Privacy Preserving Collaborative Data Mining Using Steganography and Encryption

نویسنده

  • G. GUNASEKARAN
چکیده

Data collection is an essential step in data miningprocess. Collecting data of varying nature and still preserving privacy is essential for many applications. Privacy concerns maypreventdirect sharing of data andhow multipleparties collaboratively conduct data mining withoutbreaching data privacy presents a challenge.Cryptography involves converting a message text into anunreadable cipher and steganography embedsmessage into a cover media and hides its existence.Both these schemes are effectivelyimplemented in image files. In this paper an advanced system of encrypting datathat combines the features of cryptography and steganography along with privacy preservation is presented.A case study with medical image is also presented. The details of the person’s medical image along with clinical interpretation is encrypted, stegano and stored in the database. Key based retrieval technique is used to recover the hidden details. The advantage of this scheme is that the stegano can operate on encrypted texts also and hence offers a double layer data protection. Keyword: Privacy Preserving, Data mining,Steganography,Image Encryption

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Multiparty Product Protocol for Preserving the Privacy in Collaborative Data Mining

In the modern business world, collaborative data mining becomes especially important because of the mutual benefit it brings to the collaborators. During the collaboration, each party of the collaboration needs to share its data with other parties. If the parties don't care about their data privacy, the collaboration can be easily achieved. Privacy concerns parties, each having a private data s...

متن کامل

A review on Privacy Preservation and Collaborative Data Mining

Privacy preservation is major issue in current data transmission over internet and cloud network. For the integrity and security of data various methods are used such as cryptography, data transformation, Steganography, watermarking and many more method. In consequence of all these method some data mining technique is used. The data mining technique provide Varity of algorithm for privacy prese...

متن کامل

Privacy-Preserving Distributed Data Mining Techniques: A Survey

In various distributed data mining settings, leakage of the real data is not adequate because of privacy issues. To overcome this problem, numerous privacy-preserving distributed data mining practices have been suggested such as protect privacy of their data by perturbing it with a randomization algorithm and using cryptographic techniques. In this paper, we review and provide extensive survey ...

متن کامل

Privacy-Preserving Clustering Using Representatives over Arbitrarily Partitioned Data∗

The challenge in privacy-preserving data mining is avoiding the invasion of personal data privacy. Secure computation provides a solution to this problem. With the development of this technique, fully homomorphic encryption has been realized after decades of research; this encryption enables the computing and obtaining results via encrypted data without accessing any plaintext or private key in...

متن کامل

Privacy Preserving Data Mining Technique and Their Implementation

Privacy preservation in data mining has gained significant recognition because of the increased concerns to ensure privacy of sensitive information. It enables multiple parties to conduct collaborative data mining while preserving the privacy of their data. In this work, a cloud computing based protocol for privacypreserving distributed K-means clustering over horizontally partitioned data, sha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015