Privacy Preserving Through Fireworks Algorithm Based Model for Image Perturbation in Big Data

Privacy Preserving Through Fireworks Algorithm Based Model for Image Perturbation in Big Data

Amine Rahmani, Abdelmalek Amine, Reda Mohamed Hamou, Mohamed Elhadi Rahmani, Hadj Ahmed Bouarara
Copyright: © 2015 |Pages: 18
DOI: 10.4018/IJSIR.2015070103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Nowadays, Social networks and cloud services contain billions of users over the planet. Instagram, Facebook and other networks give the opportunity to share images. Users upload millions of pictures each day, including personal images. Another domain, which concerns medical studies, requires a highly sensitive medical images that retain personal details close to patients. Image perturbation have attracted a great deal of attention in the last few years. Many works concerning image ciphering and perturbing have been published. This paper deals with the problem of image perturbation for privacy preserving. The authors build three new systems that consist of hiding small details in pictures by rotating some pixels. Their models use two algorithms: the first one involves a simulation of the firework algorithm in which they place fireworks on selected pixels then represents sparks as rotation processes. The second system consists of a model of rotation based perturbation using iterated local search algorithm (ILS) with 2 optimization stages. Meanwhile, the third one consists of using the same principle of the previous system except by using the ILS algorithm with 3 optimization stages.
Article Preview
Top

Introduction

With the emersion of new applications centred on the sharing of image data over large data services such as medical imagery and social nets. Privacy concerns have become a crucial problem in the modern information sciences, particularly with the high growth of data mining and analytical techniques. Data perturbation and de-identification are two main fields in the privacy preserving research area. Unlike the cryptographic systems, which propose a temporary change in the data without holding in consideration the utility of ciphered data, the perturbation techniques consist of minimizing the disruption between the extremities of the major paradox, which hides sensitive data by altering its content while maintaining its utility. At the age of big data, data perturbation, inherited from secure database techniques, becomes an important issue in data protection. It often uses different techniques. We distinguish two different types of data perturbation: differential privacy in which the differential computations are often used such as chaotic mapping (Tong, 2009), and privacy preserving data mining in which a data mining technique is used (Ag???). However, data perturbation is facing growing concerns. The researchers are attempting to prepare and adapt data mining techniques to be useful for privacy matters.

In most engineering disciplines, many problems can be simplified as numerical optimization problems through mathematical modelling. Nowadays, studying such biological phenomenon is no longer concerned only by biologists. All of this gave birth to a new domain of research known by bio-inspired or meta-heuristics methods for optimization. Optimization algorithms and techniques are a set of meta-heuristics known by their efficiency in solving difficult problems. Those algorithms are generally probabilistic and stochastic processes that are inspired from life and nature. One special algorithm which has seen the light recently is known as firework algorithm (FWA). Since its development in 2010 by Tan and Zhu in (Tan, 2010), FWA has been used in many problems and it has proved a high efficiency in finding optimal solutions. This paper presents a suggestion of a new usefulness of FWA algorithm, not on optimization problem but on securing aspect. We work out a model of rotation based perturbation that consists of hiding sensitive information over image data using fireworks explosions.

The remainder of this report is organised as follows: first we introduce some general concepts that are employed in our theoretical account; then we introduce the universal framework of this attack; after that, we describe our experiments and discuss its results in term of efficiency by comparing it with results of some known conventional works; finally, we end with conclusions and perspectives.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 3 Issues (2023)
Volume 13: 4 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing