A Fingerprinting Technique for Numeric Relational Databases with Distortion Minimization

被引:5
作者
Mohanpurkar, Arti [1 ]
Joshi, Madhuri [2 ]
机构
[1] Dr DY Patil Sch Engn & Technol, Dept Comp Engn, Pune, Maharashtra, India
[2] MGMs Jawaharlal Nehru Engn Coll, Dept Comp Sci & Engn, Aurangabad, Maharashtra, India
来源
1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015 | 2015年
关键词
Minimum Distortion; fingerprinting; Tardos code; watermarking; usability constraints; WATERMARKING;
D O I
10.1109/ICCUBEA.2015.134
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever-increasing usage of internet, the availability of digital data is in tremendous demand. In this context, it is essential to protect the ownership of the data and to be able to find the guilty user. In this paper, a fingerprinting scheme is proposed to provide protection for Numeric Relational Database (RDB), which focuses on challenges like: 1. Minimum distortion in Numeric database, 2. Usability preservation, 3. Non-violation of the requirement of blind decoding. When the digital data in concern is numeric in nature the usability of data needs to be keenly preserved, this is made possible by achieving minimum distortion.
引用
收藏
页码:655 / 660
页数:6
相关论文
共 11 条
  • [1] Agrawal R, 2003, VLDB J, V12, P157, DOI [10.1007/s000778-003-0097-x, 10.1007/s00778-003-0097-x]
  • [2] Improved versions of Tardos' fingerprinting scheme
    Blayer, Oded
    Tassa, Tamir
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (01) : 79 - 103
  • [3] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [4] farooq Muddasar, 2012, IEEE T KNOWLEDGE DAT, V24
  • [5] A Formal Usability Constraints Model for Watermarking of Outsourced Datasets
    Kamran, M.
    Farooq, Muddassar
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 1061 - 1072
  • [6] Kamran M., 2013, IEEE T, V25
  • [7] Lafaye Julien, 2008, IEEE T KNOWLEDGE DAT, V20
  • [8] Fingerprinting relational databases: Schemes and specialties
    Li, YJ
    Swarup, V
    Jajodia, S
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (01) : 34 - 45
  • [9] Mohanpurkar A.A., 2011, INT IEEE C WICT 2011, P1018
  • [10] Shehab Mohamed, 2008, IEEE T KNOWLEDGE DAT, V20