International Core Journal of Engineering 2020-26 | Page 145
C. The watermark extracted
The database is partitioned and restored by the saved
intermediate data, and the watermark position is embedded
and assigned to the watermark sequence, and the final data is
sequentially subtracted from the intermediate data. If the
number is positive, the record is 1, and if it is negative, the
record is 0. Until the extracted 8-bit binary number is
compared with the saved watermark sequence, the data block
is embedded in the watermark and recorded as 1, otherwise 0
is recorded until all data blocks are traversed.
TABLE I. M EAN VARIANCE VARIANCE BEFORE AND AFTER DATABASE
WATERMARK EMBEDDING
Through the analysis of the experimental data, it can be
seen that the mean value and variance change of the
watermark before and after the watermark embedding are
small, and have little effect on the data, and will not impair
the usability of the data. This shows that the reversible
database watermarking technology based on differential
evolution algorithm proposed in this paper has good
invisibility.
In the process of watermark extraction, according to
whether the data block is embedded in the watermark to
obtain a one-dimensional binary array, the one-dimensional
array is processed into a two-dimensional array, and the two-
dimensional array is traversed to determine the width and
height of the image. If the array value is 1, the pixel
representing the current position is White, that is, the RGB
value is 255, and vice versa, to obtain a binary image of the
copyright image. The database copyright can be judged
based on the edge information of the binary image.
In this paper, a simulation attack experiment is carried
out to test the robustness of the watermarking algorithm,
including the attack of adding subset, deleting subset and
modifying subset.
IV. E XPERIMENTAL RESULTS AND ANALYSIS
As shown in table Ⅱ, the extraction rate of watermarks
was calculated under the attack of increasing different
subsets of the database. As can be seen from the table, the
increase of subset has no effect on watermark extraction, and
the watermark information can be extracted completely.
The experimental environment is Windows 10 operating
system, Intel (R) Core (TM) i7-8550U processor, 8GB RAM.
The copyright image uses the mathematical modeling icon of
Guilin University of Technology as shown in Figure 3. The
edge image is preprocessed using the edge detection operator
for the copyright image. The binary image obtained by
extracting the edge feature points of the image is shown in
Fig. 4. The database uses currency for external transaction
data. Block height: 200*7, dimension percentage: 0.4,
watermark sequence: 1010101011, number of iterations: 100,
population: 100濁The database watermark embedding and
extraction program uses Java programming, and uses JDBC
technology to connect to the MySQL database to perform the
most basic operations on the database.
TABLE II. S UBSET ADDITION ATTACK
As shown in table Ⅲ, the extraction rate of watermark
under different modification ratio was calculated by
simulating the subset modification attack, and the results
showed that the algorithm had strong robustness under the
subset attack of different intensity.
TABLE III. S UBSET MODIFICATION ATTACK
Fig 3. Copyright image
As shown in table Ⅳ, subset deletion attacks with
different strengths are simulated, and experiments show that
the algorithm can resist deletion attacks with different
strengths.
Fig 4. Edge detection imag
By using the edge detection operator for the image, the
watermark embedding amount is greatly reduced. The
invisibility of the watermarking algorithm is improved for
the low-reliability numerical relational database. The
introduction of the differential evolution algorithm improves
the robustness of the watermarking algorithm. The ratio of
the variance of the mean value of the database before and
after the statistical watermark embedding is analyzed, and
the invisibility of the algorithm is analyzed, as shown in the
following table:
TABLE IV. S UBSET DELETION ATTACK
From the above experimental results, the algorithm is
robust.
V. C ONCLUSIONS
In this paper, we propose a reversible database
watermarking method based on differential evolution
algorithm. By extracting the edge feature points of the
123