A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance
An enormous growth in internet usage has resulted into great amounts of digital data to handle. Data sharing has become significant and unavoidable. Data owners want the data to be secured and perennially available. Data protection and any violations thereby become crucial. This work proposes a traitor identification system which securely embeds the fingerprint to provide protection for numeric relational databases. Digital data of numeric nature calls for preservation of usability. It needs to be done so by achieving minimum distortion. The proposed insertion technique with reduced time complexity ensures that the fingerprint inserted in the form of an optimized error leads to minimum distortion. Collusion attack is an integral part of fingerprinting and a provision to mitigate by avoiding the same is suggested. Robustness of the system against several attacks like tuple insertion, tuple deletion etc. is also depicted.
Year of publication: |
2016
|
---|---|
Authors: | Mohanpurkar, Arti Arun ; Joshi, Madhuri Satish |
Published in: |
International Journal of Ambient Computing and Intelligence (IJACI). - IGI Global, ISSN 1941-6245, ZDB-ID 2696086-2. - Vol. 7.2016, 2 (01.07.), p. 114-137
|
Publisher: |
IGI Global |
Subject: | Collusion Attack | Data Sharing | Fingerprinting | Minimum Distortion | Security | Tardos Code | Usability Constraints | Watermarking |
Saved in:
Online Resource
Saved in favorites
Similar items by subject
-
Bhat, Suhail Ahmad, (2024)
-
Tamper detection in RFID tags, using, fragile watermarking
Potdar, Vidyasagar, (2006)
-
Multiresolution SVD Based Image Watermarking Scheme Using Noise Visibility Function
Majumder, Swanirbhar, (2017)
- More ...