%0 Conference Proceedings %T An Evaluation on Robustness and Utility of Fingerprinting Schemes %+ SBA Research %A Šarčević, Tanja %A Mayer, Rudolf %< avec comité de lecture %( Lecture Notes in Computer Science %B 3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE) %C Canterbury, United Kingdom %Y Andreas Holzinger %Y Peter Kieseberg %Y A Min Tjoa %Y Edgar Weippl %I Springer International Publishing %3 Machine Learning and Knowledge Extraction %V LNCS-11713 %P 209-228 %8 2019-08-26 %D 2019 %R 10.1007/978-3-030-29726-8_14 %K Fingerprinting %K Relational databases %K Data utility %Z Computer Science [cs]Conference papers %X Fingerprinting of data is a method to embed a traceable marker into the data to identify which specific recipient a certain copy of the data set has been released to. This is crucial for releasing data sets to third parties, especially if the release involves a fee, or if the data contains sensitive information due to which further sharing and potential subsequent leaks should be discouraged and deterred from. Fingerprints generally involve distorting the data set to a certain degree, in a trade off to preserve the utility of the data versus the robustness and traceability of the fingerprint. In this paper, we will thus compare several approaches for fingerprinting for their robustness against various types of attacks, such as subset or collusion attacks. We further evaluate the effects the fingerprinting has on the utility of the datasets, specifically for Machine Learning tasks. %G English %Z TC 5 %Z TC 12 %Z WG 8.4 %Z WG 8.9 %Z WG 12.9 %2 https://inria.hal.science/hal-02520057/document %2 https://inria.hal.science/hal-02520057/file/485369_1_En_14_Chapter.pdf %L hal-02520057 %U https://inria.hal.science/hal-02520057 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-WG %~ IFIP-TC12 %~ IFIP-WG8-4 %~ IFIP-WG8-9 %~ IFIP-CD-MAKE %~ IFIP-WG12-9 %~ IFIP-LNCS-11713