2010
DOI: 10.1007/s00778-010-0178-6
|View full text |Cite
|
Sign up to set email alerts
|

Rights protection of trajectory datasets with nearest-neighbor preservation

Abstract: Companies frequently outsource datasets to mining firms, and academic institutions create repositories or share datasets in the interest of promoting research collaboration. Still, many practitioners have reservations about sharing or outsourcing datasets, primarily because of fear of losing the principal rights over the dataset. This work presents a way of convincingly claiming ownership rights over a trajectory dataset, without, at the same time, destroying the salient dataset characteristics, which are impo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 48 publications
0
12
0
Order By: Relevance
“…2) Lucchese et al [70] proposed a novel watermarking scheme that preserves Nearest-Neighbors (NNs) of objects in a trajectory dataset. In other words, the k nearest neighbors of each object remains the same after watermark insertion and therefore the usability of dataset is preserved under NN-search and NN-classification.…”
Section: E Spatiotemporal Datamentioning
confidence: 99%
See 1 more Smart Citation
“…2) Lucchese et al [70] proposed a novel watermarking scheme that preserves Nearest-Neighbors (NNs) of objects in a trajectory dataset. In other words, the k nearest neighbors of each object remains the same after watermark insertion and therefore the usability of dataset is preserved under NN-search and NN-classification.…”
Section: E Spatiotemporal Datamentioning
confidence: 99%
“…Watermarking of trajectories is a challenging problem and depends on the characteristics of objects in the dataset such as variance. For instance, a busy trajectory gives the opportunity to store more information whereas a very smooth line limits the watermark capacity [70]. The watermarking methods that we review in this section have particular interest in retaining the usability of dataset for mining algorithms.…”
Section: E Spatiotemporal Datamentioning
confidence: 99%
“…The main advantage of FT is its invariance property against some geometric attacks like translation, scaling and rotation [56,91]. CT is another digital transform that separate the vector map into parts of different frequency with respect to the vector map visual quality.…”
Section: Transform-domain Approachesmentioning
confidence: 99%
“…Finally, we assess the resilience of our scheme against a broad range of potential attacks: geometric distortions, resampling, etc. We test our methods on datasets from various application areas: mobility data (taxi trajectories in Beijing [32,33] and San Francisco [21]), financial data (stock prices in the NASDAQ stock market), video-tracking data, handwritten data, and image contour data from anthropology and natural sciences (the latter datasets were obtained from [15] …”
Section: Experimental Evaluationmentioning
confidence: 99%
“…A rightprotection scheme based on watermarking principles that preserved the Nearest Neighbor of objects was presented in [15]. We adopt the watermarking model of that work, but here we study the more elaborate case of hierarchical clustering preservation.…”
Section: Related Workmentioning
confidence: 99%