2015 International Conference on Computing Communication Control and Automation 2015
DOI: 10.1109/iccubea.2015.134
|View full text |Cite
|
Sign up to set email alerts
|

A Fingerprinting Technique for Numeric Relational Databases with Distortion Minimization

Abstract: With the ever-increasing usage of internet, the availability of digital data is in tremendous demand. In this context, it is essential to protect the ownership of the data and to be able to find the guilty user. In this paper, a fingerprinting scheme is proposed to provide protection for Numeric Relational Database (RDB), which focuses on challenges like: 1. Minimum distortion in Numeric database, 2. Usability preservation, 3. Nonviolation of the requirement of blind decoding. When the digital data in concern … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 13 publications
(15 reference statements)
0
5
0
Order By: Relevance
“…As a result, the specific buyer whose data were leaked can be identified. Some recent works presented in [6][7][8] use different bits for identifying the different users of the data. However, these techniques do not provide any mechanism to associate the mark bits used for fingerprinting to the relevant user to a biometric feature of the user.…”
Section: Scenariomentioning
confidence: 99%
See 2 more Smart Citations
“…As a result, the specific buyer whose data were leaked can be identified. Some recent works presented in [6][7][8] use different bits for identifying the different users of the data. However, these techniques do not provide any mechanism to associate the mark bits used for fingerprinting to the relevant user to a biometric feature of the user.…”
Section: Scenariomentioning
confidence: 99%
“…Our claim is further strengthen by the fact that Mallory cannot afford to launch attacks that would affect the data to such an extent that its usability is compromised. Mathematically, P Attack (success) = (0.5) γ (7) This probability of successful malicious attacks is quite high, but the embedding of each bit of multi-bit fingerprint helps in making the fingerprint robust by decoding it from other tuples in case it has been compromised from some tuples after the attack. Moreover, as is evident from Equation ( 7), selection of higher percentage of tuples for fingerprint embedding can also help to improve fingerprint robustness, but in this case more data distortions will be introduced.…”
Section: Some Marked Tuples Can Have Different Values In Both the Dat...mentioning
confidence: 99%
See 1 more Smart Citation
“…The literature suggests several techniques, which watermark or fingerprint numeric relational databases but have not handled collusion attack avoidance [14,15,16].…”
Section: Effect On Mean and Variance Should Be Minuscule µ = µ And =mentioning
confidence: 99%
“…A technique having features like robustness, minimum distortion for watermarking relational databases is thus proposed. Here the preservation of information is discussed in terms of mean and variance and performs only watermarking.Another approach to achieve collusion avoidance with minimum distortion is discussed in [15,16] and the system is found to be more robust as it takes into account the primary key. This approach is applied on Numeric Relational databases.…”
Section: Related Workmentioning
confidence: 99%