Repository logo

Digital fingerprinting for sharing of confidential data

dc.contributor.authorMucsi-Nagy, Agnes
dc.date.accessioned2013-11-07T18:13:36Z
dc.date.available2013-11-07T18:13:36Z
dc.date.created2006
dc.date.issued2006
dc.degree.levelMasters
dc.degree.nameM.C.S.
dc.description.abstractCurrently, there are three approaches to limit disclosure of databases containing confidential data: (1) altering data before disclosure; (2) learning results without revealing data; and (3) watermarking to prove ownership over a database. This thesis describes a symmetric fingerprinting scheme that can be considered as a fourth approach or a complement to the three existing approaches. The proposed scheme uses fingerprinting to identity the entity who received confidential data and consists of a fingerprint (mark uniquely identifying each recipient), encoder (fingerprint insertion algorithm), decoder (fingerprint extraction algorithm) and a detection algorithm (algorithm to detect fingerprint in data). The scheme distinguishes between trusted and distrusted recipients of data. Trusted recipients have a decoder to fully or partially restore data whereas distrusted recipients don't have a decoder. Scheme requirements including algorithm performance, and attacks including collusion attacks, are analyzed. Proof of concept results are also provided.
dc.format.extent122 p.
dc.identifier.citationSource: Masters Abstracts International, Volume: 45-02, page: 0922.
dc.identifier.urihttp://hdl.handle.net/10393/27275
dc.identifier.urihttp://dx.doi.org/10.20381/ruor-18623
dc.language.isoen
dc.publisherUniversity of Ottawa (Canada)
dc.subject.classificationComputer Science.
dc.titleDigital fingerprinting for sharing of confidential data
dc.typeThesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
MR18448.PDF
Size:
5.83 MB
Format:
Adobe Portable Document Format