PUBLISHING PATIENT DATA SET SECURELY THROUGH DIFFERENTIAL PRIVACY VIA WAVELET TRANSFORMS
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 2
Abstract
Every organization stores a required data in the digital form. This data needs to be published due to the mutual benefits or due to the government rule. This data also has significant research value. While publishing a data in its original form, there is loss of privacy of the individual record. To avoid this, we can use ε -differential privacy. Dwork provides a simplest way to achieve this. But it does not work well with range count query. In this paper we have used Privelet+ method using array based implementation for wavelet transforms. This method shows better result than the Dwork method for the range count queries.
Authors and Affiliations
Mr. P. M. GAVALI , Prof. P. C. BHASKAR
PERCEPTIVE APPROACH FOR ROUTE OPTIMIZATION IN MOBILE IP
The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol[1,2] has been designed within the...
A COMPARATIVE STUDY OF PROPOSED TOPOLOGY CONTROL ALGORITHMS FOR ENERGY EFFICIENT WIRELESS SENSOR NETWORK
Recent years showed a wide range of applications in Wireless Sensor Networks (WSN). For a WSN, Topology Control is crucial to obtain an energy efficient network without affecting the connectivity and other properties. In...
SOFT COMPUTING BASED ADAPTIVE CRUISE CONTROL
Research on adaptive cruise control (ACC) is presently one of the most important topics in the field of Intelligent Transportation Systems. The main feature of such controllers is that there is adaptation to a user-prese...
VARIABLE RATE STEGANOGRAPH Y IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedd...
STUDY OF BLUETOOTH WIRELESS TECHNOLOGY USING JAVA
Bluetooth is a wireless communication protocol. Since it's a communication protocol, we can use Bluetooth to communicate to other Bluetooth-enabled devices. In this sense, Bluetooth is like any other communication protoc...