• DocumentCode
    3136004
  • Title

    Effective Fingerprinting Codes for Database

  • Author

    Bui, Thach V. ; Nguyen, Binh Q. ; Nguyen, T.D. ; Sonehara, Noboru ; Echizen, Isao

  • Author_Institution
    Fac. of Inf. Technol., Univ. of Sci., Ho Chi Minh City, Vietnam
  • fYear
    2013
  • fDate
    2-5 Dec. 2013
  • Firstpage
    655
  • Lastpage
    659
  • Abstract
    Though customer databases are so important, they can be sold under 95/46/EC and Data Protection Act law. This is a potential business. However, this business are encountering a big problem that purchaser wants to illegally distribute his database. We call them attacker. Attacker can use many schemes such as attribute, collusion and complimentary attack to achieve his goal. We have improved the technique of Thach V. Bui et. al., in which fingerprints are embedded into columns by anonymizing specific columns so that it is effective against attribute and collusion attacks. We have also proved that d-disjunct matrices are effective fingerprinting codes.
  • Keywords
    data privacy; database management systems; matrix algebra; security of data; Data Protection Act law; EU 95/46/EC data protection directive; attribute attack; collusion attack; column anonymization; complimentary attack; customer database; d-disjunct matrices; fingerprint embedding; fingerprinting codes; illegal database distribution; Business; Databases; Decoding; Educational institutions; Fingerprint recognition; Testing; Vectors; Database Distribution; Fingerprinting Code; Group Testing; List Decoding;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Signal-Image Technology & Internet-Based Systems (SITIS), 2013 International Conference on
  • Conference_Location
    Kyoto
  • Type

    conf

  • DOI
    10.1109/SITIS.2013.107
  • Filename
    6727257