 一级毛片黄色毛片免费观看视频| 精品人妻偷拍中文字幕| 国产一区二区三区av在线| 久久久久视频综合| 精品一区在线观看国产| 日日摸夜夜添夜夜爱| 水蜜桃什么品种好| 欧美亚洲日本最大视频资源| 亚洲美女搞黄在线观看| 赤兔流量卡办理| 欧美最新免费一区二区三区| 亚洲一区二区三区欧美精品| 日本与韩国留学比较| 免费播放大片免费观看视频在线观看| 男女高潮啪啪啪动态图| 国产av国产精品国产| 日韩亚洲欧美综合| 亚洲图色成人| 中文字幕人妻熟人妻熟丝袜美| 国产深夜福利视频在线观看| 在线观看免费视频网站a站| 丁香六月天网| 一区二区日韩欧美中文字幕 | 免费日韩欧美在线观看| 久久人人爽人人片av| 国产欧美日韩一区二区三区在线 | 日本免费在线观看一区| 80岁老熟妇乱子伦牲交| 夜夜爽夜夜爽视频| 精品人妻在线不人妻| 在线播放无遮挡| 91精品一卡2卡3卡4卡| 一级爰片在线观看| 成人综合一区亚洲| av视频免费观看在线观看| 久久国产精品男人的天堂亚洲 | 蜜桃在线观看..| 两个人的视频大全免费| 国产视频首页在线观看| 欧美成人精品欧美一级黄| 日韩,欧美,国产一区二区三区| 久久热精品热| 黄色怎么调成土黄色| 婷婷色av中文字幕| 亚洲第一区二区三区不卡| 亚洲一级一片aⅴ在线观看| 毛片一级片免费看久久久久| 一级毛片aaaaaa免费看小| 边亲边吃奶的免费视频| 免费观看无遮挡的男女| av在线老鸭窝| 交换朋友夫妻互换小说| 18禁在线播放成人免费| 久久久久国产精品人妻一区二区| 国产探花极品一区二区| 在线观看三级黄色| 简卡轻食公司| 国产午夜精品一二区理论片| 看非洲黑人一级黄片| 久久国产亚洲av麻豆专区| 午夜精品国产一区二区电影| 天堂中文最新版在线下载| 午夜激情久久久久久久| 亚洲成人一二三区av| 一个人看视频在线观看www免费| 亚洲天堂av无毛| 人妻人人澡人人爽人人| 成年女人在线观看亚洲视频| 亚洲精品视频女| 日日摸夜夜添夜夜爱| 自线自在国产av| 亚洲欧美一区二区三区黑人 | 狠狠婷婷综合久久久久久88av| 亚洲av成人精品一二三区| 亚洲精品日本国产第一区| 日韩欧美一区视频在线观看| 欧美日韩视频精品一区| 日韩亚洲欧美综合| 高清视频免费观看一区二区| 亚洲伊人久久精品综合| 日韩 亚洲 欧美在线| 亚洲国产精品999| 亚洲天堂av无毛| 男男h啪啪无遮挡| 在线观看免费视频网站a站| 亚洲av中文av极速乱| av在线播放精品| 久久精品国产亚洲av天美| 欧美日韩一区二区视频在线观看视频在线| 一边亲一边摸免费视频| 日日爽夜夜爽网站| 精品一区二区三卡| 少妇人妻 视频| 插阴视频在线观看视频| 熟女av电影| freevideosex欧美| 中文精品一卡2卡3卡4更新| 99热国产这里只有精品6| 99热国产这里只有精品6| 一级毛片 在线播放| 久久久国产一区二区| 伦理电影免费视频| 十分钟在线观看高清视频www| 最黄视频免费看| 搡老乐熟女国产| 男男h啪啪无遮挡| 国产精品女同一区二区软件| videos熟女内射| 欧美三级亚洲精品| 国产精品久久久久久av不卡| 少妇被粗大的猛进出69影院 | 国产一区有黄有色的免费视频| 国产女主播在线喷水免费视频网站| 日本爱情动作片www.在线观看| 麻豆精品久久久久久蜜桃| 国产高清不卡午夜福利| 91久久精品国产一区二区三区| 熟妇人妻不卡中文字幕| 久久热精品热| 午夜免费鲁丝| 免费人成在线观看视频色| 欧美精品一区二区免费开放| 国产精品久久久久成人av| 亚洲精品久久成人aⅴ小说 | 曰老女人黄片| 人妻制服诱惑在线中文字幕| 在线观看三级黄色| 国产在线一区二区三区精| 大话2 男鬼变身卡| 久久人人爽人人爽人人片va| 亚洲精品一区蜜桃| 22中文网久久字幕| 老司机亚洲免费影院| 久久毛片免费看一区二区三区| 国产成人91sexporn| 老司机影院成人| av有码第一页| 男女边吃奶边做爰视频| 国产乱人偷精品视频| 我的老师免费观看完整版| 一级片'在线观看视频| 韩国高清视频一区二区三区| 高清午夜精品一区二区三区| 久久国产亚洲av麻豆专区| av在线老鸭窝| 久久精品久久久久久噜噜老黄| 亚洲四区av| 大香蕉久久网| 九色成人免费人妻av| 亚洲av不卡在线观看| 亚洲欧美精品自产自拍| 99九九线精品视频在线观看视频| 日韩精品免费视频一区二区三区 | 欧美亚洲 丝袜 人妻 在线| 久久青草综合色| 亚洲美女搞黄在线观看| 观看av在线不卡| 国模一区二区三区四区视频| 亚洲性久久影院| 成人国产麻豆网| 亚洲四区av| videosex国产| 丰满乱子伦码专区| av专区在线播放| 欧美日韩视频精品一区| 国产精品一二三区在线看| 国产高清不卡午夜福利| 亚洲色图综合在线观看| 午夜影院在线不卡| 七月丁香在线播放| 性色av一级| 男的添女的下面高潮视频| 日韩精品有码人妻一区| 国产av国产精品国产| 少妇熟女欧美另类| 久久精品国产a三级三级三级| 黄色配什么色好看| 精品国产乱码久久久久久小说| av在线播放精品| 中文字幕免费在线视频6| 亚洲av二区三区四区| 在线观看免费日韩欧美大片 | 美女福利国产在线| 国产精品久久久久久av不卡| 热re99久久精品国产66热6| 秋霞伦理黄片| 成人免费观看视频高清| 99热国产这里只有精品6| 久久午夜综合久久蜜桃| 三级国产精品片| 欧美激情 高清一区二区三区| 精品人妻偷拍中文字幕| 有码 亚洲区| 一本久久精品| 亚洲国产精品国产精品| .国产精品久久| 观看av在线不卡| 精品人妻熟女av久视频| 欧美三级亚洲精品| 精品一区在线观看国产| 日韩精品免费视频一区二区三区 | 精品久久久久久久久亚洲| 春色校园在线视频观看| 夫妻性生交免费视频一级片| 免费观看性生交大片5| 中文字幕人妻熟人妻熟丝袜美| 亚洲色图 男人天堂 中文字幕 | 热re99久久国产66热| 赤兔流量卡办理| 亚洲国产欧美在线一区| 亚洲精品一区蜜桃| 亚洲av成人精品一二三区| 日韩一区二区三区影片| 成人毛片a级毛片在线播放| 午夜福利视频精品| 在线观看一区二区三区激情| 我的老师免费观看完整版| 亚洲国产av影院在线观看| 欧美日韩av久久| av黄色大香蕉| 女人久久www免费人成看片| 欧美人与性动交α欧美精品济南到 | 亚洲在久久综合| 日韩av不卡免费在线播放| 国产成人av激情在线播放 | 水蜜桃什么品种好| 香蕉精品网在线| 国产av一区二区精品久久| 色网站视频免费| 日本wwww免费看| 搡老乐熟女国产| 99九九在线精品视频| 在线观看www视频免费| 久久国产精品大桥未久av| 欧美精品一区二区免费开放| 免费观看性生交大片5| 久久久久久久大尺度免费视频| 国产精品不卡视频一区二区| 免费高清在线观看视频在线观看| 国国产精品蜜臀av免费| 最近的中文字幕免费完整| 国产欧美亚洲国产| 国产 一区精品| 精品少妇久久久久久888优播| 涩涩av久久男人的天堂| 免费高清在线观看日韩| 我的女老师完整版在线观看| 免费日韩欧美在线观看| 久久毛片免费看一区二区三区| 午夜日本视频在线| 午夜免费鲁丝| 伊人久久国产一区二区| 精品国产露脸久久av麻豆| 黑人高潮一二区| 老司机亚洲免费影院| h视频一区二区三区| 国产熟女午夜一区二区三区 | 天堂中文最新版在线下载| 日本爱情动作片www.在线观看| 亚洲久久久国产精品| 免费久久久久久久精品成人欧美视频 | 精品少妇内射三级| 亚洲av二区三区四区| 人人妻人人添人人爽欧美一区卜| 国产成人freesex在线| 夫妻午夜视频| kizo精华| 亚洲欧洲日产国产| 91精品一卡2卡3卡4卡| 日韩三级伦理在线观看| 日韩电影二区| 亚洲伊人久久精品综合| 又黄又爽又刺激的免费视频.| 国产成人精品久久久久久| 国产黄片视频在线免费观看| 狂野欧美激情性bbbbbb| 国产伦精品一区二区三区视频9| 在线观看国产h片| 亚洲国产成人一精品久久久| 亚洲三级黄色毛片| 日本-黄色视频高清免费观看| 99久久中文字幕三级久久日本| 亚洲四区av| 亚洲国产精品成人久久小说| 卡戴珊不雅视频在线播放| av线在线观看网站| 美女大奶头黄色视频| 国产黄片视频在线免费观看| 欧美精品一区二区免费开放| 日本av免费视频播放| 日韩av免费高清视频| 国产精品国产三级国产专区5o| 美女中出高潮动态图| 最新的欧美精品一区二区| 日本爱情动作片www.在线观看| 国产深夜福利视频在线观看| 亚洲av日韩在线播放| 欧美性感艳星| 亚洲国产毛片av蜜桃av| 亚洲第一区二区三区不卡| 91国产中文字幕| 黄片播放在线免费| 国产精品久久久久久精品古装| 中国美白少妇内射xxxbb| 久久免费观看电影| 狂野欧美激情性xxxx在线观看| 妹子高潮喷水视频| 91精品三级在线观看| 国产国语露脸激情在线看| 欧美日韩av久久| 欧美激情 高清一区二区三区| 最黄视频免费看| 欧美日韩av久久| 大又大粗又爽又黄少妇毛片口| 国产精品国产三级专区第一集| 免费观看无遮挡的男女| 欧美 日韩 精品 国产| 母亲3免费完整高清在线观看 | 性色avwww在线观看| 日韩视频在线欧美| 精品国产乱码久久久久久小说| 亚洲成人一二三区av| 精品国产乱码久久久久久小说| 欧美丝袜亚洲另类| 久久精品国产自在天天线| 婷婷成人精品国产| 视频区图区小说| 如何舔出高潮| 日韩制服骚丝袜av| av线在线观看网站| 五月玫瑰六月丁香| 青春草视频在线免费观看| 91久久精品国产一区二区三区| 午夜免费观看性视频| 亚洲av电影在线观看一区二区三区| 久久毛片免费看一区二区三区| 欧美性感艳星| 久久亚洲国产成人精品v| 亚洲欧洲精品一区二区精品久久久 | 免费大片18禁| 男女无遮挡免费网站观看| 91久久精品电影网| 伦理电影免费视频| 午夜91福利影院| 国产色爽女视频免费观看| 这个男人来自地球电影免费观看 | 国产亚洲最大av| 久久久a久久爽久久v久久| 女性生殖器流出的白浆| 中国三级夫妇交换| 午夜激情av网站| 少妇高潮的动态图| 国产精品女同一区二区软件| 赤兔流量卡办理| 国产一区二区在线观看av| 18禁观看日本| 人成视频在线观看免费观看| 91精品国产国语对白视频| 午夜福利,免费看| 国产男女内射视频| 亚洲美女搞黄在线观看| 欧美精品一区二区免费开放| 欧美日韩av久久| 亚洲激情五月婷婷啪啪| 国国产精品蜜臀av免费| 一区二区日韩欧美中文字幕 | 欧美xxⅹ黑人| 天堂8中文在线网| 91精品三级在线观看| 色哟哟·www| 国产免费又黄又爽又色| 极品人妻少妇av视频| 亚洲精品456在线播放app| av在线观看视频网站免费| 一本大道久久a久久精品| 伦理电影大哥的女人| 黑人欧美特级aaaaaa片| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产精品一区二区在线不卡| 久久狼人影院| 亚洲内射少妇av| 天天影视国产精品| 国产精品国产三级国产av玫瑰| 91精品国产九色| 边亲边吃奶的免费视频| 亚洲精品日本国产第一区| 天堂中文最新版在线下载| 亚洲精品日本国产第一区| 在线天堂最新版资源| 丝袜美足系列| 亚洲三级黄色毛片| 亚洲av男天堂| 十八禁高潮呻吟视频| 国产黄频视频在线观看| 熟女人妻精品中文字幕| 人妻制服诱惑在线中文字幕| 天美传媒精品一区二区| 亚洲精品美女久久av网站| 天堂8中文在线网| 看免费成人av毛片| 天美传媒精品一区二区| 免费看光身美女| 日韩制服骚丝袜av| 国产精品国产三级国产专区5o| av网站免费在线观看视频| 啦啦啦视频在线资源免费观看| 少妇的逼水好多| 一边亲一边摸免费视频| 熟妇人妻不卡中文字幕| 91aial.com中文字幕在线观看| 一本久久精品| 伊人久久精品亚洲午夜| 国产国拍精品亚洲av在线观看| 九九爱精品视频在线观看| 日韩人妻高清精品专区| av国产久精品久网站免费入址| 国产毛片在线视频| 啦啦啦在线观看免费高清www| 91成人精品电影| 99热国产这里只有精品6| 国产男人的电影天堂91| 久久久国产欧美日韩av| av免费观看日本| 狂野欧美白嫩少妇大欣赏| 免费观看在线日韩| 能在线免费看毛片的网站| 99精国产麻豆久久婷婷| 亚洲成人手机| 秋霞伦理黄片| 亚洲国产av新网站| 日本vs欧美在线观看视频| 丰满迷人的少妇在线观看| 内地一区二区视频在线| 少妇被粗大猛烈的视频| 欧美亚洲 丝袜 人妻 在线| 视频中文字幕在线观看| 黄色欧美视频在线观看| 又粗又硬又长又爽又黄的视频| 国产爽快片一区二区三区| 插逼视频在线观看| av不卡在线播放| 色网站视频免费| 一本久久精品| 肉色欧美久久久久久久蜜桃| 欧美丝袜亚洲另类| 美女主播在线视频| 亚洲精品久久成人aⅴ小说 | 亚洲高清免费不卡视频| 人成视频在线观看免费观看| 久久午夜综合久久蜜桃| 高清午夜精品一区二区三区| 春色校园在线视频观看| 亚洲熟女精品中文字幕| 新久久久久国产一级毛片| 久久久久人妻精品一区果冻| 十八禁网站网址无遮挡| 简卡轻食公司| 永久免费av网站大全| 18禁观看日本| 国产精品国产三级国产av玫瑰| 亚洲,欧美,日韩| 国产精品久久久久成人av| 免费高清在线观看视频在线观看| av在线老鸭窝| 欧美另类一区| 国产av码专区亚洲av| 国产精品熟女久久久久浪| av福利片在线| 精品一品国产午夜福利视频| 天美传媒精品一区二区| 成人毛片a级毛片在线播放| 纯流量卡能插随身wifi吗| 亚洲av福利一区| 国产成人精品福利久久| 夫妻午夜视频| 美女脱内裤让男人舔精品视频| 男人爽女人下面视频在线观看| 成人国产麻豆网| 一个人免费看片子| 天美传媒精品一区二区| 插逼视频在线观看| 精品久久久精品久久久| 九九在线视频观看精品| 大话2 男鬼变身卡| 黄色怎么调成土黄色| 日韩欧美一区视频在线观看| 中文字幕最新亚洲高清| 伦精品一区二区三区| 亚洲精品av麻豆狂野| 蜜桃在线观看..| 欧美精品国产亚洲| 亚洲国产精品999| 精品少妇久久久久久888优播| 亚洲av二区三区四区| 一级毛片电影观看| 亚洲精品一二三| 日韩成人av中文字幕在线观看| 老司机影院毛片| 日日爽夜夜爽网站| 国产精品一区二区在线观看99| 女性被躁到高潮视频| 久久久亚洲精品成人影院| 91精品国产九色| 3wmmmm亚洲av在线观看| tube8黄色片| 九色成人免费人妻av| 亚洲,欧美,日韩| 亚洲色图综合在线观看| 在线天堂最新版资源| 日韩亚洲欧美综合| 亚洲精品日韩在线中文字幕| 99热全是精品| 五月伊人婷婷丁香| 亚洲精品国产av蜜桃| 少妇人妻久久综合中文| 久久久久久久国产电影|