TY - GEN
T1 - Blind Watermarking Method for Anonymized Data
AU - Ohno, Yuta
AU - Iwai, Tomomu
AU - Nishi, Hiroaki
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/7/2
Y1 - 2017/7/2
N2 - The secondary use of data in consideration of individual privacy has been gaining attention. Data anonymization needs to be applied to enable both secondary use and privacy protection. In distributing anonymized data, there is a concern that data users might re-distribute the data to a third party without permission. To tackle this issue, a watermarking technique that correlates data users (IDs) with anonymized data has been studied. In existing studies, a non-blind detection method has been employed to obtain the IDs; however, the problem is the use of original data in the detection, which deteriorates the applicability. In this paper, a watermarking technique in combination with a blind detection method is proposed. We evaluate and compare the proposed watermarking method with an existing non-blind method in terms of information loss, tolerance against attacks, and the processing time of watermarking and detection.
AB - The secondary use of data in consideration of individual privacy has been gaining attention. Data anonymization needs to be applied to enable both secondary use and privacy protection. In distributing anonymized data, there is a concern that data users might re-distribute the data to a third party without permission. To tackle this issue, a watermarking technique that correlates data users (IDs) with anonymized data has been studied. In existing studies, a non-blind detection method has been employed to obtain the IDs; however, the problem is the use of original data in the detection, which deteriorates the applicability. In this paper, a watermarking technique in combination with a blind detection method is proposed. We evaluate and compare the proposed watermarking method with an existing non-blind method in terms of information loss, tolerance against attacks, and the processing time of watermarking and detection.
KW - anonymization
KW - blind detection
KW - secondary use
KW - watermarking
UR - http://www.scopus.com/inward/record.url?scp=85050352204&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85050352204&partnerID=8YFLogxK
U2 - 10.1109/CANDAR.2017.97
DO - 10.1109/CANDAR.2017.97
M3 - Conference contribution
AN - SCOPUS:85050352204
T3 - Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017
SP - 139
EP - 145
BT - Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 5th International Symposium on Computing and Networking, CANDAR 2017
Y2 - 19 November 2017 through 22 November 2017
ER -