Digital fingerprinting for sharing of confidential data
| dc.contributor.author | Mucsi-Nagy, Agnes | |
| dc.date.accessioned | 2013-11-07T18:13:36Z | |
| dc.date.available | 2013-11-07T18:13:36Z | |
| dc.date.created | 2006 | |
| dc.date.issued | 2006 | |
| dc.degree.level | Masters | |
| dc.degree.name | M.C.S. | |
| dc.description.abstract | Currently, there are three approaches to limit disclosure of databases containing confidential data: (1) altering data before disclosure; (2) learning results without revealing data; and (3) watermarking to prove ownership over a database. This thesis describes a symmetric fingerprinting scheme that can be considered as a fourth approach or a complement to the three existing approaches. The proposed scheme uses fingerprinting to identity the entity who received confidential data and consists of a fingerprint (mark uniquely identifying each recipient), encoder (fingerprint insertion algorithm), decoder (fingerprint extraction algorithm) and a detection algorithm (algorithm to detect fingerprint in data). The scheme distinguishes between trusted and distrusted recipients of data. Trusted recipients have a decoder to fully or partially restore data whereas distrusted recipients don't have a decoder. Scheme requirements including algorithm performance, and attacks including collusion attacks, are analyzed. Proof of concept results are also provided. | |
| dc.format.extent | 122 p. | |
| dc.identifier.citation | Source: Masters Abstracts International, Volume: 45-02, page: 0922. | |
| dc.identifier.uri | http://hdl.handle.net/10393/27275 | |
| dc.identifier.uri | http://dx.doi.org/10.20381/ruor-18623 | |
| dc.language.iso | en | |
| dc.publisher | University of Ottawa (Canada) | |
| dc.subject.classification | Computer Science. | |
| dc.title | Digital fingerprinting for sharing of confidential data | |
| dc.type | Thesis |
Files
Original bundle
1 - 1 of 1
