Professional Documents
Culture Documents
Ownership Protection of Shape Datasets With Distance Based Preservation
Ownership Protection of Shape Datasets With Distance Based Preservation
40 www.erpublication.org
Ownership Protection of Shape datasets with Distance Based Preservation
41 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-3, Issue-6, June 2015
V. PROPOSED ALGORITHM VI. MODULE DESCRIPTION
then edge (u, v) does not violate the MST at edge e after D. Analyzing distance and alteration due to
the watermark embedding, for all watermarks W W (D) watermarking
and embedding powers p [pmin , pmax ]. In this module, we are going to analyze calculation of
distortion of object distances due to watermarking. We has
The proof is similar to the proof of Corollary 1 and provided closed-form expressions for the Euclidean distance
is therefore omitted. Algorithm 4 uses Corollary 2 to prune between two objects before and after the watermark
the search space of the naive MST-Preservation algorithm. embedding. Then, we derive tight lower and upper bounds on
the distortion of distances due to watermarking, which hold
1: INPUTS: D, W W(D), pmin, pmax, uniformly for any watermark compatible with the given
2: OUTPUT: p dataset. Our analysis gives crisp insight about the effect of
3: T (|D|, E) = find Euclidean MST of D (using Kruskals watermarking on object distances and forms the basis for the
algorithm) fast algorithms for NN and MST preservation proposed
4: for all e E do scheme.
5: feasible_powers (e) = [pmin, pmax]
6: for all u Ue do E. Performance Evaluation
7: for all v Ve do In this module we are going to perform data owner
8: feasible_powers(x) = solve D 2 (e) D 2 (u, v) | right-protection scheme based on additive watermarking
feasible_powers(x) preserving the NN structure. The Present work presents a
9: end if multiplicative watermarking framework; therefore the
10: end for algorithm analysis is quite different. More importantly, here
11: end for we examine fundamental properties of distance distortion due
12: end for to multiplicative watermarking. The current work represents
13: p = max {p: {e: p / feasible_powers (e)} (|D| an extended version we augment the original publication by
1)} presenting a comprehensive theoretical analysis of the
distance distortion.
42 www.erpublication.org
Ownership Protection of Shape datasets with Distance Based Preservation
VII. CONCLUSION
Kalaiselvi.N undergoing her Master of Computer Science and
Engineering in Meenakshi Ramaswamy Engineering College, Thathanur,
Watermarking techniques have been used to right protect Tamil Nadu,India.
databases. There is also relevant work on watermarking for Meenatchi.A received B.E., computer science and engineering degree
from Arasu engineering College, Kumbakonam in 2012.Now currently
streaming time series. They examine watermarking on a pursuing doing undergoing her Master of Computer Science and
single numerical sequence, as opposed considering a Engineering in Meenakshi Ramaswamy Engineering College, Thathanur,
collection of sequences and aiming at maintaining the original Tamil Nadu, India.
pair wise relationships. Also they do not consider resilience to Priyadharsini.T obtained her M.E., M.B.A., degree from various
recognized universities. She is currently working as a associate professor in
geometric data transformations. Our setting poses additional Meenakshi Ramaswamy Engineering College, Thathanur, Tamil Nadu,
challenges compared to traditional watermarking or India.
privacy-preservation techniques. Not only do we work on the Ponnudurai.N obtained his M.E., degree from various recognized
perturbed data, but more importantly, we provide guarantees universities. He is currently working as a associate professor in Meenakshi
on preservation of distance properties. Although the focus in Ramaswamy Engineering College, Thathanur, Tamil Nadu, India.
this work is on preservation of the NN and the MST, our
formulation is applicable on any mining operation that
depends on the order of distances between objects. This
makes our approach relevant for a wide range of
distance-based learning, search, and mining algorithms. A
right-protection scheme based on additive watermarking
preserving the NN structure was presented by the present
work presents a multiplicative watermarking framework
therefore the algorithm analysis is quite different. More
importantly, here we examine fundamental properties of
distance distortion due to multiplicative watermarking. The
current work represents an extended version of we augment
the original publication by resenting a comprehensive
theoretical analysis of the distance distortion. We leverage
this analysis to provide fast versions of the exhaustive
algorithms presented previously.
REFERENCES
43 www.erpublication.org