{"title":"使用视觉隐写和加密保护隐私的数据挖掘","authors":"Hare Ram Sah, G. Gunasekaran","doi":"10.1109/ICCSE.2015.7250234","DOIUrl":null,"url":null,"abstract":"Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Privacy preserving data mining using visual steganography and encryption\",\"authors\":\"Hare Ram Sah, G. Gunasekaran\",\"doi\":\"10.1109/ICCSE.2015.7250234\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.\",\"PeriodicalId\":311451,\"journal\":{\"name\":\"2015 10th International Conference on Computer Science & Education (ICCSE)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference on Computer Science & Education (ICCSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSE.2015.7250234\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Computer Science & Education (ICCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSE.2015.7250234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy preserving data mining using visual steganography and encryption
Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.