Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance

نویسندگان

  • Arti Mohanpurkar
  • Madhuri Joshi
  • Muddassar Farooq
  • Rakesh Agrawal
  • Peter J Haas
  • Jerry Kiernan
  • Radu Sion
  • Mikhail Atallah
  • Sunil Prabhakar
  • Mohamed Shehab
  • Elisa Bertino
  • Arif Ghafoor
  • Julien Lafaye
  • David Gross-Amblard
  • Camelia Constantin
  • Ersin Uzun
  • Bryan Stephenson
چکیده

Information age demands omnipresence of data. Large data sets are created, maintained and outsourced to the third party experts for data mining. Knowledge and patterns are extracted by using advanced data mining algorithms that assist the decision makers to ensure quick, correct and effective decisions to be made in this world of competition. The outsourcing of these large data sets faces the problem of theft and loss of ownership. The problem of data theft can be handled by fingerprinting i.e. embedding buyer specific marks along with ownership identification marks which further leads to the challenge of knowledge preservation. Thus, a technique which performs fingerprinting with knowledge preservation on numeric relational data to be outsourced is proposed here. It is ensured that the usability constraints are not violated. Knowledge preservation is achieved by optimizing the error to be inserted using Particle Swarm Optimization (PSO), a nature – inspired optimization algorithm. Collusion attack is very well-known in the context of fingerprinting techniques. Here, the proposed system provides a mechanism for avoiding collusion. The proposed system is independent of the primary key.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effect of the Novel Anti-Collusion Fingerprinting Scheme on the Knowledge from Numeric Databases

The effect of applying the novel anti-collusion fingerprinting scheme on the knowledge obtained from numeric databases is elaborated in this paper. Here, how the classification statistics are affected after fingerprinting numeric datasets is depicted. Several different classifiers are used for the purpose. This technique is primary key independent and resilient to additive attack. It is found t...

متن کامل

On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking

Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customer...

متن کامل

Group-Oriented Fingerprinting for Multimedia Forensics

Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprinting is collusion, whereby a group of adversaries combine their individual copies in an attempt to remove the underlying fi...

متن کامل

Anti-collusion of Grow-oriented Fingerprinting

Digital fingerprinting of multimedia data involves embedding information in the content, and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprints is collusion, whereby a group of adversaries combine their in&vidual copies in an attempt to remove the underlying fingerprint...

متن کامل

Anti-collusion of group-oriented fingerprinting

Digital fingerprinting of multimedia data involves embedding information in the content, and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprints is collusion, whereby a group of adversaries combine their individual copies in an attempt to remove the underlying fingerprin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015