Privacy Preserving Through Fireworks Algorithm Based Model for Image Perturbation in Big Data

Nowadays, Social networks and cloud services contain billions of users over the planet. Instagram, Facebook and other networks give the opportunity to share images. Users upload millions of pictures each day, including personal images. Another domain, which concerns medical studies, requires a highly sensitive medical images that retain personal details close to patients. Image perturbation have attracted a great deal of attention in the last few years. Many works concerning image ciphering and perturbing have been published. This paper deals with the problem of image perturbation for privacy preserving. The authors build three new systems that consist of hiding small details in pictures by rotating some pixels. Their models use two algorithms: the first one involves a simulation of the firework algorithm in which they place fireworks on selected pixels then represents sparks as rotation processes. The second system consists of a model of rotation based perturbation using iterated local search algorithm ILS with 2 optimization stages. Meanwhile, the third one consists of using the same principle of the previous system except by using the ILS algorithm with 3 optimization stages.

[1]  Neha Gupta,et al.  Preserving Privacy Using Data Perturbation in Data Stream , 2013 .

[2]  Tamir Tassa,et al.  Identity obfuscation in graphs through the information theoretic lens , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[3]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[4]  Kato Mivule,et al.  Utilizing Noise Addition for Data Privacy, an Overview , 2013, ArXiv.

[5]  Li Liu,et al.  The applicability of the perturbation based privacy preserving data mining for real-world data , 2008, Data Knowl. Eng..

[6]  Yadong Wang,et al.  A Privacy-Preserving Classification Method Based on Singular Value Decomposition , 2012, Int. Arab J. Inf. Technol..

[7]  Mohammad Reza Keyvanpour,et al.  Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework , 2011, ArXiv.

[8]  Helena Ramalhinho Dias Lourenço,et al.  Iterated Local Search , 2001, Handbook of Metaheuristics.

[9]  Ying Tan,et al.  Iterative improvement of the Multiplicative Update NMF algorithm using nature-inspired optimization , 2011, 2011 Seventh International Conference on Natural Computation.

[10]  Aryya Gangopadhyay,et al.  A generic and distributed privacy preserving classification method with a worst-case privacy guarantee , 2013, Distributed and Parallel Databases.

[11]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[12]  Ying Tan,et al.  Fireworks algorithm with differential mutation for solving the CEC 2014 competition problems , 2014, 2014 IEEE Congress on Evolutionary Computation (CEC).

[13]  Asem Mohammad Al-Najjar,et al.  Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table , 2011 .

[14]  Jianhua Liu,et al.  The Improvement on Controlling Exploration and Exploitation of Firework Algorithm , 2013, ICSI.

[15]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[16]  Ke Ding,et al.  Introduction to Fireworks Algorithm , 2013, Int. J. Swarm Intell. Res..

[17]  Ying Tan,et al.  Adaptive Fireworks Algorithm , 2014 .

[18]  Sachin Deshpande,et al.  Preserving Privacy in Data Mining using Data Distortion Approach , 2016 .

[19]  Ying Tan,et al.  Dynamic search in fireworks algorithm , 2014, 2014 IEEE Congress on Evolutionary Computation (CEC).

[20]  Haibin Zhu,et al.  Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms , 2011, Expert Syst. Appl..

[21]  Rathindra Sarathy,et al.  A theoretical basis for perturbation methods , 2003, Stat. Comput..

[22]  Jianhua Liu,et al.  Analysis on global convergence and time complexity of fireworks algorithm , 2014, 2014 IEEE Congress on Evolutionary Computation (CEC).

[23]  Thomas Stützle,et al.  Iterated local search for the quadratic assignment problem , 2006, Eur. J. Oper. Res..

[24]  Mariko Okada,et al.  Multiple Perturbation Two-Dimensional Correlation Analysis of Cellulose by Attenuated Total Reflection Infrared Spectroscopy , 2009, Applied spectroscopy.

[25]  F.L. Teixeira,et al.  On the Sensitivity of Time-Reversal Imaging Techniques to Model Perturbations , 2008, IEEE Transactions on Antennas and Propagation.

[26]  Kun Liu,et al.  Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.

[27]  Ralph Gross,et al.  Face De-identification , 2009, Protecting Privacy in Video Surveillance.

[28]  Philip S. Yu,et al.  A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.

[29]  Sos S. Agaian,et al.  A symmetric image cipher using wave perturbations , 2014, Signal Process..

[30]  Hitesh Gupta,et al.  RECONSTRUCTION OF PERTURBED DATA USING K-MEANS , 2012 .

[31]  Jie Ling,et al.  A fast image encryption method by using chaotic 3D cat maps , 2014 .

[32]  Ralph Gross,et al.  Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[33]  Keke Chen,et al.  Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[34]  Peter G. M. van der Heijden,et al.  Meta-Analysis of Randomized Response Research , 2005 .

[35]  Unil Yun,et al.  A fast perturbation algorithm using tree structure for privacy preserving utility mining , 2015, Expert Syst. Appl..

[36]  Ying Tan,et al.  Fireworks Algorithm for Optimization , 2010, ICSI.

[37]  Xilin Shen,et al.  Perturbation of the Eigenvectors of the Graph Laplacian: Application to Image Denoising , 2012, ArXiv.

[38]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[39]  Kamil Rocki,et al.  Large scale parallel iterated local search algorithm for solving traveling salesman problem , 2012, HiPC 2012.

[40]  Ying Tan,et al.  Enhanced Fireworks Algorithm , 2013, CEC 2013.

[41]  Feng Li,et al.  Distributed anonymous data perturbation method for privacy-preserving data mining , 2009 .

[42]  Ying Tan,et al.  An empirical study on influence of approximation approaches on enhancing fireworks algorithm , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[43]  Xiaojun Tong,et al.  Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..

[44]  Emmanuel J. Candès,et al.  The curvelet transform for image denoising , 2002, IEEE Trans. Image Process..

[45]  J. L. Maryak,et al.  Simultaneous perturbation optimization for efficient image restoration , 2005, IEEE Transactions on Aerospace and Electronic Systems.

[46]  Patrick P. K. Chan,et al.  Blind steganalysis with high generalization capability for different image databases using L-GEM , 2011, 2011 International Conference on Machine Learning and Cybernetics.

[47]  Haibin Ling,et al.  Preservative License Plate De-identification for Privacy Protection , 2011, 2011 International Conference on Document Analysis and Recognition.

[48]  Keke Chen,et al.  Under Consideration for Publication in Knowledge and Information Systems Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining , 2010 .

[49]  Hai Yu,et al.  Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains , 2015 .

[50]  Ohbyung Kwon,et al.  A privacy-aware feature selection method for solving the personalization-privacy paradox in mobile wellness healthcare services , 2015, Expert Syst. Appl..

[51]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).