Rad a u d u S i S o i n o Dat a a t b a a b s a e e W at a e t r e m r ar a k r in i g n 2!"!
|
|
- Blaise Harris
- 5 years ago
- Views:
Transcription
1 !" /16/ All Rights Reserved. DASFAA 2006
2 2
3 scenario payment Alice (financial advisor) market analysis Mallory (malicious licensed client) STOP Jane (innocent victim) 3
4 alternate scenario: traitor tracing top-secret documents military base Cody Banks agent 007 agent tie n suit Lex Luthor 4
5 overview Exponentially increasing amounts of valuable information we want to share. Connected environments. Digital : zero-cost verbatim copies. Significant potential for misuse and illicit profit. It becomes essential to have the integrated ability to assert digital rights. rights protection 5
6 rights protection What? identity (e.g. rights holder) Work How? legal means (e.g. severe penalties) + technology (e.g. Watermarking) 6
7 but why not publish newspaper digest? payment Alice (financial advisor) Idea: is there a digest that would allow this? market analysis crypto digest Mallory (malicious licensed client) Problem: what if modified Work has (illicit) resale value? 7
8 watermarking: rights protection tool Watermarking induces a convincing and relevant (wrt. court-time proofs) property ( rights signature ) in a Work, through minor alterations. convincing very rare (false positives) relevant by radu Original Work Watermarked Work Key Watermark Key Watermark Watermarking Watermark Detection Original Work Watermarked Work Yes/No (confidence level) watermark embedding watermark detection 8
9 attacks: Mallory (evil entity) Mallory wants to sell our data illicitly. Detect and Remove ( subtractive ) Perturb Add new Watermark ( additive ) Collude different watermarked copies Watermarking is a game against Mallory! 9
10 10
11 media The encoding bandwidth stems from knowing the main digital Works consumer (human) and the associated limitations of perception. metric of distortion allowable bounds resilience 11
12 12
13 watermarking beyond media In a general data domain (non-media) most existing (multimedia) techniques do not apply because distortion metrics, tolerable bounds, and resilience often bear multiple semantics. Q: How to preserve data value when there is always a semantic dimension that gets impacted even by minor changes thus maybe we should instead focus on preserving application specific quality properties. 13
14 model: consumer driven watermarking Data consumer requirements define distortion metrics and associated bounds. Encoding only guarantees them. In other words: quality metrics should not be hard-coded but rather separated from the watermarking method. Data Rights Holder data constraints "satisfies" A1 A2 A3 A4 A5 A6 A1 A2 A3 A4 A5 A6 Original Data Outsourced Data customer fingerprint or rights holder watermark WM Data Customer 14
15 essential desiderata Rights protection method should not interfere with intended data use. 15
16 16
17 relational data: scenario outsourcing Licensed Party STOP Data Rights Holder Third Party 17
18 relational data: problem relational database B, set of quality constraints C determine B (a watermarked B) B satisfies C and features enough mark resilience. what is resilience? what type of constraints? minimal context detection ( blind )? 18
19 numeric data: initial ideas First thoughts: randomly change bits in the data according to a certain criteria. 19
20 numeric data: Agrawal and Kiernan, watermark insertion [1] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): ,
21 numeric data: Agrawal and Kiernan, watermark insertion [1] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): ,
22 numeric data: Agrawal and Kiernan, watermark detection 22
23 numeric data: virtual primary key If primary key does not exist or could be changed in attacks, then for each tuple partition each attribute Ai into MSBs Mi and LSBs (least g significant bits) Li virtual primary key = concatenation of two (or more) hash values in set {H(K,Mi): i=0, r-1} that are closest to zero Dynamic: for different tuples, different attributes may be selected (based on secret key) to form virtual primary key Content-based: it depends on hash values of MSBs rather than order of attributes [4] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary key for fingerprinting relational data. In DRM '03: Proceedings of the 2003 ACM workshop on Digital rights manage ment, pages , New York, NY, USA, ACM Press. 23
24 numeric data: challenges Challenges: sensitive data (destroys ulterior data uses) natural numeric transformations It is necessary: to handle a set of desired quality metrics + survive attacks (e.g. segmentation, alterations) 24
25 numeric data: key insight Encode information in global numeric properties of secret subsets of the data while continuously evaluating data quality C (backtrack if necessary). Which properties? How do we use them? 25
26 numeric data: weak mark distribution(s i ) c x stdev(s i ) avg(s i ) S i V c (S i ) handles: data loss linear changes random alterations 26
27 numeric data: amplification distribution(s i ) c x stdev(s i ) avg(s i ) S i V c (S i ) collection subset weak mark amplification collection collection subset By applying a (weak) mark on secret subsets of the original data set, it is effectively amplified. 27
28 numeric data: error correction 28
29 numeric data: detection process reconstruct subsets detect invalid subset encoding(s) detect valid bits construct error correction map apply error correction chain reconstruct watermark 29
30 allowable semantic constraints Idea: data consumer requirements define the data quality metrics and associated allowed bounds; encoding process guarantees those bounds. In other words: data quality metrics are not to be hard-coded; data use semantics are to be separated from the watermarking method. 30
31 wmdb.*: system architecture usability metric plugin A usability metric plugin B usability metric plugin C usability metrics plugin handler evaluate WM mark user key attributes backtrack log JDBC A1 A2 A3 A4 A5 A6 multi-threaded Java, tested with pgres/file-io/oracle 9 different JDBC drivers for different connections multiple databases at the same time, parallel watermarking 31
32 wmdb.*: runtime snapshot 32
33 wmdb.*: experiments overview resilience data loss (subset selection) absolute data changes epsilon attacks semantics and data quality classification preservation arbitrary query result performance running times notes: PC, MB RAM, Java, remote JDBC (SQL-92, e.g. Oracle, Postgres, even files), simultaneous multiple database marking, Sales Data from Wal-Mart etc. 33
34 experiments: data loss resilience 34
35 experiments: absolute change 35
36 experiments: arbitrary data change note: average zero epsilon-attack 36
37 experiments: arbitrary data change (2) note: average non-zero epsilon-attack, nice resilience, no knowledge of nature of transform. 37
38 experiments: classification preservation note: as guaranteed classification sensitivity decreases, available bandwidth increases 38
39 experiments: classification preservation (2) note: bandwidth increases as guaranteed classification goodness relaxes 39
40 experiments: performance note: includes local network costs, DBMS costs 40
41 41
42 categorical data: challenges Because there are no epsilon-changes, earlier approaches (numeric) do not work. What is our embedding channel? statistical bias in inter-attribute association Any alteration is discrete, possibly significant we would like to minimize the number (+maximize impact) of required alterations 42
43 embedding channel & # $ $! % # " # $ % # &(e.g. { Chicago, Bucharest Amsterdam }) Because there are no epsilon-changes, earlier approaches (numeric) do not work. we need a different embedding channel! inter-attribute association Any alteration is discrete, possibly significant.! we would like to minimize the number (+maximize impact) of required alterations 43
44 single-key bias # $ % # '()! '()*+, # Question: is the data watermarked? problem: is & this $ relevant (i.e. solution: wrt. by key radu ) k is!? by radu (not viable) solution: multi-bit watermark stating by radu select fit tuples How: slightly alter A, modulating some of its ( fit ) values according to a keyed one-way hash of K 44
45 single-key, single-bit bias & # $ $! % # '()! '() -*+, # Question: is the data watermarked? if yes then what is the one bit watermark? detection time: counting bias '*+, # (().. // '*+, # (().'*. '* // -0' 1 '* How: slightly alter A, modulating some of its ( fit ) values according to a oneway keyed hash of K and the value of the watermark bit w. 45
46 single-key, multi-bit bias problem: some watermark bits solution: might not use be separate considered keys due to +'().(),correlation! & $ and # to de-correlate. # $! % # '()! +, +, '* +, '() -2+3*+ '() -2+3 *+,, # # Question: is the data watermarked? if yes then what is the watermark string? +#, +$, +-, +(), +()*+ +() # *+,, +, +, How: slightly alter A, modulating some of its ("fit") values according to a one-way hash of K and a spread of the values of the watermark w. 46
47 multi-key, multi-bit bias drawback: multi-mark inference, multi-pass solution: required build in (?) interference +, +#, +$, awareness (hash-map)! & # # $ - $ $! % # /! Question: is the data watermarked? if yes then what is the watermark string? +-, +, +, global key 0(. #.. ) one-bit watermarking algorithm How: embed m one-bit watermarks into data using separate dedicated keys. 47
48 vertical partitioning: multi-attribute encoding Question: How to survive vertical partitioning? problem: multi-mark interference & $ solution: interference dependency graph problem: non-primary key first argument! solution: # multi-layer % low impact watermarks! multi-bit watermarking # 1 1 & # $! % # % $ $ #! % % $! -! - How: Embed a watermark in all expected partitions (closure). 48
49 mark interference 1 2 Question: How to deal with multiple marks encoding interference? How: Maintain a mark interference dependency graph so as to propagate awareness of changes. 49
50 attack: bucket counting 1 # $! '() Question: How to survive a correlation attack aimed at detecting statistical bias in case of non-primary key first argument? problem: values in A (non-key) can repeat Mallory can count buckets for 2 ' 3 pairs and identify hot spots #! solution: increase size of possible assigned target values for B when encoding. '() *+, # ' $) 4*+, # 54 $, %&& How: Larger target value sets for fit tuples. 50
51 attack: bucket counting revisited Question: How to survive a correlation attack aimed at detecting statistical bias in case of non-key first argument? 1 # # $! $ - # '()! global key 0(. #.. ) low-impact encoding How: Spread correlation among multiple layers of weak(er) low-impact encodings. 51
52 attack: extreme partitioning Question: How to survive extreme, single-attribute partitioning? $! %! 3-6' * one *17 answer: frequency domain of value occurrences & # $! % 1 # % $ 1 # % $ solution: alter this frequency domain value occurrence histogram to encode an additional watermark.! - - How: Frequency domain embedding. 52
53 attack: value re-mapping # $ % # & Question: How to deal with bijective value re-mappings? 4 & $ & 4 $ #! % (8 # 4! 4 %! 4! #8 $8 %8 # & freq '98 1 How: Discover inverse mapping by using frequency histograms. 53
54 attack: informed inverts Question: How to survive informed mark removal attacks? 5 # solution: if Mallory inverts embedding 2 it effectively enforces 1 (collision set bias). How: Multiple self-reinforcing layers. 54
55 architecture quality metric A quality metric B quality metric C K A B... data quality metrics plugin handler evaluate WM r/w mark user key attributes: K,A backtrack log DBMS JDBC schema metadata 55
56 selected results watermark recovery in the presence of random alterations (error corrected) watermark recovery in the presence of data loss (error corrected) 56
57 resilience analysis -66*'* + * 6 ': 7 a P( r, a) = P'( r, ) = e a / e a / e i= r i p i (1 p) ( a / e) i ;6** ** +-6<= (( <= (>(1 ;6<Σ=?* 1<'Σ=?' f ( X ) = i X i mean = stdev a X i p e a p (1 p) e 'Σ= 64 *> ** - -'-- <'Σ=?'**0 <@,>>(ABC 57
58 categorical data: analysis D 6-'E***,>C '6,>>-6 >C '6'*6*66 +@' AC D'- * + (@C * E*** *' '6(@ 60 r e wm ( tecc) = 1% N wm _ data ;6F D 6-'E**- * +*-6AC**6 6 '*,>C '6G + 6**66* '6G 58
59 categorical data: analysis * 9+ + * * * 7 #0E** ''6,>C '6 - * *6 >C D 6-6-6* *,C ' 6*+ '>C 59
60 60
61 sensor streams: scenario sensor sensor sensor sensor farm wm Licensed Data Consumer STOP sensor sensor Third Party sensing environment 61
62 sensor streams: challenges Transforms Segmentation (no timestamps!) Summarization Sampling Attacks Random Alterations Linear Changes Streaming model Fast encoding (almost real time) Single-pass (no second look at data) Memory bounds 62
63 sample temperature stream A +6.0 C +7.7 E +6.7 F G I +8.7 H K +6.0 B D +2.0 J -5.5 time 63
64 trivial embedding (no timeline) idea: use resilient stream features to encode watermark bits (e.g., extremes) major extremes: η t 1 η t 2 η t 3 η t 4 η t 5 η t 6 time pick some extremes ( fit, major ) H ( msb( η, α ), k1)modφ = i i b( wm) = m wm[i 1 ] wm[i 2 ] +, +#, +$, +-, +, +, 64
65 trivial characteristic subset encoding time e η d δ Encoding: characteristic subset x Θ( η), msb( x, α ) = msb( η, α ) x Θ( η), x[ bit] bit = H ( msb( η, α ), = wm[ i], k 1 )mod β deals with: sampling, summarization 65
66 vulnerability: correlation detection major extremes: η t 1 η t 2 η t 3 η t 4 η t 5 η t 6 H ( msb( η, α ), k1)modφ = i time i b( wm) = m wm[i 1 ] wm[i 2 ] +, +#, +$, +-, +, +, problem: bit-location-msb correlation values in MSB can repeat Mallory can count buckets per * 9 MSB values and identify hot spots need: alternate source of (pseudo-) randomness 66
67 if we would have a reference timeline discrete stream: labels: x t x 1 t x 2 t x 3 t x 4 t x 5 t 6 t 1 t 2 t 3 t 4 t 5 t 6 time tuple then we could maybe apply existing relational data methods (e.g. numeric watermarking by Kiernan and Agrawal, VLDB 2002) would survive random alterations (but not summarization and other transforms). 67
68 timeline requirements survives: transforms (summarization, sampling) attacks (segmentation, random alterations) can be constructed: fast from little more than a window of data 68
69 constructing timeline : stream behaviour idea: timeline = differential interpretation of stream behavior A +6.0 C +7.7 E +6.7 F G I +8.7 H K +6.0 B -7.3 AC: CE: 0 D +2.0 EG: 1 GI: 0 J -5.5 IK: 0 time label(k): deals with: segmentation, sampling, summarization 69
70 bit embedding (with timeline) bit = H t 3, k ) mod β ( 1 bit = H t 5, k ) mod β ( 1 time e time d e d characteristic subset characteristic subset major extremes: η t 1 η t 2 η t 3 η t 4 η t 5 η t 6 labels: t 1 t 2 t 3 t 4 t 5 t 6 time H ( msb( η, α ), k1)modφ = i i b( wm) = m wm[i 1 ] wm[i 2 ] +, +#, +$, +-, +, +, partial problem remains: Mallory can count buckets per * 9 MSB values (+previous labels!) and sometimes identify hot spots smarter: labeling, encoding convention 70
71 smarter characteristic subset encoding partial hash sums Θ( η, δ ) = { x i 1,..., x j [1, a], m ij a = } x u u [ i, j] j i + 1 encoding convention: true lsb( H ( lsb( m, β ), label( η)), ζ ) = 2 ζ 1 false ij lsb( H ( lsb( m, β ), label( η)), ζ ) = 0 ij pros: cons: survives summarization provides randomness de-correlates encoding location finding conforming data point is computationally very expensive 71
72 generate data with conforming partial sums computation required is exponential, but we are ok because we can likely get away with computing just a few of them 72
73 sensor streams: implementation in mark key wm undo log window quality eval. agg. data out constraint A constraint B constraint C 73
74 sensor streams: summarization 74
75 sensor streams: sampling 75
76 sensor streams: sampling+summarization 76
77 sensor streams: segmentation 77
78 sensor streams: random alteration 78
79 sensor streams: impact on quality 79
80 80
81 limits Are there any bounds one can assess for watermarking as a tool for rights protection? 81
82 limits: usability spaces u1 U max U wm f(ε) O' x U wm2 f( max ) x O wm U wm1 u2 A point uniquely identifies a Work in D in this 2 dimensional view of an usability space. Watermarking is a translation that results in O, a watermarked version of O. 82
83 limits: Mallory attacks u1 U max U a2 U attack U wm O' x U a1 U wm2 wm U wm1 x O U successful attack u2 A successful attack is one that yields results in the area of intersection between U max and (U a -U wm ). 83
84 84 limits: inherent vulnerability No matter what the watermarking method, there exists a random attack with a significant non-zero success probability. A more convincing mark yields an even more vulnerable bound on attack success probability max ) 2 ( cos ) 2 (1 cos a w a a a a a a w a sa R d R d R d R R d R d R u U P π π ε π π ε + = =
85 limits: what if scenarios high dimensionality sparse vicinities concavity smart Mallory 85
86 limits: sparse vicinities u1 U data O x U wm1 U wm3 U wm4 U max1 U max3 U max4 wm uninformed attack U wm2 U max2 x O' U max5 U wm5 U wm6 U wm7 U max6 U max7 u2 86
87 limits: concave shapes u1 U data U attack1 x O' 1 wm 1 x O wm 2 U attack2 x O' 2 u2 87
88 watermarking principles Convince-ability Trade-off. There exists a direct relationship between the probability of success of a random attack and the ability to convince in court. The more convincing in court, the higher the probability of success of a random attack. are there classes for which this is not true? Optimality Principle. The vulnerability of a watermarking scheme is minimized when it yields watermarked result Works on the boundary of the maximum allowable distortion vicinity of the originals. recommendation for algorithm design 88
89 89
90 future knowledge centric model of security attacks integrate constraint handling in encoding multi-source data integration extend limit proofs, understand broader class optimizer: find sweet spot in encoding space wmdb.*: backtrack pruning speed up protect categorical data streams intersection: categorical - numerical data alteration distance (categorical data) 90
91 selected references [1] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): , [2] David Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages , New York, NY, USA, ACM Press. [3] J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB, [4] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary key for fingerprinting relational data. In DRM '03: Proceedings of the 2003 ACM workshop on Digital rights manage ment, pages , New York, NY, USA, ACM Press. [5]. Proving ownership over categorical data. In Proceedings of the IEEE International Conference on Data Engineering ICDE, [6]. wmdb.*: A suite for database watermarking (demo). In Proceedings of the IEEE International Conference on Data Engineering ICDE, [7], Mikhail Atallah, and Sunil Prabhakar. Rights protection for relational data. In Proceedings of the ACM Special Interest Group on Management of Data Conference SIGMOD, [8], Mikhail Atallah, and Sunil Prabhakar. Relational data rights protection through watermarking. IEEE Transactions on Knowledge and Data Engineering TKDE, 16(6), June [9], Mikhail Atallah, and Sunil Prabhakar. Resilient rights protection for sensor streams. In Proceedings of the Very Large Databases Conference VLDB, [10], Mikhail Atallah, and Sunil Prabhakar. Ownership proofs for categorical data. IEEE Transactions on Knowledge and Data Engineering TKDE,
92 eof # $ % 92
93 more references [1] Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2): , [2] David Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages , New York, NY, USA, ACM Press. [3] J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB, [4] Yingjiu Li, Huiping Guo, and Sushil Jajodia. Tamper detection and localization for categorical data using fragile watermarks. In DRM '04: Proceedings of the 4th ACM workshop on Digital rights management, pages 73-82, New York, NY, USA, ACM Press. [5] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary key for fingerprinting relational data. In DRM '03: Proceedings of the 2003 ACM workshop on Digital rights manage ment, pages , New York, NY, USA, ACM Press. [6] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. A robust watermarking scheme for relational data. In Proceedings of the Workshop on Information Technology and Systems (WITS), pages , [7] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Defending against additive attacks with maximal errors in watermarking relational databases. In Proceedings of the IFIP WG 11.3 Working Conference on Data and Application Security, pages 81-94, [8] Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2(1):34-45, [9]. Proving ownership over categorical data. In Proceedings of the IEEE International Conference on Data Engineering ICDE, [10]. Rights Assessment for Discrete Digital Data, Ph.D. dissertation. Computer Sciences, Purdue University, [11]. wmdb.*: A suite for database watermarking (demo). In Proceedings of the IEEE International Conference on Data Engineering ICDE, [12] and Mikhail Atallah. Attacking digital watermarks. In Proceedings of the Symposium on Electronic Imaging SPIE, [13], Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. Online at [14], Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. In Proceedings of IWDW 2002, Lecture Notes in Computer Science. Springer-Verlag, [15], Mikhail Atallah, and Sunil Prabhakar. Power: Metrics for evaluating watermarking algorithms. In Proceedings of IEEE ITCC IEEE Computer Society Press, [16], Mikhail Atallah, and Sunil Prabhakar. Watermarking databases. Online at [17], Mikhail Atallah, and Sunil Prabhakar. Rights protection for relational data. In Proceedings of the ACM Special Interest Group on Management of Data Conference SIGMOD, [18], Mikhail Atallah, and Sunil Prabhakar. Relational data rights protection through watermarking. IEEE Transactions on Knowledge and Data Engineering TKDE, 16(6), June [19], Mikhail Atallah, and Sunil Prabhakar. Resilient rights protection for sensor streams. In Proceedings of the Very Large Databases Conference VLDB, [20], Mikhail Atallah, and Sunil Prabhakar. Ownership proofs for categorical data. IEEE Transactions on Knowledge and Data Engineering TKDE,
94 94
95 David-Gross Amblard, PODS 2003 The main difficulty preserving query results is linked to the informational complexity of sets defined by queries, rather than their computational complexity". Roughly, if the family of sets defined by the queries is not learnable [36], no query-preserving data alteration scheme can be designed. Under certain assumptions (i.e., query sets defined by firstorder logic and monadic second order logic on restricted classes of structures with a bounded degree for the Gaifman graph or the tree-width of the structure) a querypreserving data alteration scheme indeed exists. 95
96 relational data: scenario Given a numeric relational database B(a 1,, a n ), a set of local and global semantic constraints C, and a set of secrets K, determine a watermarked version B (a 1,, a n ) of B, such that all elements in C are satisfied (over B ) and B features enough watermark resilience. example challenges: what is resilience? recover mark with minimal context (i.e. no original data available)? 96
A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationResilient Rights Protection for Sensor Streams
Resilient Rights Protection for Sensor Streams Radu Sion, Mikhail Atallah, Sunil Prabhakar Computer Sciences, Purdue University {sion, mja, sunil}@cs.purdue.edu Abstract Today s world of increasingly dynamic
More informationRobust and Blind Watermarking of Relational Database Systems
Journal of Computer Science 4 (12): 1024-1029, 2008 ISSN 1549-3636 2008 Science Publications Robust and Blind Watermarking of Relational Database Systems 1 Ali Al-Haj and 2 Ashraf Odeh 1 Princess Sumaya
More informationWatermarking for Security in Database
Watermarking for Security in Database Prof. Manoj Dhande Department of Computer Engineering of Shah and Anchor Kutchhi Engineering College, Chembur, University of manoj.dhande@gmail.com Aishwarya Kotyankar
More informationIntegrity verification for XML data
Integrity verification for XML data Jules R. Nya Baweu and Huiping Guo Abstract The success of the Internet has made the communication very easy between parties and XML is one of the most used standard
More informationResilient Information Hiding for Abstract Semi-Structures
Resilient Information Hiding for Abstract Semi-Structures Radu Sion, Mikhail Atallah, Sunil Prabhakar Computer Sciences Department and The Center for Education and Research in Information Assurance, Purdue
More informationPart II Authentication Techniques
Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication
More informationAnalysis of a Redactable Signature Scheme on Data with Dependencies
Analysis of a Redactable Signature Scheme on Data with Dependencies David Bauer School of ECE Georgia Institute of Technology Email: gte810u@mail.gatech.edu Douglas M. Blough School of ECE Georgia Institute
More informationWATERMARKING, without any exception, has been
1 A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-all Usability Constraints M. Kamran, Sabah Suhail, and Muddassar Farooq Abstract Ownership protection on
More informationAn Efficient Approach for Leakage Tracing
International Journal of Electronics and Computer Science Engineering 2301 Available Online at www.ijecse.org ISSN- 2277-1956 Paladugu Divya 1, V.Sivaparvathi 2, M.Salaja 3, V. Sowjanya 4, 1 Student, PVP
More informationRobust Lossless Data Hiding. Outline
Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust
More informationDesigning Views to Answer Queries under Set, Bag,and BagSet Semantics
Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Rada Chirkova Department of Computer Science, North Carolina State University Raleigh, NC 27695-7535 chirkova@csc.ncsu.edu Foto Afrati
More informationResearch of Applications in Relational Database on Digital. Watermarking Technology
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 9ǁ September 2013 ǁ PP.84-89 Research of Applications in Relational Database on Digital
More informationA ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS
A ZERO-DISTORTION FRAGILE WATERMARKING SCHEME TO DETECT AND LOCALIZE MALICIOUS MODIFICATIONS IN TEXTUAL DATABASE RELATIONS ABD. S. ALFAGI 1 *, A. ABD. MANAF 1, B. A. HAMIDA 2, R. F. OLANREWAJUB 2 1 Advanced
More informationLog File Modification Detection and Location Using Fragile Watermark
Log File Modification Detection and Location Using Fragile Watermark Liang Xu and Huiping Guo Department of Computer Science California State University at Los Angeles Los Angeles, CA, USA Abstract- In
More informationXML Streams Watermarking(draft)
1 XML Streams Watermarking(draft) Juien Lafaye and David Gross-Amblard {julien.lafaye,david.gross-amblard}@cnam.fr Laboratoire CEDRIC (EA 1395) CC 432 Conservatoire national des arts et métiers 292 rue
More informationPCP and Hardness of Approximation
PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 12: Database Security Department of Computer Science and Engineering University at Buffalo 1 Review of Access Control Types We previously studied four types
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationDifferential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017
Differential Privacy Seminar: Robust Techniques Thomas Edlich Technische Universität München Department of Informatics kdd.in.tum.de July 16, 2017 Outline 1. Introduction 2. Definition and Features of
More informationPufferfish: A Semantic Approach to Customizable Privacy
Pufferfish: A Semantic Approach to Customizable Privacy Ashwin Machanavajjhala ashwin AT cs.duke.edu Collaborators: Daniel Kifer (Penn State), Bolin Ding (UIUC, Microsoft Research) idash Privacy Workshop
More informationVol. 2, Issue 3, May-Jun 2012, pp Data leakage Detection
Data leakage Detection Rohit Pol (Student), Vishwajeet Thakur (Student), Ruturaj Bhise (Student), Guide Prof. Akash Kate Maharashtra Academy of Engineering, University of Pune, Pune, Maharashtra, India
More informationSign-up Sheet posted outside of my office HFH 1121
Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet
More informationRajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10
Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10 RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY, KIRUMAMPAKKAM-607 402 DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING QUESTION BANK
More informationXML Digital Watermarking
XML Digital Watermarking Khalid Edris 1, Mohammed Adam Ibrahim Fakharaldien 2, Jasni Mohamed Zain 3, Tuty Asmawaty Abdul Kadir 4 Software Engineering Research Department, Faculty of Computer Systems &
More informationA Formal Model to Preserve Knowledge in Outsourced Datasets
A Formal Model to Preserve Knowledge in Outsourced Datasets 1 Veera Ragavan K, 2 Karthick S 1 ME Student, 2 Asst.Prof 1,2 Dept of Software Engineering, SRM University, Chennai, India 1 ragu.skp@gmail.com,
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More informationA Comprehensive Survey of Watermarking Relational Databases Research
1 A Comprehensive Survey of Watermarking Relational Databases Research M. Kamran and Muddassar Farooq Abstract Watermarking and fingerprinting of relational databases are quite proficient for ownership
More informationIntroduction to Cryptoeconomics
Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened
More informationAccumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,
More informationPower: A Metric for Evaluating Watermarking Algorithms (CERIAS TR , extended abstract)
Power: A Metric for Evaluating Watermarking Algorithms (CERIAS TR 2001-55, extended abstract) Radu Sion Computer Sciences, Purdue University, Center for Education and Research in Information Assurance
More informationThe fast boom of the net and associated technology has presented an extraordinary capacity to get right of entry to and
ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com SECURE ATTRIBUTION TRANSMISSION OF DATASET FOR STREAM RECORDS A.Aarthi*, Y.Mistica Dhas Student, Faculty of Computing,
More informationGroup Authentication Using The Naccache-Stern Public-Key Cryptosystem
Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Scott Guthery sguthery@mobile-mind.com Abstract A group authentication protocol authenticates pre-defined groups of individuals such
More informationWatermarking Of Relational Databases Mohit H Bhesaniya 1, Kunal Thanki 2
Watermarking Of Relational s Mohit H Bhesaniya 1, Kunal Thanki 2 1 Department of computer engineering, AITS, Rajkot,Gujarat, India. 2 Department of computer engineering, Government polytechnique, porbandar.gujarat,
More informationA Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean:
A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms. Zero Knowledge Protocols 3. Each statement is derived via the derivation rules.
More informationZero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16)
Zero Knowledge Protocols c Eli Biham - May 3, 2005 442 Zero Knowledge Protocols (16) A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms.
More informationSecuring Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh
Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party
More informationCombining digital Watermarks and collusion secure Fingerprints for digital Images
header for SPIE use Combining digital Watermarks and collusion secure Fingerprints for digital Images Jana Dittmann a, Alexander Behr a, Mark Stabenau a, Peter Schmitt b, Jörg Schwenk c, Johannes Ueberberg
More informationVarious Approaches for Watermarking of Relational Databases Mohit Bhesaniya, J.N.Rathod, Kunal Thanki
Various Approaches for Watermarking of Relational s Mohit Bhesaniya, J.N.Rathod, Kunal Thanki Abstract as a tool for storing and managing data, relational database is widely used in many information systems.
More informationSA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases
SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases Jinlong Wang, Congfu Xu, Hongwei Dan, and Yunhe Pan Institute of Artificial Intelligence, Zhejiang University Hangzhou, 310027,
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More information"GET /cgi-bin/purchase?itemid=109agfe111;ypcat%20passwd mail 200
128.111.41.15 "GET /cgi-bin/purchase? itemid=1a6f62e612&cc=mastercard" 200 128.111.43.24 "GET /cgi-bin/purchase?itemid=61d2b836c0&cc=visa" 200 128.111.48.69 "GET /cgi-bin/purchase? itemid=a625f27110&cc=mastercard"
More informationConfusion/Diffusion Capabilities of Some Robust Hash Functions
Confusion/Diffusion Capabilities of Some Robust Hash Functions Baris Coskun Department of Electrical and Computer Engineering Polytechnic University Brooklyn, NY 24 Email: baris@isis.poly.edu Nasir Memon
More informationA CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME
A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME Jian Ren Tongtong Li Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48824-1226 Email: {renjian,tongli}@egr.msu.edu
More informationMining Data Streams. Outline [Garofalakis, Gehrke & Rastogi 2002] Introduction. Summarization Methods. Clustering Data Streams
Mining Data Streams Outline [Garofalakis, Gehrke & Rastogi 2002] Introduction Summarization Methods Clustering Data Streams Data Stream Classification Temporal Models CMPT 843, SFU, Martin Ester, 1-06
More informationInformation Retrieval. CS630 Representing and Accessing Digital Information. What is a Retrieval Model? Basic IR Processes
CS630 Representing and Accessing Digital Information Information Retrieval: Retrieval Models Information Retrieval Basics Data Structures and Access Indexing and Preprocessing Retrieval Models Thorsten
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Watermarking Technology for Relational Database Priyanka R. Gadiya 1,Prashant
More informationA Lightweight Blockchain Consensus Protocol
A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained
More informationKey Grids: A Protocol Family for Assigning Symmetric Keys
Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed
More informationMicrodata Publishing with Algorithmic Privacy Guarantees
Microdata Publishing with Algorithmic Privacy Guarantees Tiancheng Li and Ninghui Li Department of Computer Science, Purdue University 35 N. University Street West Lafayette, IN 4797-217 {li83,ninghui}@cs.purdue.edu
More informationReliable Broadcast Message Authentication in Wireless Sensor Networks
Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric
More informationA Robust Image Watermarking Scheme using Image Moment Normalization
A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital
More information1 Probability Review. CS 124 Section #8 Hashing, Skip Lists 3/20/17. Expectation (weighted average): the expectation of a random quantity X is:
CS 124 Section #8 Hashing, Skip Lists 3/20/17 1 Probability Review Expectation (weighted average): the expectation of a random quantity X is: x= x P (X = x) For each value x that X can take on, we look
More informationSURVEY ON RELATIONAL DATABASE WATERMARKING TECHNIQUES
SURVEY ON RELATIONAL DATABASE WATERMARKING TECHNIQUES Abd. S. Alfagi 1, A. Abd. Manaf 1, B. A. Hamida 2, S. Khan 2 and Ali A. Elrowayati 3 1 Advanced Informatics School, Universiti Teknologi Malaysia,
More informationManagement Information Systems Review Questions. Chapter 6 Foundations of Business Intelligence: Databases and Information Management
Management Information Systems Review Questions Chapter 6 Foundations of Business Intelligence: Databases and Information Management 1) The traditional file environment does not typically have a problem
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationOptimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching
Optimal k-anonymity with Flexible Generalization Schemes through Bottom-up Searching Tiancheng Li Ninghui Li CERIAS and Department of Computer Science, Purdue University 250 N. University Street, West
More informationArchiving and Maintaining Curated Databases
Archiving and Maintaining Curated Databases Heiko Müller University of Edinburgh, UK hmueller@inf.ed.ac.uk Abstract Curated databases represent a substantial amount of effort by a dedicated group of people
More informationTIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz May 20, 2014 Announcements DB 2 Due Tuesday Next Week The Database Approach to Data Management Database: Collection of related files containing
More informationLecture 19. Lecturer: Aleksander Mądry Scribes: Chidambaram Annamalai and Carsten Moldenhauer
CS-621 Theory Gems November 21, 2012 Lecture 19 Lecturer: Aleksander Mądry Scribes: Chidambaram Annamalai and Carsten Moldenhauer 1 Introduction We continue our exploration of streaming algorithms. First,
More informationRelational Database Watermarking for Ownership Protection
Available online at www.sciencedirect.com Procedia Technology 6 (2012 ) 988 995 2nd International Conference on Communication, Computing & Security [ICCCS-2012] Relational Database Watermarking for Ownership
More informationApproximation Algorithms for Clustering Uncertain Data
Approximation Algorithms for Clustering Uncertain Data Graham Cormode AT&T Labs - Research graham@research.att.com Andrew McGregor UCSD / MSR / UMass Amherst andrewm@ucsd.edu Introduction Many applications
More informationA Review on Privacy Preserving Data Mining Approaches
A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationVirtual views. Incremental View Maintenance. View maintenance. Materialized views. Review of bag algebra. Bag algebra operators (slide 1)
Virtual views Incremental View Maintenance CPS 296.1 Topics in Database Systems A view is defined by a query over base tables Example: CREATE VIEW V AS SELECT FROM R, S WHERE ; A view can be queried just
More informationby Prentice Hall
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 6.1 2010 by Prentice Hall Organizing Data in a Traditional File Environment File organization concepts Computer system
More informationMining Data Streams. From Data-Streams Management System Queries to Knowledge Discovery from continuous and fast-evolving Data Records.
DATA STREAMS MINING Mining Data Streams From Data-Streams Management System Queries to Knowledge Discovery from continuous and fast-evolving Data Records. Hammad Haleem Xavier Plantaz APPLICATIONS Sensors
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationModule 4. Non-linear machine learning econometrics: Support Vector Machine
Module 4. Non-linear machine learning econometrics: Support Vector Machine THE CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE COMMISSION Introduction When the assumption of linearity
More informationStructured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov
Structured Light II Johannes Köhler Johannes.koehler@dfki.de Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Introduction Previous lecture: Structured Light I Active Scanning Camera/emitter
More informationAn Analysis of Approaches to XML Schema Inference
An Analysis of Approaches to XML Schema Inference Irena Mlynkova irena.mlynkova@mff.cuni.cz Charles University Faculty of Mathematics and Physics Department of Software Engineering Prague, Czech Republic
More informationClosed Non-Derivable Itemsets
Closed Non-Derivable Itemsets Juho Muhonen and Hannu Toivonen Helsinki Institute for Information Technology Basic Research Unit Department of Computer Science University of Helsinki Finland Abstract. Itemset
More informationData Preprocessing. Slides by: Shree Jaswal
Data Preprocessing Slides by: Shree Jaswal Topics to be covered Why Preprocessing? Data Cleaning; Data Integration; Data Reduction: Attribute subset selection, Histograms, Clustering and Sampling; Data
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu [Kumar et al. 99] 2/13/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu
More informationClustering. Robert M. Haralick. Computer Science, Graduate Center City University of New York
Clustering Robert M. Haralick Computer Science, Graduate Center City University of New York Outline K-means 1 K-means 2 3 4 5 Clustering K-means The purpose of clustering is to determine the similarity
More informationChapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao
Chapter 9: Database Security: An Introduction Nguyen Thi Ai Thao thaonguyen@cse.hcmut.edu.vn Spring- 2016 Outline Introduction to Database Security Issues Types of Security Threats to databases Database
More informationTIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz Nov 10, 2016 Class Announcements n Database Assignment 2 posted n Due 11/22 The Database Approach to Data Management The Final Database Design
More informationOptimization Techniques for Range Queries in the Multivalued-Partial Order Preserving Encryption Scheme
DEIM Forum C5-6 Optimization Techniques for Range Queries in the Multivalued-Partial Abstract Order Preserving Encryption Scheme Hasan KADHEM, Toshiyuki AMAGASA,, and Hiroyuki KITAGAWA, Graduate School
More informationEnsuring Trustworthiness of Transactions under Different Isolation Levels
Ensuring Trustworthiness of Transactions under Different Isolation Levels Rohit Jain, Sunil Prabhakar Department of Computer Sciences, Purdue University West Lafayette, IN, USA {jain29,sunil}@cs.purdue.edu
More informationOn the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt
On the Diculty of Software Key Escrow Lars R. Knudsen Katholieke Universiteit Leuven Dept. Elektrotechniek-ESAT Kardinaal Mercierlaan 94 B-3001 Heverlee Torben P. Pedersen y Cryptomathic Arhus Science
More informationGenetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data
Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data Gayatri R. Ghogare 1, Prof. Aparna Junnarkar 2 1Student, ME, Department of Computer Engineering, P.E.S
More informationOnline Pattern Recognition in Multivariate Data Streams using Unsupervised Learning
Online Pattern Recognition in Multivariate Data Streams using Unsupervised Learning Devina Desai ddevina1@csee.umbc.edu Tim Oates oates@csee.umbc.edu Vishal Shanbhag vshan1@csee.umbc.edu Machine Learning
More informationInformation and Communications Security: Encryption and Information Hiding
Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles
More informationDigital Signatures. Sven Laur University of Tartu
Digital Signatures Sven Laur swen@math.ut.ee University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic identity,
More informationStatic checking of domain constraints in applications interacting with relational database by means of dependently-typed lambda calculus
Static checking of domain constraints in applications interacting with relational database by means of dependently-typed lambda calculus Maxim Aleksandrovich Krivchikov Ph.D., senior researcher, Lomonosov
More informationS. Erfani, ECE Dept., University of Windsor Network Security
4.11 Data Integrity and Authentication It was mentioned earlier in this chapter that integrity and protection security services are needed to protect against active attacks, such as falsification of data
More informationApproximation Algorithms for Item Pricing
Approximation Algorithms for Item Pricing Maria-Florina Balcan July 2005 CMU-CS-05-176 Avrim Blum School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 School of Computer Science,
More informationDatabase Technology Introduction. Heiko Paulheim
Database Technology Introduction Outline The Need for Databases Data Models Relational Databases Database Design Storage Manager Query Processing Transaction Manager Introduction to the Relational Model
More informationData Preprocessing. Why Data Preprocessing? MIT-652 Data Mining Applications. Chapter 3: Data Preprocessing. Multi-Dimensional Measure of Data Quality
Why Data Preprocessing? Data in the real world is dirty incomplete: lacking attribute values, lacking certain attributes of interest, or containing only aggregate data e.g., occupation = noisy: containing
More informationProduct presentations can be more intelligently planned
Association Rules Lecture /DMBI/IKI8303T/MTI/UI Yudho Giri Sucahyo, Ph.D, CISA (yudho@cs.ui.ac.id) Faculty of Computer Science, Objectives Introduction What is Association Mining? Mining Association Rules
More informationNearest Neighbor Predictors
Nearest Neighbor Predictors September 2, 2018 Perhaps the simplest machine learning prediction method, from a conceptual point of view, and perhaps also the most unusual, is the nearest-neighbor method,
More informationImproved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys
Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys Mathias Wagner, Stefan Heyse mathias.wagner@nxp.com Abstract. We present an improved search
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationLinearizable Iterators
Linearizable Iterators Supervised by Maurice Herlihy Abstract Petrank et. al. [5] provide a construction of lock-free, linearizable iterators for lock-free linked lists. We consider the problem of extending
More informationCURVILINEAR MESH GENERATION IN 3D
CURVILINEAR MESH GENERATION IN 3D Saikat Dey, Robert M. O'Bara 2 and Mark S. Shephard 2 SFA Inc. / Naval Research Laboratory, Largo, MD., U.S.A., dey@cosmic.nrl.navy.mil 2 Scientific Computation Research
More informationRelational Databases
Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 49 Plan of the course 1 Relational databases 2 Relational database design 3 Conceptual database design 4
More informationSECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION
SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More information10703 Deep Reinforcement Learning and Control
10703 Deep Reinforcement Learning and Control Russ Salakhutdinov Machine Learning Department rsalakhu@cs.cmu.edu Policy Gradient I Used Materials Disclaimer: Much of the material and slides for this lecture
More information