使用视觉隐写和加密保护隐私的数据挖掘

Hare Ram Sah, G. Gunasekaran
{"title":"使用视觉隐写和加密保护隐私的数据挖掘","authors":"Hare Ram Sah, G. Gunasekaran","doi":"10.1109/ICCSE.2015.7250234","DOIUrl":null,"url":null,"abstract":"Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Privacy preserving data mining using visual steganography and encryption\",\"authors\":\"Hare Ram Sah, G. Gunasekaran\",\"doi\":\"10.1109/ICCSE.2015.7250234\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.\",\"PeriodicalId\":311451,\"journal\":{\"name\":\"2015 10th International Conference on Computer Science & Education (ICCSE)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference on Computer Science & Education (ICCSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSE.2015.7250234\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Computer Science & Education (ICCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSE.2015.7250234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

隐写术是在普通消息中隐藏秘密消息并在其目的地提取它的过程。视觉隐写是当今最安全的隐写形式之一,非常适合图像文件。本文的研究范围是结合隐写术和密码学的特性,使其难以检索秘密消息的图像。在这项工作中,将图像切片,存储切片后的图像,并在与搜索字符串查询匹配时,通过按规则方式合并单个随机排序的切片来检索原始图像。图像切片保证了隐私保护,基于线程的挖掘降低了搜索算法的时间复杂度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Privacy preserving data mining using visual steganography and encryption
Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信