Compression in Privacy preserving Data Mining

Authors

  • Kumari DA Department of Electronics and Computer Engineering, Associate professor, CSI Life Member K.L.University, Vaddeswaram, Guntur
  • Rao K.R. Department of Computer Science and Engineering , Professor, K.L. University, Vaddeswaram, Guntur
  • Suman M Department of Electronics and Computer Engineering, Associate Professor, CSI Life Member K.L. University, Vaddeswaram, Guntur
  • Maddu T Department of Electronics and Computer Engineering, Associate Professor, CSI Life Member K.L. University, Vaddeswaram, Guntur

Keywords:

Vector quantization, code book generation, privacy preserving data mining, k-means clustering.

Abstract

Large Volumes of detailed personal data is regularly collected and analyzed by applications using data mining, Sharing of these data is beneficial to the application users. On one hand it is an important asset to business organizations and governments for decision making at the same time analysing such data opens treats to privacy if not done properly. This paper aims to reveal the information by protecting sensitive data. We are using Vector quantization technique based on LBG Design algorithm for preserving privacy with the help of Codebook. Quantization will be performed on training data samples it will produce transformed data set. This transformed data set does not reveal the original data. Hence privacy is preserved.

References

] D.Aruna Kumari , Dr.K.Rajasekhar rao, M.suman “ Privacy preserving distributed data mining using steganography “In Procc. Of CNSA-2010, Springer Libyary.

T.Anuradha, suman M,Aruna Kumari D “Data obscuration in privacy preserving data mining in Procc International conference on web sciences ICWS 2009.

Agrawal, R. & Srikant, R. (2000). Privacy Preserving Data Mining. In Proc. of ACM SIGMOD Conference on Management of Data (SIGMOD’00), Dallas, TX.

Alexandre Evfimievski, Tyrone Grandison Privacy Preserving Data Mining. IBM Almaden Research Center 650 Harry Road, San Jose, California 95120, USA

Agarwal Charu C., Yu Philip S., Privacy Preserving Data Mining: Models and Algorithms, New York, Springer, 2008.

Oliveira S.R.M, Zaiane Osmar R., A Privacy-Preserving Clustering Approach Toward Secure and Effective Data Analysis for Business Collaboration, In Proceedings of the International Workshop on Privacy and Security Aspects of Data Mining in conjunction with ICDM 2004, Brighton, UK, November 2004.

Wang Qiang , Megalooikonomou, Vasileios, A dimensionality reduction technique for efficient time series similarity analysis, Inf. Syst. 33, 1 (Mar.2008), 115- 132.

UCI Repository of machine learning databases, University of California, Irvine.http://archive.ics.uci.edu/ml/

Wikipedia. Data mining. http://en.wikipedia.org/wiki/Data_mining

Kurt Thearling, Information about data mining and analytic technologies http://www.thearling.com/

Flavius L. Gorgônio and José Alfredo F. Costa “Privacy-Preserving Clustering on Distributed Databases: A Review and Some Contributions

D.Aruna Kumari, Dr.K.rajasekhar rao,M.Suman “Privacy preserving distributed data mining: a new approach for detecting network traffic using steganography” in international journal of systems and technology(IJST) june 2011.

Binit kumar Sinha “Privacy preserving clustering in data mining”.

C. W. Tsai, C. Y. Lee, M. C. Chiang, and C. S. Yang, A Fast VQ Codebook Generation Algorithm via Pattern Reduction, Pattern Recognition Letters, vol. 30, pp. 653{660, 2009}

K.Somasundaram, S.Vimala, “A Novel Codebook Initialization Technique for Generalized Lloyd Algorithm using Cluster Density”, International Journal on Computer Science and Engineering, Vol. 2, No. 5, pp. 1807-1809, 2010.

K.Somasundaram, S.Vimala, “Codebook Generation for Vector Quantization with Edge Features”, CiiT International Journal of Digital Image Processing, Vol. 2, No.7, pp. 194-198, 2010.

Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino State-of-the-art in Privacy Preserving Data Mining in SIGMOD Record, Vol. 33, No. 1, March 2004.

Maloji Suman,Habibulla Khan,M. Madhavi Latha,D. Aruna Kumari “Speech Enhancement and Recognition of Compressed Speech Signal in Noisy Reverberant Conditions “ Springer -Advances in Intelligent and Soft Computing (AISC) Volume 132, 2012, pp 379-386

M.Suman, K.B.N.Prasanna Kumar, K.Kavindra Kumar, G. Phrudhi Teja“ A new approach on Compression of Speech Signals using MSVQ and its Enhancement Using Spectral Subtraction under Noise free and Noisy Environment” in Advances in Digital Multimedia ,Vol. 1, No. 1, March 2012,World Science Publisher, United States

M. Suman, Habibulla khan, M. Madhavi Latha, D. Aruna kumari “Dimensions of performance in compressed speech signals and its enhancement”, International journal of engineering sciences research(IJESR).

M.Suman, K.B.N.P.Kumar, G.P.Teja,T.V.Bhargava, ‘Speech enhancement and recognition of compressed speech signal in noisy reverberant conditions’, International research journal for signal processing.(IRJSP)

M.Suman, M.satya sai ram, Dr. habibulla khan “Compression of Speech signals : LBG Algorithm “in Third international conference on SEEC 2010, cochin kerala

M.Madhavi Latha, M.Satya Sai Ram and P.Siddaiah . Multi Switched Split Vector Quantizer, International journal of Computer, Information and systems science and engineering, Vol 2 No: 1

M.Madhavi Latha, M.Satya Sai Ram and P.SiddaiahMulti Switched Split Vector Quantization, Proceedings of World Academy of Science, Engineering and Technology Volume 27 Feb 2008 ISSN 1307-6884.

Downloads

Published

2024-02-26

How to Cite

Kumari, D., Rao, K., Suman, M., & Maddu, T. (2024). Compression in Privacy preserving Data Mining. COMPUSOFT: An International Journal of Advanced Computer Technology, 2(04), 83–88. Retrieved from https://ijact.in/index.php/j/article/view/17

Issue

Section

Original Research Article

Similar Articles

<< < 27 28 29 30 31 32 33 > >> 

You may also start an advanced similarity search for this article.