2015
DOI: 10.5120/ijca2015906957
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance

Abstract: Information age demands omnipresence of data. Large data sets are created, maintained and outsourced to the third party experts for data mining. Knowledge and patterns are extracted by using advanced data mining algorithms that assist the decision makers to ensure quick, correct and effective decisions to be made in this world of competition. The outsourcing of these large data sets faces the problem of theft and loss of ownership. The problem of data theft can be handled by fingerprinting i.e. embedding buyer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…As a result, the specific buyer whose data were leaked can be identified. Some recent works presented in [6][7][8] use different bits for identifying the different users of the data. However, these techniques do not provide any mechanism to associate the mark bits used for fingerprinting to the relevant user to a biometric feature of the user.…”
Section: Scenariomentioning
confidence: 99%
“…As a result, the specific buyer whose data were leaked can be identified. Some recent works presented in [6][7][8] use different bits for identifying the different users of the data. However, these techniques do not provide any mechanism to associate the mark bits used for fingerprinting to the relevant user to a biometric feature of the user.…”
Section: Scenariomentioning
confidence: 99%