Reconstruction-based Classification Rule Hiding through Controlled Data Modification
نویسندگان
چکیده
In this paper, we propose a reconstruction–based approach to classification rule hiding in categorical datasets. The proposed methodology modifies transactions supporting both sensitive and nonsensitive classification rules in the original dataset and then uses the supporting transactions of the nonsensitive rules to produce its sanitized counterpart. To further investigate some interesting properties of this methodology, we explore three variations of the main technique which differ in the way they select and sanitize transactions supporting sensitive rules. Finally, through extensive experimental evaluation, we demonstrate the effectiveness of the proposed algorithms towards effectively shielding the sensitive knowledge.
منابع مشابه
Reconstruction-Based Association Rule Hiding
As large repositories of data contain confidential rules that must be protected before published, association rule hiding becomes one of important privacy preserving data mining problems. Compared with traditional data modification methods, data reconstruction is a new promising, but not sufficiently investigated method, which is inspired by the inverse frequent set mining problem. In my PhD pe...
متن کاملData sanitization in association rule mining based on impact factor
Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that counterparts cannot discover the sensitive patterns and so data confidentiality is preserved ag...
متن کاملLossless data hiding based on histogram modification
Lossless data hiding is the technique of embedding data in an image and retrieval of the data with lossless reconstruction of original image. In this paper, we present a novel lossless data hiding scheme based on histogram modification. This technique is based on differences of adjacent pixels for embedding data and has more hiding capacity compared to existing methods. The number of message bi...
متن کاملIntroducing an algorithm for use to hide sensitive association rules through perturb technique
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...
متن کاملData Hiding Based on Spatial Domain Concept(R, G, B Planes & Gray images)
Data hiding is the technique of embedding data in an image and retrieval of the data with lossless reconstruction of original im age. In this paper, we present data hiding scheme based on histogram modification.This technique is based on differences of adjacent pixels for embedding data and has more hiding capacity compared to existing methods.We exploit a binary tree structure to solve the pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009