Filters








12,226 Hits in 7.6 sec

Protecting Data Privacy Through Hard-to-Reverse Negative Databases [chapter]

Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest
2006 Lecture Notes in Computer Science  
Finally, we present a method for creating negative databases that are hard to reverse in practice, i.e., from which it is hard to obtain DB, by adapting a technique for generating 3-SAT formulas.  ...  The paper extends the idea of negative representations of information for enhancing privacy. Simply put, a set DB of data elements can be represented in terms of its complement set.  ...  [19, 20, 16] ) and present a novel scheme that creates negative databases that are indeed hard to reverse.  ... 
doi:10.1007/11836810_6 fatcat:zgkook6xjbcwpegvgvz3h7jzam

Protecting data privacy through hard-to-reverse negative databases

Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest
2007 International Journal of Information Security  
Finally, we present a method for creating negative databases that are hard to reverse in practice, i.e., from which it is hard to obtain DB, by adapting a technique for generating 3-SAT formulas.  ...  The paper extends the idea of negative representations of information for enhancing privacy. Simply put, a set DB of data elements can be represented in terms of its complement set.  ...  [19, 20, 16] ) and present a novel scheme that creates negative databases that are indeed hard to reverse.  ... 
doi:10.1007/s10207-007-0030-1 fatcat:2skis4winzemzcjz44neeytrx4

Real-Valued Negative Databases

Dongdong Zhao, Wenjian Luo
2013 Advances in Artificial Life, ECAL 2013  
Therefore, the real-valued negative database is proposed in this paper, and reversing the real-valued negative database is proved to be an NP-hard problem.  ...  The negative database (NDB) is the negative representation of original data. Existing work has demonstrated that NDB can be used to preserve privacy and hide information.  ...  Reversing the real-valued negative database is proved to be an NP-hard problem, and it follows that the real-valued negative database could be employed to protect data privacy.  ... 
doi:10.7551/978-0-262-31709-2-ch131 dblp:conf/ecal/ZhaoL13 fatcat:tegyhd4xybfe3fgrs3tgota2nu

Security Evaluation of Negative Iris Recognition

Osama OUDA, Slim CHAOUI, Norimichi TSUMURA
2020 IEICE transactions on information and systems  
Negative iris recognition is an interesting iris template protection scheme based on the concept of negative databases.  ...  Biometric template protection techniques have been proposed to address security and privacy issues inherent to biometric-based authentication systems.  ...  Negative Iris Recognition The negative iris recognition scheme is based on the concept of negative database which was firstly proposed by Esponda et al. [36] to protect data privacy.  ... 
doi:10.1587/transinf.2019edp7276 fatcat:j52dfcpwhjdyld23p67osgoalq

Strong Authentication using Encrypted Negative Password

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
to the guest by IoT.  ...  He can even send the One-time password to the guest mobile to enter into the house. The owner can view the one that is before of the door using the camera.  ...  Protection of Data Privacy based on Hard -to-Reverse Negative Databases A set of data components are typically depicted in the method of complement set containing the negative information.  ... 
doi:10.35940/ijitee.f4123.049620 fatcat:uzibq66d6bfrpipd6m7vz2fb4e

Statistical Disclosure Limitation for Data Access [chapter]

Stephen E. Fienberg, Jiashun Jin
2016 Encyclopedia of Database Systems  
Synonyms Confidentiality protection; Multiplicity; Privacy protection; Restricted data; Risk-utility tradeoff Definition Statistical Disclosure Limitation refers to the broad array of methods used to protect  ...  confidentiality of statistical data, i.e., fulfilling an obligation to data providers or respondents not to transmit their information to an unauthorized party.  ...  Similarly, Data Perturbation Individually Identifiable Data Inference Control in Statistical Databases Matrix Masking Privacy Privacy-Preserving Data Mining Randomization Methods to Ensure Data Privacy  ... 
doi:10.1007/978-1-4899-7993-3_1046-2 fatcat:j5zpgigplffdtnplbqfypuhd44

A trustworthy database for privacy-preserving video surveillance

Antoni Martínez-Ballesté, Hatem A. Rashwan, Jordi Castellà-Roca, Domènec Puig
2013 Proceedings of the Joint EDBT/ICDT 2013 Workshops on - EDBT '13  
This paper defines a new methodology for trustworthy video surveillance databases, which fulfills four crucial properties: high accuracy, reversibility, real-time performance and information security.  ...  The proposed protection guarantees the property of reversibility, since the original coefficients can be restored.  ...  or fails to detect them, the processes may need to be supervised by humans, leading to a lack of privacy); (ii) Reversibility of the protection method (if it was not reversible, monitoring should be performed  ... 
doi:10.1145/2457317.2457347 dblp:conf/edbt/Martinez-BallesteRCP13 fatcat:4srojdvcnjdollyu764qfmwspu

Multi-privacy biometric protection scheme using ensemble systems

Marcelo Damasceno, A.M.P Canuto, Norman Poh
2015 2015 International Joint Conference on Neural Networks (IJCNN)  
To this end, we consider two strategies to improving biometric template protection and performance, namely, (1) using multiple privacy schemes and (2) using multiple matching algorithms.  ...  The above two strategies lead to a novel, ensemble system that is derived from multiple privacy schemes.  ...  across databases; (2) Revocability: it should be easy to revoke a compromised template; (3) Security: it must be computationally hard to obtain the original biometric template from the secure template  ... 
doi:10.1109/ijcnn.2015.7280657 dblp:conf/ijcnn/DamascenoCP15 fatcat:rqt7ydx4tjetve2pgbtwbszica

Surveillance Privacy Protection [chapter]

Nikki Gulzar, Basra Abbasi, Eddie Wu, Anil Ozbal, WeiQi Yan
2013 Intelligent Multimedia Surveillance  
In addition, this chapter also emphasizes the importance of tools, data sets and databases that are being developed to enable surveillance privacy.  ...  Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today.  ...  Data Privacy Day is about empowering people to protect their privacy and control their digital footprints to ensure the protection of data privacy [4] .  ... 
doi:10.1007/978-3-642-41512-8_5 fatcat:3fz4bftl35gp3gynsmy6mvirl4

Teaching android security through examples

Daniel E. Krutz, Samuel A. Malachowsky
2016 ACM inroads  
Intercepted unencrypted Broadcasts could lead to serious security and privacy issues. • Data Storage (Medium).  ...  This activity demonstrates the negative implications of using JavaScript in Webview to pass data from an Android app to a server.  ... 
doi:10.1145/2994152 fatcat:clwkatmn6zaehabvxuzukg5s54

Protecting and Managing Privacy Information in Video Surveillance Systems [chapter]

S.-C.S. Cheung, M.V. Venkatesh, J.K. Paruchuri, J. Zhao, T. Nguyen
2009 Protecting Privacy in Video Surveillance  
We describe a prototype system for privacy-protected video surveillance that advances the state-of-the-art in three different areas: First, after identifying the individuals whose privacy needs to be protected  ...  , a fast and effective video inpainting algorithm is applied to erase individuals' images as a means of privacy protection.  ...  An Adaboost classifier is used to identify the specific color of a hard hat. The face associated with the hat is subsequently blocked for privacy protection.  ... 
doi:10.1007/978-1-84882-301-3_2 fatcat:sa3p7mve5bflbdwenvrrfoofvq

Negative representations of information

Fernando Esponda, Stephanie Forrest, Paul Helman
2009 International Journal of Information Security  
I would like to thank my Dad, Mom and Sister; Mom, Dad and Sister; Sister, Mom and Dad; Mom, Sister and Dad; Dad, Sister and Mom; Sister, Dad and Mom in no particular order and with all my heart.  ...  that is hard to reverse.  ...  Further, given that N P-hardness is a worst case analysis, this property alone is usually not sufficient for a negative database to be hard to reverse in practice.  ... 
doi:10.1007/s10207-009-0078-1 fatcat:yg4ss2ul7rbvdewypzrxmvpcni

A Perspective on the Challenges and Opportunities for Privacy-Aware Big Transportation Data

Godwin Badu-Marfo, Bilal Farooq, Zachary Patterson
2019 Journal of Big Data Analytics in Transportation  
While researchers in both academia and industry are making advances in using this data to transportation system ends (e.g. information inference from collected data), little attention has been paid to  ...  four larger scale challenges that will need to be overcome if the potential for Big Transportation Data is to be harnessed for transportation decision-making purposes.  ...  The writing of data to storage involves the reverse process, i.e., from active memory to final storage. File Systems On hard drives, data are stored hierarchically.  ... 
doi:10.1007/s42421-019-00001-z fatcat:hk7cw5txrzcqzbnfwupvwwurku

Enhanced Database Security using Genetic Algorithm

Mrs.K. Pushpalatha
2019 International Journal for Research in Applied Science and Engineering Technology  
Hence it is very essential to protect the database from various security attacks like insertion, deletion or alteration of data.  ...  Over these years, many encryption techniques have been proposed to protect the database from unauthorized database.  ...  , Negative Database conversion which is applied to actual data.  ... 
doi:10.22214/ijraset.2019.4008 fatcat:uc6pyhqjrjbtzlxarjr6pbhb2q

Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12 [article]

Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, Xiaofeng Wang
2017 arXiv   pre-print
Such choice and the overall approach to privacy budget use and management are key questions for understanding the privacy protections provided by any deployment of differential privacy.  ...  In June 2016, Apple announced that it will deploy differential privacy for some user data collection in order to ensure privacy of user data, even from Apple.  ...  In particular, our experiments of setting the privacy budget balance to zero or a negative number in the database or entering thousands of emoji within a short period of time did not trigger opt-out. •  ... 
arXiv:1709.02753v2 fatcat:2326ayoeobhkfmz4znoz7znaoa
« Previous Showing results 1 — 15 out of 12,226 results