Privacy preserving data mining using visual steganography and encryption

作者: Hare Ram Sah , G. Gunasekaran

DOI: 10.1109/ICCSE.2015.7250234

关键词:

摘要: Steganography is the process of hiding a secret message within an ordinary & extracting it at its destination. Visual steganography one most secure forms available today and highly suited for image files. The scope this paper to combine cryptography properties in such way make harder retrieve message. In work, sliced, sliced images are stored upon match with search string query original retrieved by merging individual randomly ordered slices regular manner. slicing ensures privacy preserving thread based mining reduces time complexity algorithm.

参考文章(12)
Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga, None, Hiding of User Presence for Privacy Preserving Data Mining international conference on advanced applied informatics. pp. 133- 138 ,(2012) , 10.1109/IIAI-AAI.2012.35
Benny Pinkas, Cryptographic techniques for privacy-preserving data mining Sigkdd Explorations. ,vol. 4, pp. 12- 19 ,(2002) , 10.1145/772862.772865
Majid Bashir Malik, M. Asger Ghazi, Rashid Ali, Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects international conference on computer and communication technology. pp. 26- 32 ,(2012) , 10.1109/ICCCT.2012.15
Shuang Wang, Xiaoqian Jiang, Lucila Ohno-Machado, Lijuan Cui, Samuel Cheng, SecUre Privacy-presERving Medical Image CompRessiOn (SUPERMICRO) ieee international conference on healthcare informatics, imaging and systems biology. pp. 130- 130 ,(2012) , 10.1109/HISB.2012.55
Rakesh Agrawal, Ramakrishnan Srikant, Privacy-preserving data mining international conference on management of data. ,vol. 29, pp. 439- 450 ,(2000) , 10.1145/335191.335438
Mehmet Ercan Nergiz, Maurizio Atzori, Chris Clifton, Hiding the presence of individuals from shared databases Proceedings of the 2007 ACM SIGMOD international conference on Management of data - SIGMOD '07. pp. 665- 676 ,(2007) , 10.1145/1247480.1247554
H. Xiong, M.N.S. Swamy, M.O. Ahmad, Optimizing the kernel in the empirical feature space IEEE Transactions on Neural Networks. ,vol. 16, pp. 460- 474 ,(2005) , 10.1109/TNN.2004.841784
Nello Cristianini, Jaz Kandola, Andre Elisseeff, John Shawe-Taylor, On Kernel-Target Alignment neural information processing systems. ,vol. 14, pp. 367- 373 ,(2001) , 10.1007/3-540-33486-6_8
B.C.M. Fung, Ke Wang, P.S. Yu, Top-down specialization for information and privacy preservation international conference on data engineering. pp. 205- 216 ,(2005) , 10.1109/ICDE.2005.143
Sumona Mukhopadhyay, Henry Leung, Multi Image Encryption and Steganography Based on Synchronization of Chaotic Lasers systems, man and cybernetics. pp. 4403- 4408 ,(2013) , 10.1109/SMC.2013.751