Privacy preserving data mining using visual steganography and encryption

Hare Ram Sah, G. Gunasekaran
{"title":"Privacy preserving data mining using visual steganography and encryption","authors":"Hare Ram Sah, G. Gunasekaran","doi":"10.1109/ICCSE.2015.7250234","DOIUrl":null,"url":null,"abstract":"Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Computer Science & Education (ICCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSE.2015.7250234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用视觉隐写和加密保护隐私的数据挖掘
隐写术是在普通消息中隐藏秘密消息并在其目的地提取它的过程。视觉隐写是当今最安全的隐写形式之一,非常适合图像文件。本文的研究范围是结合隐写术和密码学的特性,使其难以检索秘密消息的图像。在这项工作中,将图像切片,存储切片后的图像,并在与搜索字符串查询匹配时,通过按规则方式合并单个随机排序的切片来检索原始图像。图像切片保证了隐私保护,基于线程的挖掘降低了搜索算法的时间复杂度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Towards interpreting models to orchestrate IaaS multi-cloud infrastructures Learning through participation: Partnership in undergraduate curriculum design and assessment in Chinese higher education Discussion on heuristic teaching method for arithmetic unit design Application of spss software on mental health education for community residents The streaming media technology applying in the E-training of vocational education teacher
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1