Incremental algorithms for finding the convex hulls of circles and the lower envelopes of parabolas
Information Processing Letters
Robust audio watermarking using perceptual masking
Signal Processing
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Privacy Preserving Data Classification with Rotation Perturbation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data
ICDMW '06 Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A prsimonious model of mobile partitioned networks with clustering
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
CloudViews: communal data sharing in public clouds
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
T-drive: driving directions based on taxi trajectories
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Driving with knowledge from the physical world
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving SVM classification on vertically partitioned data
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Multiresolution watermarking for images and video
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
The emergence of cloud-based storage services is opening up new avenues in data exchange and data dissemination. This has amplified the interest in right-protection mechanisms for establishing ownership in case of data leakage. Current right-protection technologies, however, rarely provide strong guarantees on the dataset utility after the protection process. This work presents techniques that explicitly address this shortcoming and provably preserve the outcome of certain mining operations. In particular, we take special care to guarantee that the outcome of hierarchical clustering operations remains the same before and after right protection. We encode data ownership using watermarking principles. In the process, we derive fundamental bounds on the distortion incurred by the watermarking. We leverage our theoretical analysis to design fast algorithms for right protection without exhaustively searching the vast design space.