The Effect of the Novel Anti-Collusion Fingerprinting Scheme on the Knowledge from Numeric Databases
نویسندگان
چکیده
The effect of applying the novel anti-collusion fingerprinting scheme on the knowledge obtained from numeric databases is elaborated in this paper. Here, how the classification statistics are affected after fingerprinting numeric datasets is depicted. Several different classifiers are used for the purpose. This technique is primary key independent and resilient to additive attack. It is found to be highly secured against collusion attack due to the special insertion technique and the secret key used during fingerprinting.
منابع مشابه
Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance
Information age demands omnipresence of data. Large data sets are created, maintained and outsourced to the third party experts for data mining. Knowledge and patterns are extracted by using advanced data mining algorithms that assist the decision makers to ensure quick, correct and effective decisions to be made in this world of competition. The outsourcing of these large data sets faces the p...
متن کاملGroup-Oriented Fingerprinting for Multimedia Forensics
Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprinting is collusion, whereby a group of adversaries combine their individual copies in an attempt to remove the underlying fi...
متن کاملExpectation maximization decoding of Tardos probabilistic fingerprinting code
This paper presents our recent works on multimedia fingerprinting, improving both the fingerprinting code and the watermarking scheme. Our first contribution focuses on deriving a better accusation process for the well known Tardos codes. It appears that Tardos orginal decoding is very conservative: its performances are guaranteed whatever the collusion strategy. Indeed, major improvements stem...
متن کاملA collusion attack on the fuzzy vault scheme
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
متن کاملA collusion mitigation scheme for reputation systems
Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...
متن کامل