Instance-Based Learning Algorithms
Machine Learning
Artificial Intelligence Review - Special issue on lazy learning
Robust audio watermarking using perceptual masking
Signal Processing
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Cryptographic techniques for privacy-preserving data mining
ACM SIGKDD Explorations Newsletter
On the need for time series data mining benchmarks: a survey and empirical demonstration
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Reversible watermarking of 2D-vector data
Proceedings of the 2004 workshop on Multimedia and security
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Privacy Preserving Data Classification with Rotation Perturbation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Robust blind watermarking mechanism for motion data streams
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Information-theoretic analysis of watermarking
ICASSP '00 Proceedings of the Acoustics, Speech, and Signal Processing, 2000. on IEEE International Conference - Volume 06
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data
ICDMW '06 Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
The boundary between privacy and utility in data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Ownership protection of shape datasets with geodesic distance preservation
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Efficient online top-K retrieval with arbitrary similarity measures
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
A robust spectral approach for blind watermarking of manifold surfaces
Proceedings of the 10th ACM workshop on Multimedia and security
Psycho-acoustic model-based message authentication coding for audio data
Proceedings of the 10th ACM workshop on Multimedia and security
Tamper proofing mechanisms for motion capture data
Proceedings of the 10th ACM workshop on Multimedia and security
Watermarking Polygonal Lines Using Fourier Descriptors
IEEE Computer Graphics and Applications
Achievable Performance of Digital Watermarking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Rights Protection of Trajectory Datasets
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
Privacy-Preserving SVM classification on vertically partitioned data
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Watermarking spatial trajectory database
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
Robust optimum detection of transform domain multiplicative watermarks
IEEE Transactions on Signal Processing
Secure knowledge management: confidentiality, trust, and privacy
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Multiresolution watermarking for images and video
IEEE Transactions on Circuits and Systems for Video Technology
Right-protected data publishing with hierarchical clustering preservation
Proceedings of the 21st ACM international conference on Information and knowledge management
Hi-index | 0.00 |
Companies frequently outsource datasets to mining firms, and academic institutions create repositories or share datasets in the interest of promoting research collaboration. Still, many practitioners have reservations about sharing or outsourcing datasets, primarily because of fear of losing the principal rights over the dataset. This work presents a way of convincingly claiming ownership rights over a trajectory dataset, without, at the same time, destroying the salient dataset characteristics, which are important for accurate search operations and data-mining tasks. The digital watermarking methodology that we present distorts imperceptibly a collection of sequences, effectively embedding a secret key, while retaining as well as possible the neighborhood of each object, which is vital for operations such as similarity search, classification, or clustering. A key contribution in this methodology is a technique for discovering the maximum distortion that still maintains such desirable properties. We demonstrate both analytically and empirically that the proposed dataset marking techniques can withstand a number of attacks (such a translation, rotation, noise addition, etc) and therefore can provide a robust framework for facilitating the secure dissemination of trajectory datasets.