Enhanced Watermarking Scheme Using Formal Usability Constraints for Outsourced Dataset
Abstract
Watermarking is the commonly used mechanism to enforce and prove ownership for the digital data in different formats like audio, video, image, relational database, text and software. In the emerging field of “sharing datasets” with the intended, to protect ownership on the datasets is becoming a challenge in itself. The important challenge in watermarking datasets is usually, an owner needs to manually define "Usability constraints" for each type of dataset to preserve the contained knowledge. The novel formal model aims at preserve the knowledge in each attribute and other major characteristics of datasets that play an important role during the data mining process. The new watermark embedding algorithm to prove that the inserted watermark not only preserves the knowledge contained in a dataset but also significantly enhances watermark security in dataset. In insert watermark should be imperceptible and robust against any type of attacks.
Keywords
Full Text:
PDFReferences
R Agawam and J Kiernan,” Watermarking relational databases”, in proc.28th Int. conf. Very Large Databases, 2002, pp. 155-166.
M Attalla, V Raskin, M Crogan, C Hempelmann, F Kerschbaum, D Mohamed and S Naik, ”Natural language watermarking: Design, analysis and proof-of-concept implementation”, in informationhiding. New york, NY, USA: Springer, 2001, pp. 185-200.
P Haas, R Agawam and J Kiernan, “Watermarking relational data: Framework, algorithms and analysis”, The VLDB Journal, vol.12, no.2, pp. 157-169, 2003.
M Kamran and M Farooq, “An information-preserving watermarking scheme for right protection of EMR systems”, IEEE Trans. Know. Data Eng., vol.24, no.11, pp. 1950-1962, Nov.2012.
M. Kamran and M. Farooq, a Formal Usability Constraints Model for Watermarking of Outsourced Data Mining Datasets Tech. Rep. TR-59-Kamran, 2012.
M. Kamran and Muddassar Farooq,A Formal Usability Constraints Model for Watermarking of Outsourced DatasetsIEEE Transactions on Information Forensics And Security, Vol. 8, No. 6, June 2013.
R Lewis and V Torczon, “Pattern search methods for linearly constrained minimization”, Institute for Computer Applications in Science and Engineering, NASA Langley Research Center, Hampton, VA, USA, 1998.
J Palsberg, S Krishnaswamy, D Ma, M Kwon, Q Shao and YZhang,”Experience with software watermarking”, in Proc. 16thcomputer security applications conf. 2000, pp. 308-316.
M. Pinsker, Information and Information Stability of Random Variablesand Processes. San Francisco, CA, USA: Holden-Day, 1960.
R Sion, M Attalla and S Prabhakar, “Rights protection for relational data,” IEEE Trans. Know. Data Eng., vol.16, no.12, pp. 1509-1525, Dec. 2004.
M Shehab, E Bertino and A Ghafoor, ”Watermarking relational
Databases using optimization-based techniques,” IEEE Trans.Knowl.Data Eng., vol.20, no.1, pp. 116-129.jan.2008
Kaggle’s contests: Crunching Numbers for Fame and Glory
2012[online]. Available: http://www.businessweek.com
Patients Sue Walgreens for Making Money on Their Data 2012 [Online].Available:http://www.healthcareitnews.com/news/patients-suewalgreens-making-money-their-data
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.