Digital Watermarking for Anonymized Data With Low Information Loss

被引:1
作者
Nakamura, Yuichi [1 ]
Nishi, Hiroaki [2 ]
机构
[1] Waseda Univ, Global Educ Ctr, Shinjuku Ku, Tokyo 1698050, Japan
[2] Keio Univ, Fac Sci & Technol, Dept Syst Design, Yokohama, Kanagawa 2238522, Japan
关键词
Watermarking; Data privacy; Distortion; Publishing; Privacy; Guidelines; Mobile handsets; Anonymization; big data applications; data privacy; data security; error correction codes; watermarking;
D O I
10.1109/ACCESS.2021.3110984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, massive amounts of data are utilized for artificial intelligence technologies such as machine learning and deep learning. However, these data must be utilized carefully while preserving data privacy. Data anonymization is a technique enabling both data mining and privacy protection, preventing the identification of individuals by generalizing the data to include multiple records with the same values. In this study, we consider a data-publishing infrastructure for personal data sharing. The infrastructure anonymizes data prior to publishing it to users for privacy protection; however, the problem of unauthorized republishing by malicious users must be considered. To address this issue, we studied digital watermarking methods that correlate data users with anonymized data. Our previous method embedded information indicating the original user to detect illegally republished data. However, this method did not focus on information loss. This study proposes another digital watermarking method for anonymized data that achieves low information loss. The proposed method replaces values in tuples to embed information. To reduce the information loss caused by the embedding, the proposed method selects replacement values from the candidates whose meanings are similar to the original. We propose the use of vector-conversion tables to select replacement values. The proposed method also extends the maximum length of the embedded bit string by embedding multiple bits into a single tuple. Moreover, we measured the tolerance to distortion attacks to evaluate the efficacy of the proposed method. The proposed method is non-blind, i.e., data prior to digital watermarking is required to perform extraction.
引用
收藏
页码:130570 / 130585
页数:16
相关论文
共 24 条
[1]  
[Anonymous], 2014, WPES
[2]   (t,k)-Hypergraph anonymization: an approach for secure data publishing [J].
Asayesh, Atefeh ;
Hadavi, Mohammad Ali ;
Jalili, Rasool .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) :1306-1317
[3]  
Bojanowski Piotr, 2017, Transactions of the Association for Computational Linguistics, V5, P135, DOI DOI 10.1162/TACL_A_00051
[4]  
Data Protection Working Party, 2014, Opinion 05/2014 on Anonymisation Techniques Internet
[5]   A Globally Optimal k-Anonymity Method for the De-Identification of Health Data [J].
El Emam, Khaled ;
Dankar, Fida Kamal ;
Issa, Romeo ;
Jonker, Elizabeth ;
Amyot, Daniel ;
Cogo, Elise ;
Corriveau, Jean-Pierre ;
Walker, Mark ;
Chowdhury, Sadrul ;
Vaillancourt, Regis ;
Roffey, Tyson ;
Bottomley, Jim .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2009, 16 (05) :670-682
[6]  
European Medicines Agency, 2018, EMA90915
[7]  
Ferguson N., 2003, Practical Cryptography, V1st
[8]  
HAGENAUER J, 1989, DALLAS GLOBECOM 89, VOLS 1-3, P1680, DOI 10.1109/GLOCOM.1989.64230
[9]  
Hosoe Takahiro, 2016, 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm), P74, DOI 10.1109/SmartGridComm.2016.7778741
[10]  
Manmeet Kaur Kamna Mahajan., 2015, International Journal of Computer Applications, P29