Visible to the public Fingerprinting non-numeric datasets using row association and pattern generation

TitleFingerprinting non-numeric datasets using row association and pattern generation
Publication TypeConference Paper
Year of Publication2017
AuthorsAhmad, M., Shahid, A., Qadri, M. Y., Hussain, K., Qadri, N. N.
Conference Name2017 International Conference on Communication Technologies (ComTech)
Keywordsapplication environment, business purposes, composability, cryptography, Data analysis, Decoding, digital rights protection, Encryption, fake attributes, fake pattern, fake rows, fast internet, Fibonacci series, fingerprint detection algorithm, fingerprint identification, Fingerprint recognition, fingerprint sequence, Fingerprinting, fingerprinting nonnumeric datasets, Fingers, Internet, Metrics, Non-numeric datasets, nonnumeric digital data, original pattern, Outsourced Database Integrity, Ownership protection, ownership rights, pattern generation, Pattern generation and row association schemes, primary key, pubcrawl, relational data, relational databases, Resiliency, row association schemes, RSA encryption, Secret key, Watermarking
Abstract

Being an era of fast internet-based application environment, large volumes of relational data are being outsourced for business purposes. Therefore, ownership and digital rights protection has become one of the greatest challenges and among the most critical issues. This paper presents a novel fingerprinting technique to protect ownership rights of non-numeric digital data on basis of pattern generation and row association schemes. Firstly, fingerprint sequence is formulated by using secret key and buyer's Unique ID. With the chunks of these sequences and by applying the Fibonacci series, we select some rows. The selected rows are candidates of fingerprinting. The primary key of selected row is protected using RSA encryption; after which a pattern is designed by randomly choosing the values of different attributes of datasets. The encryption of primary key leads to develop an association between original and fake pattern; creating an ease in fingerprint detection. Fingerprint detection algorithm first finds the fake rows and then extracts the fingerprint sequence from the fake attributes, hence identifying the traitor. Some most important features of the proposed approach is to overcome major weaknesses such as error tolerance, integrity and accuracy in previously proposed fingerprinting techniques. The results show that technique is efficient and robust against several malicious attacks.

DOI10.1109/COMTECH.2017.8065765
Citation Keyahmad_fingerprinting_2017