Rad a u d u S i S o i n o Dat a a t b a a b s a e e W at a e t r e m r ar a k r in i g n 2!"!

Size: px
Start display at page:

Download "Rad a u d u S i S o i n o Dat a a t b a a b s a e e W at a e t r e m r ar a k r in i g n 2!"!"

Transcription

1 !" /16/ All Rights Reserved. DASFAA 2006

2 2

3 scenario payment Alice (financial advisor) market analysis Mallory (malicious licensed client) STOP Jane (innocent victim) 3

4 alternate scenario: traitor tracing top-secret documents military base Cody Banks agent 007 agent tie n suit Lex Luthor 4

5 overview Exponentially increasing amounts of valuable information we want to share. Connected environments. Digital : zero-cost verbatim copies. Significant potential for misuse and illicit profit. It becomes essential to have the integrated ability to assert digital rights. rights protection 5

6 rights protection What? identity (e.g. rights holder) Work How? legal means (e.g. severe penalties) + technology (e.g. Watermarking) 6

7 but why not publish newspaper digest? payment Alice (financial advisor) Idea: is there a digest that would allow this? market analysis crypto digest Mallory (malicious licensed client) Problem: what if modified Work has (illicit) resale value? 7

8 watermarking: rights protection tool Watermarking induces a convincing and relevant (wrt. court-time proofs) property ( rights signature ) in a Work, through minor alterations. convincing very rare (false positives) relevant by radu Original Work Watermarked Work Key Watermark Key Watermark Watermarking Watermark Detection Original Work Watermarked Work Yes/No (confidence level) watermark embedding watermark detection 8

9 attacks: Mallory (evil entity) Mallory wants to sell our data illicitly. Detect and Remove ( subtractive ) Perturb Add new Watermark ( additive ) Collude different watermarked copies Watermarking is a game against Mallory! 9

10 10

11 media The encoding bandwidth stems from knowing the main digital Works consumer (human) and the associated limitations of perception. metric of distortion allowable bounds resilience 11

12 12

13 watermarking beyond media In a general data domain (non-media) most existing (multimedia) techniques do not apply because distortion metrics, tolerable bounds, and resilience often bear multiple semantics. Q: How to preserve data value when there is always a semantic dimension that gets impacted even by minor changes thus maybe we should instead focus on preserving application specific quality properties. 13

14 model: consumer driven watermarking Data consumer requirements define distortion metrics and associated bounds. Encoding only guarantees them. In other words: quality metrics should not be hard-coded but rather separated from the watermarking method. Data Rights Holder data constraints "satisfies" A1 A2 A3 A4 A5 A6 A1 A2 A3 A4 A5 A6 Original Data Outsourced Data customer fingerprint or rights holder watermark WM Data Customer 14

15 essential desiderata Rights protection method should not interfere with intended data use. 15

16 16

17 relational data: scenario outsourcing Licensed Party STOP Data Rights Holder Third Party 17

18 relational data: problem relational database B, set of quality constraints C determine B (a watermarked B) B satisfies C and features enough mark resilience. what is resilience? what type of constraints? minimal context detection ( blind )? 18

19 numeric data: initial ideas First thoughts: randomly change bits in the data according to a certain criteria. 19

20 numeric data: Agrawal and Kiernan, watermark insertion [1] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): ,

21 numeric data: Agrawal and Kiernan, watermark insertion [1] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): ,

22 numeric data: Agrawal and Kiernan, watermark detection 22

23 numeric data: virtual primary key If primary key does not exist or could be changed in attacks, then for each tuple partition each attribute Ai into MSBs Mi and LSBs (least g significant bits) Li virtual primary key = concatenation of two (or more) hash values in set {H(K,Mi): i=0, r-1} that are closest to zero Dynamic: for different tuples, different attributes may be selected (based on secret key) to form virtual primary key Content-based: it depends on hash values of MSBs rather than order of attributes [4] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary key for fingerprinting relational data. In DRM '03: Proceedings of the 2003 ACM workshop on Digital rights manage ment, pages , New York, NY, USA, ACM Press. 23

24 numeric data: challenges Challenges: sensitive data (destroys ulterior data uses) natural numeric transformations It is necessary: to handle a set of desired quality metrics + survive attacks (e.g. segmentation, alterations) 24

25 numeric data: key insight Encode information in global numeric properties of secret subsets of the data while continuously evaluating data quality C (backtrack if necessary). Which properties? How do we use them? 25

26 numeric data: weak mark distribution(s i ) c x stdev(s i ) avg(s i ) S i V c (S i ) handles: data loss linear changes random alterations 26

27 numeric data: amplification distribution(s i ) c x stdev(s i ) avg(s i ) S i V c (S i ) collection subset weak mark amplification collection collection subset By applying a (weak) mark on secret subsets of the original data set, it is effectively amplified. 27

28 numeric data: error correction 28

29 numeric data: detection process reconstruct subsets detect invalid subset encoding(s) detect valid bits construct error correction map apply error correction chain reconstruct watermark 29

30 allowable semantic constraints Idea: data consumer requirements define the data quality metrics and associated allowed bounds; encoding process guarantees those bounds. In other words: data quality metrics are not to be hard-coded; data use semantics are to be separated from the watermarking method. 30

31 wmdb.*: system architecture usability metric plugin A usability metric plugin B usability metric plugin C usability metrics plugin handler evaluate WM mark user key attributes backtrack log JDBC A1 A2 A3 A4 A5 A6 multi-threaded Java, tested with pgres/file-io/oracle 9 different JDBC drivers for different connections multiple databases at the same time, parallel watermarking 31

32 wmdb.*: runtime snapshot 32

33 wmdb.*: experiments overview resilience data loss (subset selection) absolute data changes epsilon attacks semantics and data quality classification preservation arbitrary query result performance running times notes: PC, MB RAM, Java, remote JDBC (SQL-92, e.g. Oracle, Postgres, even files), simultaneous multiple database marking, Sales Data from Wal-Mart etc. 33

34 experiments: data loss resilience 34

35 experiments: absolute change 35

36 experiments: arbitrary data change note: average zero epsilon-attack 36

37 experiments: arbitrary data change (2) note: average non-zero epsilon-attack, nice resilience, no knowledge of nature of transform. 37

38 experiments: classification preservation note: as guaranteed classification sensitivity decreases, available bandwidth increases 38

39 experiments: classification preservation (2) note: bandwidth increases as guaranteed classification goodness relaxes 39

40 experiments: performance note: includes local network costs, DBMS costs 40

41 41

42 categorical data: challenges Because there are no epsilon-changes, earlier approaches (numeric) do not work. What is our embedding channel? statistical bias in inter-attribute association Any alteration is discrete, possibly significant we would like to minimize the number (+maximize impact) of required alterations 42

43 embedding channel & # $ $! % # " # $ % # &(e.g. { Chicago, Bucharest Amsterdam }) Because there are no epsilon-changes, earlier approaches (numeric) do not work. we need a different embedding channel! inter-attribute association Any alteration is discrete, possibly significant.! we would like to minimize the number (+maximize impact) of required alterations 43

44 single-key bias # $ % # '()! '()*+, # Question: is the data watermarked? problem: is & this $ relevant (i.e. solution: wrt. by key radu ) k is!? by radu (not viable) solution: multi-bit watermark stating by radu select fit tuples How: slightly alter A, modulating some of its ( fit ) values according to a keyed one-way hash of K 44

45 single-key, single-bit bias & # $ $! % # '()! '() -*+, # Question: is the data watermarked? if yes then what is the one bit watermark? detection time: counting bias '*+, # (().. // '*+, # (().'*. '* // -0' 1 '* How: slightly alter A, modulating some of its ( fit ) values according to a oneway keyed hash of K and the value of the watermark bit w. 45

46 single-key, multi-bit bias problem: some watermark bits solution: might not use be separate considered keys due to +'().(),correlation! & $ and # to de-correlate. # $! % # '()! +, +, '* +, '() -2+3*+ '() -2+3 *+,, # # Question: is the data watermarked? if yes then what is the watermark string? +#, +$, +-, +(), +()*+ +() # *+,, +, +, How: slightly alter A, modulating some of its ("fit") values according to a one-way hash of K and a spread of the values of the watermark w. 46

47 multi-key, multi-bit bias drawback: multi-mark inference, multi-pass solution: required build in (?) interference +, +#, +$, awareness (hash-map)! & # # $ - $ $! % # /! Question: is the data watermarked? if yes then what is the watermark string? +-, +, +, global key 0(. #.. ) one-bit watermarking algorithm How: embed m one-bit watermarks into data using separate dedicated keys. 47

48 vertical partitioning: multi-attribute encoding Question: How to survive vertical partitioning? problem: multi-mark interference & $ solution: interference dependency graph problem: non-primary key first argument! solution: # multi-layer % low impact watermarks! multi-bit watermarking # 1 1 & # $! % # % $ $ #! % % $! -! - How: Embed a watermark in all expected partitions (closure). 48

49 mark interference 1 2 Question: How to deal with multiple marks encoding interference? How: Maintain a mark interference dependency graph so as to propagate awareness of changes. 49

50 attack: bucket counting 1 # $! '() Question: How to survive a correlation attack aimed at detecting statistical bias in case of non-primary key first argument? problem: values in A (non-key) can repeat Mallory can count buckets for 2 ' 3 pairs and identify hot spots #! solution: increase size of possible assigned target values for B when encoding. '() *+, # ' $) 4*+, # 54 $, %&& How: Larger target value sets for fit tuples. 50

51 attack: bucket counting revisited Question: How to survive a correlation attack aimed at detecting statistical bias in case of non-key first argument? 1 # # $! $ - # '()! global key 0(. #.. ) low-impact encoding How: Spread correlation among multiple layers of weak(er) low-impact encodings. 51

52 attack: extreme partitioning Question: How to survive extreme, single-attribute partitioning? $! %! 3-6' * one *17 answer: frequency domain of value occurrences & # $! % 1 # % $ 1 # % $ solution: alter this frequency domain value occurrence histogram to encode an additional watermark.! - - How: Frequency domain embedding. 52

53 attack: value re-mapping # $ % # & Question: How to deal with bijective value re-mappings? 4 & $ & 4 $ #! % (8 # 4! 4 %! 4! #8 $8 %8 # & freq '98 1 How: Discover inverse mapping by using frequency histograms. 53

54 attack: informed inverts Question: How to survive informed mark removal attacks? 5 # solution: if Mallory inverts embedding 2 it effectively enforces 1 (collision set bias). How: Multiple self-reinforcing layers. 54

55 architecture quality metric A quality metric B quality metric C K A B... data quality metrics plugin handler evaluate WM r/w mark user key attributes: K,A backtrack log DBMS JDBC schema metadata 55

56 selected results watermark recovery in the presence of random alterations (error corrected) watermark recovery in the presence of data loss (error corrected) 56

57 resilience analysis -66*'* + * 6 ': 7 a P( r, a) = P'( r, ) = e a / e a / e i= r i p i (1 p) ( a / e) i ;6** ** +-6<= (( <= (>(1 ;6<Σ=?* 1<'Σ=?' f ( X ) = i X i mean = stdev a X i p e a p (1 p) e 'Σ= 64 *> ** - -'-- <'Σ=?'**0 <@,>>(ABC 57

58 categorical data: analysis D 6-'E***,>C '6,>>-6 >C '6'*6*66 +@' AC D'- * + (@C * E*** *' '6(@ 60 r e wm ( tecc) = 1% N wm _ data ;6F D 6-'E**- * +*-6AC**6 6 '*,>C '6G + 6**66* '6G 58

59 categorical data: analysis * 9+ + * * * 7 #0E** ''6,>C '6 - * *6 >C D 6-6-6* *,C ' 6*+ '>C 59

60 60

61 sensor streams: scenario sensor sensor sensor sensor farm wm Licensed Data Consumer STOP sensor sensor Third Party sensing environment 61

62 sensor streams: challenges Transforms Segmentation (no timestamps!) Summarization Sampling Attacks Random Alterations Linear Changes Streaming model Fast encoding (almost real time) Single-pass (no second look at data) Memory bounds 62

63 sample temperature stream A +6.0 C +7.7 E +6.7 F G I +8.7 H K +6.0 B D +2.0 J -5.5 time 63

64 trivial embedding (no timeline) idea: use resilient stream features to encode watermark bits (e.g., extremes) major extremes: η t 1 η t 2 η t 3 η t 4 η t 5 η t 6 time pick some extremes ( fit, major ) H ( msb( η, α ), k1)modφ = i i b( wm) = m wm[i 1 ] wm[i 2 ] +, +#, +$, +-, +, +, 64

65 trivial characteristic subset encoding time e η d δ Encoding: characteristic subset x Θ( η), msb( x, α ) = msb( η, α ) x Θ( η), x[ bit] bit = H ( msb( η, α ), = wm[ i], k 1 )mod β deals with: sampling, summarization 65

66 vulnerability: correlation detection major extremes: η t 1 η t 2 η t 3 η t 4 η t 5 η t 6 H ( msb( η, α ), k1)modφ = i time i b( wm) = m wm[i 1 ] wm[i 2 ] +, +#, +$, +-, +, +, problem: bit-location-msb correlation values in MSB can repeat Mallory can count buckets per * 9 MSB values and identify hot spots need: alternate source of (pseudo-) randomness 66

67 if we would have a reference timeline discrete stream: labels: x t x 1 t x 2 t x 3 t x 4 t x 5 t 6 t 1 t 2 t 3 t 4 t 5 t 6 time tuple then we could maybe apply existing relational data methods (e.g. numeric watermarking by Kiernan and Agrawal, VLDB 2002) would survive random alterations (but not summarization and other transforms). 67

68 timeline requirements survives: transforms (summarization, sampling) attacks (segmentation, random alterations) can be constructed: fast from little more than a window of data 68

69 constructing timeline : stream behaviour idea: timeline = differential interpretation of stream behavior A +6.0 C +7.7 E +6.7 F G I +8.7 H K +6.0 B -7.3 AC: CE: 0 D +2.0 EG: 1 GI: 0 J -5.5 IK: 0 time label(k): deals with: segmentation, sampling, summarization 69

70 bit embedding (with timeline) bit = H t 3, k ) mod β ( 1 bit = H t 5, k ) mod β ( 1 time e time d e d characteristic subset characteristic subset major extremes: η t 1 η t 2 η t 3 η t 4 η t 5 η t 6 labels: t 1 t 2 t 3 t 4 t 5 t 6 time H ( msb( η, α ), k1)modφ = i i b( wm) = m wm[i 1 ] wm[i 2 ] +, +#, +$, +-, +, +, partial problem remains: Mallory can count buckets per * 9 MSB values (+previous labels!) and sometimes identify hot spots smarter: labeling, encoding convention 70

71 smarter characteristic subset encoding partial hash sums Θ( η, δ ) = { x i 1,..., x j [1, a], m ij a = } x u u [ i, j] j i + 1 encoding convention: true lsb( H ( lsb( m, β ), label( η)), ζ ) = 2 ζ 1 false ij lsb( H ( lsb( m, β ), label( η)), ζ ) = 0 ij pros: cons: survives summarization provides randomness de-correlates encoding location finding conforming data point is computationally very expensive 71

72 generate data with conforming partial sums computation required is exponential, but we are ok because we can likely get away with computing just a few of them 72

73 sensor streams: implementation in mark key wm undo log window quality eval. agg. data out constraint A constraint B constraint C 73

74 sensor streams: summarization 74

75 sensor streams: sampling 75

76 sensor streams: sampling+summarization 76

77 sensor streams: segmentation 77

78 sensor streams: random alteration 78

79 sensor streams: impact on quality 79

80 80

81 limits Are there any bounds one can assess for watermarking as a tool for rights protection? 81

82 limits: usability spaces u1 U max U wm f(ε) O' x U wm2 f( max ) x O wm U wm1 u2 A point uniquely identifies a Work in D in this 2 dimensional view of an usability space. Watermarking is a translation that results in O, a watermarked version of O. 82

83 limits: Mallory attacks u1 U max U a2 U attack U wm O' x U a1 U wm2 wm U wm1 x O U successful attack u2 A successful attack is one that yields results in the area of intersection between U max and (U a -U wm ). 83

84 84 limits: inherent vulnerability No matter what the watermarking method, there exists a random attack with a significant non-zero success probability. A more convincing mark yields an even more vulnerable bound on attack success probability max ) 2 ( cos ) 2 (1 cos a w a a a a a a w a sa R d R d R d R R d R d R u U P π π ε π π ε + = =

85 limits: what if scenarios high dimensionality sparse vicinities concavity smart Mallory 85

86 limits: sparse vicinities u1 U data O x U wm1 U wm3 U wm4 U max1 U max3 U max4 wm uninformed attack U wm2 U max2 x O' U max5 U wm5 U wm6 U wm7 U max6 U max7 u2 86

87 limits: concave shapes u1 U data U attack1 x O' 1 wm 1 x O wm 2 U attack2 x O' 2 u2 87

88 watermarking principles Convince-ability Trade-off. There exists a direct relationship between the probability of success of a random attack and the ability to convince in court. The more convincing in court, the higher the probability of success of a random attack. are there classes for which this is not true? Optimality Principle. The vulnerability of a watermarking scheme is minimized when it yields watermarked result Works on the boundary of the maximum allowable distortion vicinity of the originals. recommendation for algorithm design 88

89 89

90 future knowledge centric model of security attacks integrate constraint handling in encoding multi-source data integration extend limit proofs, understand broader class optimizer: find sweet spot in encoding space wmdb.*: backtrack pruning speed up protect categorical data streams intersection: categorical - numerical data alteration distance (categorical data) 90

91 selected references [1] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): , [2] David Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages , New York, NY, USA, ACM Press. [3] J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB, [4] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary key for fingerprinting relational data. In DRM '03: Proceedings of the 2003 ACM workshop on Digital rights manage ment, pages , New York, NY, USA, ACM Press. [5]. Proving ownership over categorical data. In Proceedings of the IEEE International Conference on Data Engineering ICDE, [6]. wmdb.*: A suite for database watermarking (demo). In Proceedings of the IEEE International Conference on Data Engineering ICDE, [7], Mikhail Atallah, and Sunil Prabhakar. Rights protection for relational data. In Proceedings of the ACM Special Interest Group on Management of Data Conference SIGMOD, [8], Mikhail Atallah, and Sunil Prabhakar. Relational data rights protection through watermarking. IEEE Transactions on Knowledge and Data Engineering TKDE, 16(6), June [9], Mikhail Atallah, and Sunil Prabhakar. Resilient rights protection for sensor streams. In Proceedings of the Very Large Databases Conference VLDB, [10], Mikhail Atallah, and Sunil Prabhakar. Ownership proofs for categorical data. IEEE Transactions on Knowledge and Data Engineering TKDE,

92 eof # $ % 92

93 more references [1] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): , [2] David Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages , New York, NY, USA, ACM Press. [3] J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB, [4] Yingjiu Li, Huiping Guo, and Sushil Jajodia. Tamper detection and localization for categorical data using fragile watermarks. In DRM '04: Proceedings of the 4th ACM workshop on Digital rights management, pages 73-82, New York, NY, USA, ACM Press. [5] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary key for fingerprinting relational data. In DRM '03: Proceedings of the 2003 ACM workshop on Digital rights manage ment, pages , New York, NY, USA, ACM Press. [6] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. A robust watermarking scheme for relational data. In Proceedings of the Workshop on Information Technology and Systems (WITS), pages , [7] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Defending against additive attacks with maximal errors in watermarking relational databases. In Proceedings of the IFIP WG 11.3 Working Conference on Data and Application Security, pages 81-94, [8] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2(1):34-45, [9]. Proving ownership over categorical data. In Proceedings of the IEEE International Conference on Data Engineering ICDE, [10]. Rights Assessment for Discrete Digital Data, Ph.D. dissertation. Computer Sciences, Purdue University, [11]. wmdb.*: A suite for database watermarking (demo). In Proceedings of the IEEE International Conference on Data Engineering ICDE, [12] and Mikhail Atallah. Attacking digital watermarks. In Proceedings of the Symposium on Electronic Imaging SPIE, [13], Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. Online at [14], Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. In Proceedings of IWDW 2002, Lecture Notes in Computer Science. Springer-Verlag, [15], Mikhail Atallah, and Sunil Prabhakar. Power: Metrics for evaluating watermarking algorithms. In Proceedings of IEEE ITCC IEEE Computer Society Press, [16], Mikhail Atallah, and Sunil Prabhakar. Watermarking databases. Online at [17], Mikhail Atallah, and Sunil Prabhakar. Rights protection for relational data. In Proceedings of the ACM Special Interest Group on Management of Data Conference SIGMOD, [18], Mikhail Atallah, and Sunil Prabhakar. Relational data rights protection through watermarking. IEEE Transactions on Knowledge and Data Engineering TKDE, 16(6), June [19], Mikhail Atallah, and Sunil Prabhakar. Resilient rights protection for sensor streams. In Proceedings of the Very Large Databases Conference VLDB, [20], Mikhail Atallah, and Sunil Prabhakar. Ownership proofs for categorical data. IEEE Transactions on Knowledge and Data Engineering TKDE,

94 94

95 David-Gross Amblard, PODS 2003 The main difficulty preserving query results is linked to the informational complexity of sets defined by queries, rather than their computational complexity". Roughly, if the family of sets defined by the queries is not learnable [36], no query-preserving data alteration scheme can be designed. Under certain assumptions (i.e., query sets defined by firstorder logic and monadic second order logic on restricted classes of structures with a bounded degree for the Gaifman graph or the tree-width of the structure) a querypreserving data alteration scheme indeed exists. 95

96 relational data: scenario Given a numeric relational database B(a 1,, a n ), a set of local and global semantic constraints C, and a set of secrets K, determine a watermarked version B (a 1,, a n ) of B, such that all elements in C are satisfied (over B ) and B features enough watermark resilience. example challenges: what is resilience? recover mark with minimal context (i.e. no original data available)? 96

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia

More information

Resilient Rights Protection for Sensor Streams

Resilient Rights Protection for Sensor Streams Resilient Rights Protection for Sensor Streams Radu Sion, Mikhail Atallah, Sunil Prabhakar Computer Sciences, Purdue University {sion, mja, sunil}@cs.purdue.edu Abstract Today s world of increasingly dynamic

More information

Robust and Blind Watermarking of Relational Database Systems

Robust and Blind Watermarking of Relational Database Systems Journal of Computer Science 4 (12): 1024-1029, 2008 ISSN 1549-3636 2008 Science Publications Robust and Blind Watermarking of Relational Database Systems 1 Ali Al-Haj and 2 Ashraf Odeh 1 Princess Sumaya

More information

Watermarking for Security in Database

Watermarking for Security in Database Watermarking for Security in Database Prof. Manoj Dhande Department of Computer Engineering of Shah and Anchor Kutchhi Engineering College, Chembur, University of manoj.dhande@gmail.com Aishwarya Kotyankar

More information

Integrity verification for XML data

Integrity verification for XML data Integrity verification for XML data Jules R. Nya Baweu and Huiping Guo Abstract The success of the Internet has made the communication very easy between parties and XML is one of the most used standard

More information

Resilient Information Hiding for Abstract Semi-Structures

Resilient Information Hiding for Abstract Semi-Structures Resilient Information Hiding for Abstract Semi-Structures Radu Sion, Mikhail Atallah, Sunil Prabhakar Computer Sciences Department and The Center for Education and Research in Information Assurance, Purdue

More information

Part II Authentication Techniques

Part II Authentication Techniques Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication

More information

Analysis of a Redactable Signature Scheme on Data with Dependencies

Analysis of a Redactable Signature Scheme on Data with Dependencies Analysis of a Redactable Signature Scheme on Data with Dependencies David Bauer School of ECE Georgia Institute of Technology Email: gte810u@mail.gatech.edu Douglas M. Blough School of ECE Georgia Institute

More information

WATERMARKING, without any exception, has been

WATERMARKING, without any exception, has been 1 A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-all Usability Constraints M. Kamran, Sabah Suhail, and Muddassar Farooq Abstract Ownership protection on

More information

An Efficient Approach for Leakage Tracing

An Efficient Approach for Leakage Tracing International Journal of Electronics and Computer Science Engineering 2301 Available Online at www.ijecse.org ISSN- 2277-1956 Paladugu Divya 1, V.Sivaparvathi 2, M.Salaja 3, V. Sowjanya 4, 1 Student, PVP

More information

Robust Lossless Data Hiding. Outline

Robust Lossless Data Hiding. Outline Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust

More information

Designing Views to Answer Queries under Set, Bag,and BagSet Semantics

Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Rada Chirkova Department of Computer Science, North Carolina State University Raleigh, NC 27695-7535 chirkova@csc.ncsu.edu Foto Afrati

More information

Research of Applications in Relational Database on Digital. Watermarking Technology

Research of Applications in Relational Database on Digital. Watermarking Technology International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 9ǁ September 2013 ǁ PP.84-89 Research of Applications in Relational Database on Digital

More information

A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS

A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS ABD. S. ALFAGI 1 *, A. ABD. MANAF 1, B. A. HAMIDA 2, R. F. OLANREWAJUB 2 1 Advanced

More information

Log File Modification Detection and Location Using Fragile Watermark

Log File Modification Detection and Location Using Fragile Watermark Log File Modification Detection and Location Using Fragile Watermark Liang Xu and Huiping Guo Department of Computer Science California State University at Los Angeles Los Angeles, CA, USA Abstract- In

More information

XML Streams Watermarking(draft)

XML Streams Watermarking(draft) 1 XML Streams Watermarking(draft) Juien Lafaye and David Gross-Amblard {julien.lafaye,david.gross-amblard}@cnam.fr Laboratoire CEDRIC (EA 1395) CC 432 Conservatoire national des arts et métiers 292 rue

More information

PCP and Hardness of Approximation

PCP and Hardness of Approximation PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 12: Database Security Department of Computer Science and Engineering University at Buffalo 1 Review of Access Control Types We previously studied four types

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Differential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017

Differential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017 Differential Privacy Seminar: Robust Techniques Thomas Edlich Technische Universität München Department of Informatics kdd.in.tum.de July 16, 2017 Outline 1. Introduction 2. Definition and Features of

More information

Pufferfish: A Semantic Approach to Customizable Privacy

Pufferfish: A Semantic Approach to Customizable Privacy Pufferfish: A Semantic Approach to Customizable Privacy Ashwin Machanavajjhala ashwin AT cs.duke.edu Collaborators: Daniel Kifer (Penn State), Bolin Ding (UIUC, Microsoft Research) idash Privacy Workshop

More information

Vol. 2, Issue 3, May-Jun 2012, pp Data leakage Detection

Vol. 2, Issue 3, May-Jun 2012, pp Data leakage Detection Data leakage Detection Rohit Pol (Student), Vishwajeet Thakur (Student), Ruturaj Bhise (Student), Guide Prof. Akash Kate Maharashtra Academy of Engineering, University of Pune, Pune, Maharashtra, India

More information

Sign-up Sheet posted outside of my office HFH 1121

Sign-up Sheet posted outside of my office HFH 1121 Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet

More information

Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10

Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10 Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10 RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY, KIRUMAMPAKKAM-607 402 DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING QUESTION BANK

More information

XML Digital Watermarking

XML Digital Watermarking XML Digital Watermarking Khalid Edris 1, Mohammed Adam Ibrahim Fakharaldien 2, Jasni Mohamed Zain 3, Tuty Asmawaty Abdul Kadir 4 Software Engineering Research Department, Faculty of Computer Systems &

More information

A Formal Model to Preserve Knowledge in Outsourced Datasets

A Formal Model to Preserve Knowledge in Outsourced Datasets A Formal Model to Preserve Knowledge in Outsourced Datasets 1 Veera Ragavan K, 2 Karthick S 1 ME Student, 2 Asst.Prof 1,2 Dept of Software Engineering, SRM University, Chennai, India 1 ragu.skp@gmail.com,

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

A Comprehensive Survey of Watermarking Relational Databases Research

A Comprehensive Survey of Watermarking Relational Databases Research 1 A Comprehensive Survey of Watermarking Relational Databases Research M. Kamran and Muddassar Farooq Abstract Watermarking and fingerprinting of relational databases are quite proficient for ownership

More information

Introduction to Cryptoeconomics

Introduction to Cryptoeconomics Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened

More information

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,

More information

Power: A Metric for Evaluating Watermarking Algorithms (CERIAS TR , extended abstract)

Power: A Metric for Evaluating Watermarking Algorithms (CERIAS TR , extended abstract) Power: A Metric for Evaluating Watermarking Algorithms (CERIAS TR 2001-55, extended abstract) Radu Sion Computer Sciences, Purdue University, Center for Education and Research in Information Assurance

More information

The fast boom of the net and associated technology has presented an extraordinary capacity to get right of entry to and

The fast boom of the net and associated technology has presented an extraordinary capacity to get right of entry to and ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com SECURE ATTRIBUTION TRANSMISSION OF DATASET FOR STREAM RECORDS A.Aarthi*, Y.Mistica Dhas Student, Faculty of Computing,

More information

Group Authentication Using The Naccache-Stern Public-Key Cryptosystem

Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Scott Guthery sguthery@mobile-mind.com Abstract A group authentication protocol authenticates pre-defined groups of individuals such

More information

Watermarking Of Relational Databases Mohit H Bhesaniya 1, Kunal Thanki 2

Watermarking Of Relational Databases Mohit H Bhesaniya 1, Kunal Thanki 2 Watermarking Of Relational s Mohit H Bhesaniya 1, Kunal Thanki 2 1 Department of computer engineering, AITS, Rajkot,Gujarat, India. 2 Department of computer engineering, Government polytechnique, porbandar.gujarat,

More information

A Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean:

A Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean: A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms. Zero Knowledge Protocols 3. Each statement is derived via the derivation rules.

More information

Zero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16)

Zero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16) Zero Knowledge Protocols c Eli Biham - May 3, 2005 442 Zero Knowledge Protocols (16) A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms.

More information

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party

More information

Combining digital Watermarks and collusion secure Fingerprints for digital Images

Combining digital Watermarks and collusion secure Fingerprints for digital Images header for SPIE use Combining digital Watermarks and collusion secure Fingerprints for digital Images Jana Dittmann a, Alexander Behr a, Mark Stabenau a, Peter Schmitt b, Jörg Schwenk c, Johannes Ueberberg

More information

Various Approaches for Watermarking of Relational Databases Mohit Bhesaniya, J.N.Rathod, Kunal Thanki

Various Approaches for Watermarking of Relational Databases Mohit Bhesaniya, J.N.Rathod, Kunal Thanki Various Approaches for Watermarking of Relational s Mohit Bhesaniya, J.N.Rathod, Kunal Thanki Abstract as a tool for storing and managing data, relational database is widely used in many information systems.

More information

SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases

SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases Jinlong Wang, Congfu Xu, Hongwei Dan, and Yunhe Pan Institute of Artificial Intelligence, Zhejiang University Hangzhou, 310027,

More information

Image and Video Watermarking

Image and Video Watermarking Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:

More information

"GET /cgi-bin/purchase?itemid=109agfe111;ypcat%20passwd mail 200

GET /cgi-bin/purchase?itemid=109agfe111;ypcat%20passwd mail 200 128.111.41.15 "GET /cgi-bin/purchase? itemid=1a6f62e612&cc=mastercard" 200 128.111.43.24 "GET /cgi-bin/purchase?itemid=61d2b836c0&cc=visa" 200 128.111.48.69 "GET /cgi-bin/purchase? itemid=a625f27110&cc=mastercard"

More information

Confusion/Diffusion Capabilities of Some Robust Hash Functions

Confusion/Diffusion Capabilities of Some Robust Hash Functions Confusion/Diffusion Capabilities of Some Robust Hash Functions Baris Coskun Department of Electrical and Computer Engineering Polytechnic University Brooklyn, NY 24 Email: baris@isis.poly.edu Nasir Memon

More information

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME Jian Ren Tongtong Li Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48824-1226 Email: {renjian,tongli}@egr.msu.edu

More information

Mining Data Streams. Outline [Garofalakis, Gehrke & Rastogi 2002] Introduction. Summarization Methods. Clustering Data Streams

Mining Data Streams. Outline [Garofalakis, Gehrke & Rastogi 2002] Introduction. Summarization Methods. Clustering Data Streams Mining Data Streams Outline [Garofalakis, Gehrke & Rastogi 2002] Introduction Summarization Methods Clustering Data Streams Data Stream Classification Temporal Models CMPT 843, SFU, Martin Ester, 1-06

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. What is a Retrieval Model? Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. What is a Retrieval Model? Basic IR Processes CS630 Representing and Accessing Digital Information Information Retrieval: Retrieval Models Information Retrieval Basics Data Structures and Access Indexing and Preprocessing Retrieval Models Thorsten

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016

International Journal of Modern Trends in Engineering and Research  e-issn No.: , Date: April, 2016 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Watermarking Technology for Relational Database Priyanka R. Gadiya 1,Prashant

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

Key Grids: A Protocol Family for Assigning Symmetric Keys

Key Grids: A Protocol Family for Assigning Symmetric Keys Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed

More information

Microdata Publishing with Algorithmic Privacy Guarantees

Microdata Publishing with Algorithmic Privacy Guarantees Microdata Publishing with Algorithmic Privacy Guarantees Tiancheng Li and Ninghui Li Department of Computer Science, Purdue University 35 N. University Street West Lafayette, IN 4797-217 {li83,ninghui}@cs.purdue.edu

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

A Robust Image Watermarking Scheme using Image Moment Normalization

A Robust Image Watermarking Scheme using Image Moment Normalization A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital

More information

1 Probability Review. CS 124 Section #8 Hashing, Skip Lists 3/20/17. Expectation (weighted average): the expectation of a random quantity X is:

1 Probability Review. CS 124 Section #8 Hashing, Skip Lists 3/20/17. Expectation (weighted average): the expectation of a random quantity X is: CS 124 Section #8 Hashing, Skip Lists 3/20/17 1 Probability Review Expectation (weighted average): the expectation of a random quantity X is: x= x P (X = x) For each value x that X can take on, we look

More information

SURVEY ON RELATIONAL DATABASE WATERMARKING TECHNIQUES

SURVEY ON RELATIONAL DATABASE WATERMARKING TECHNIQUES SURVEY ON RELATIONAL DATABASE WATERMARKING TECHNIQUES Abd. S. Alfagi 1, A. Abd. Manaf 1, B. A. Hamida 2, S. Khan 2 and Ali A. Elrowayati 3 1 Advanced Informatics School, Universiti Teknologi Malaysia,

More information

Management Information Systems Review Questions. Chapter 6 Foundations of Business Intelligence: Databases and Information Management

Management Information Systems Review Questions. Chapter 6 Foundations of Business Intelligence: Databases and Information Management Management Information Systems Review Questions Chapter 6 Foundations of Business Intelligence: Databases and Information Management 1) The traditional file environment does not typically have a problem

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Optimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching

Optimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching Optimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching Tiancheng Li Ninghui Li CERIAS and Department of Computer Science, Purdue University 250 N. University Street, West

More information

Archiving and Maintaining Curated Databases

Archiving and Maintaining Curated Databases Archiving and Maintaining Curated Databases Heiko Müller University of Edinburgh, UK hmueller@inf.ed.ac.uk Abstract Curated databases represent a substantial amount of effort by a dedicated group of people

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz May 20, 2014 Announcements DB 2 Due Tuesday Next Week The Database Approach to Data Management Database: Collection of related files containing

More information

Lecture 19. Lecturer: Aleksander Mądry Scribes: Chidambaram Annamalai and Carsten Moldenhauer

Lecture 19. Lecturer: Aleksander Mądry Scribes: Chidambaram Annamalai and Carsten Moldenhauer CS-621 Theory Gems November 21, 2012 Lecture 19 Lecturer: Aleksander Mądry Scribes: Chidambaram Annamalai and Carsten Moldenhauer 1 Introduction We continue our exploration of streaming algorithms. First,

More information

Relational Database Watermarking for Ownership Protection

Relational Database Watermarking for Ownership Protection Available online at www.sciencedirect.com Procedia Technology 6 (2012 ) 988 995 2nd International Conference on Communication, Computing & Security [ICCCS-2012] Relational Database Watermarking for Ownership

More information

Approximation Algorithms for Clustering Uncertain Data

Approximation Algorithms for Clustering Uncertain Data Approximation Algorithms for Clustering Uncertain Data Graham Cormode AT&T Labs - Research graham@research.att.com Andrew McGregor UCSD / MSR / UMass Amherst andrewm@ucsd.edu Introduction Many applications

More information

A Review on Privacy Preserving Data Mining Approaches

A Review on Privacy Preserving Data Mining Approaches A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

Virtual views. Incremental View Maintenance. View maintenance. Materialized views. Review of bag algebra. Bag algebra operators (slide 1)

Virtual views. Incremental View Maintenance. View maintenance. Materialized views. Review of bag algebra. Bag algebra operators (slide 1) Virtual views Incremental View Maintenance CPS 296.1 Topics in Database Systems A view is defined by a query over base tables Example: CREATE VIEW V AS SELECT FROM R, S WHERE ; A view can be queried just

More information

by Prentice Hall

by Prentice Hall Chapter 6 Foundations of Business Intelligence: Databases and Information Management 6.1 2010 by Prentice Hall Organizing Data in a Traditional File Environment File organization concepts Computer system

More information

Mining Data Streams. From Data-Streams Management System Queries to Knowledge Discovery from continuous and fast-evolving Data Records.

Mining Data Streams. From Data-Streams Management System Queries to Knowledge Discovery from continuous and fast-evolving Data Records. DATA STREAMS MINING Mining Data Streams From Data-Streams Management System Queries to Knowledge Discovery from continuous and fast-evolving Data Records. Hammad Haleem Xavier Plantaz APPLICATIONS Sensors

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

Module 4. Non-linear machine learning econometrics: Support Vector Machine

Module 4. Non-linear machine learning econometrics: Support Vector Machine Module 4. Non-linear machine learning econometrics: Support Vector Machine THE CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE COMMISSION Introduction When the assumption of linearity

More information

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Structured Light II Johannes Köhler Johannes.koehler@dfki.de Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Introduction Previous lecture: Structured Light I Active Scanning Camera/emitter

More information

An Analysis of Approaches to XML Schema Inference

An Analysis of Approaches to XML Schema Inference An Analysis of Approaches to XML Schema Inference Irena Mlynkova irena.mlynkova@mff.cuni.cz Charles University Faculty of Mathematics and Physics Department of Software Engineering Prague, Czech Republic

More information

Closed Non-Derivable Itemsets

Closed Non-Derivable Itemsets Closed Non-Derivable Itemsets Juho Muhonen and Hannu Toivonen Helsinki Institute for Information Technology Basic Research Unit Department of Computer Science University of Helsinki Finland Abstract. Itemset

More information

Data Preprocessing. Slides by: Shree Jaswal

Data Preprocessing. Slides by: Shree Jaswal Data Preprocessing Slides by: Shree Jaswal Topics to be covered Why Preprocessing? Data Cleaning; Data Integration; Data Reduction: Attribute subset selection, Histograms, Clustering and Sampling; Data

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu [Kumar et al. 99] 2/13/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu

More information

Clustering. Robert M. Haralick. Computer Science, Graduate Center City University of New York

Clustering. Robert M. Haralick. Computer Science, Graduate Center City University of New York Clustering Robert M. Haralick Computer Science, Graduate Center City University of New York Outline K-means 1 K-means 2 3 4 5 Clustering K-means The purpose of clustering is to determine the similarity

More information

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao Chapter 9: Database Security: An Introduction Nguyen Thi Ai Thao thaonguyen@cse.hcmut.edu.vn Spring- 2016 Outline Introduction to Database Security Issues Types of Security Threats to databases Database

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz Nov 10, 2016 Class Announcements n Database Assignment 2 posted n Due 11/22 The Database Approach to Data Management The Final Database Design

More information

Optimization Techniques for Range Queries in the Multivalued-Partial Order Preserving Encryption Scheme

Optimization Techniques for Range Queries in the Multivalued-Partial Order Preserving Encryption Scheme DEIM Forum C5-6 Optimization Techniques for Range Queries in the Multivalued-Partial Abstract Order Preserving Encryption Scheme Hasan KADHEM, Toshiyuki AMAGASA,, and Hiroyuki KITAGAWA, Graduate School

More information

Ensuring Trustworthiness of Transactions under Different Isolation Levels

Ensuring Trustworthiness of Transactions under Different Isolation Levels Ensuring Trustworthiness of Transactions under Different Isolation Levels Rohit Jain, Sunil Prabhakar Department of Computer Sciences, Purdue University West Lafayette, IN, USA {jain29,sunil}@cs.purdue.edu

More information

On the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt

On the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt On the Diculty of Software Key Escrow Lars R. Knudsen Katholieke Universiteit Leuven Dept. Elektrotechniek-ESAT Kardinaal Mercierlaan 94 B-3001 Heverlee Torben P. Pedersen y Cryptomathic Arhus Science

More information

Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data

Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data Gayatri R. Ghogare 1, Prof. Aparna Junnarkar 2 1Student, ME, Department of Computer Engineering, P.E.S

More information

Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning

Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning Devina Desai ddevina1@csee.umbc.edu Tim Oates oates@csee.umbc.edu Vishal Shanbhag vshan1@csee.umbc.edu Machine Learning

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

Digital Signatures. Sven Laur University of Tartu

Digital Signatures. Sven Laur University of Tartu Digital Signatures Sven Laur swen@math.ut.ee University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic identity,

More information

Static checking of domain constraints in applications interacting with relational database by means of dependently-typed lambda calculus

Static checking of domain constraints in applications interacting with relational database by means of dependently-typed lambda calculus Static checking of domain constraints in applications interacting with relational database by means of dependently-typed lambda calculus Maxim Aleksandrovich Krivchikov Ph.D., senior researcher, Lomonosov

More information

S. Erfani, ECE Dept., University of Windsor Network Security

S. Erfani, ECE Dept., University of Windsor Network Security 4.11 Data Integrity and Authentication It was mentioned earlier in this chapter that integrity and protection security services are needed to protect against active attacks, such as falsification of data

More information

Approximation Algorithms for Item Pricing

Approximation Algorithms for Item Pricing Approximation Algorithms for Item Pricing Maria-Florina Balcan July 2005 CMU-CS-05-176 Avrim Blum School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 School of Computer Science,

More information

Database Technology Introduction. Heiko Paulheim

Database Technology Introduction. Heiko Paulheim Database Technology Introduction Outline The Need for Databases Data Models Relational Databases Database Design Storage Manager Query Processing Transaction Manager Introduction to the Relational Model

More information

Data Preprocessing. Why Data Preprocessing? MIT-652 Data Mining Applications. Chapter 3: Data Preprocessing. Multi-Dimensional Measure of Data Quality

Data Preprocessing. Why Data Preprocessing? MIT-652 Data Mining Applications. Chapter 3: Data Preprocessing. Multi-Dimensional Measure of Data Quality Why Data Preprocessing? Data in the real world is dirty incomplete: lacking attribute values, lacking certain attributes of interest, or containing only aggregate data e.g., occupation = noisy: containing

More information

Product presentations can be more intelligently planned

Product presentations can be more intelligently planned Association Rules Lecture /DMBI/IKI8303T/MTI/UI Yudho Giri Sucahyo, Ph.D, CISA (yudho@cs.ui.ac.id) Faculty of Computer Science, Objectives Introduction What is Association Mining? Mining Association Rules

More information

Nearest Neighbor Predictors

Nearest Neighbor Predictors Nearest Neighbor Predictors September 2, 2018 Perhaps the simplest machine learning prediction method, from a conceptual point of view, and perhaps also the most unusual, is the nearest-neighbor method,

More information

Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys

Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys Mathias Wagner, Stefan Heyse mathias.wagner@nxp.com Abstract. We present an improved search

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Linearizable Iterators

Linearizable Iterators Linearizable Iterators Supervised by Maurice Herlihy Abstract Petrank et. al. [5] provide a construction of lock-free, linearizable iterators for lock-free linked lists. We consider the problem of extending

More information

CURVILINEAR MESH GENERATION IN 3D

CURVILINEAR MESH GENERATION IN 3D CURVILINEAR MESH GENERATION IN 3D Saikat Dey, Robert M. O'Bara 2 and Mark S. Shephard 2 SFA Inc. / Naval Research Laboratory, Largo, MD., U.S.A., dey@cosmic.nrl.navy.mil 2 Scientific Computation Research

More information

Relational Databases

Relational Databases Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 49 Plan of the course 1 Relational databases 2 Relational database design 3 Conceptual database design 4

More information

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,

More information

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),

More information

10703 Deep Reinforcement Learning and Control

10703 Deep Reinforcement Learning and Control 10703 Deep Reinforcement Learning and Control Russ Salakhutdinov Machine Learning Department rsalakhu@cs.cmu.edu Policy Gradient I Used Materials Disclaimer: Much of the material and slides for this lecture

More information