SlideShare a Scribd company logo
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud
Abstract:
Nowadays, cloud has become a promising multimedia data processing and
sharing platform. Many institutes and companies plan to outsource and share
their large-scale video and image datasets oncloud for scientific research and
public interest. Among various video applications, the discovery of frequent visual
patterns over graphical data is an exploratory and important technique. However,
the privacy concerns over the leakage of sensitive information contained in the
videos/images impedes the further implementation. Although the frequent visual
patterns mining (FVPM) algorithm aggregates summary over individual frames
and seems not to pose privacy threat, the private information contained in
individual frames still may be leaked from the statistical result. In this paper, we
study the problem of privacy-preserving publishing of graphical data FVPM
on cloud. We propose the first differentially private frequent visual patterns
mining algorithm for graphical data, named DPcode. We propose a novel
mechanism that integrates the privacy-preserving visual word conversion with the
differentially private mechanism under the noise allocation strategy of the sparse
vector technique. The optimized algorithms properly allocate the privacy budgets
among different phases in FPM algorithm over images and reduce the
corresponding data distortion. Extensive experiments are conducted based on
datasets commonly used in visual mining algorithms. The results show that our
approach achieves high utility while satisfying a practical privacy requirement.

More Related Content

What's hot

RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
Tutors India
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saranshSaransh Agarwal
 
3TU.NIRICT
3TU.NIRICT3TU.NIRICT
3TU.NIRICT
Iddo Bante
 
Abstract
AbstractAbstract
Abstract
Madhavi39
 
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Christian Esteve Rothenberg
 
Fog Radio Access Network Research Projects Guidance
Fog Radio Access Network Research Projects  GuidanceFog Radio Access Network Research Projects  Guidance
Fog Radio Access Network Research Projects Guidance
Network Simulation Tools
 
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelTowards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Christian Esteve Rothenberg
 
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
Technologies to Build Hybrid Clouds on Public-Private InfrastructuresTechnologies to Build Hybrid Clouds on Public-Private Infrastructures
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
Helix Nebula The Science Cloud
 
OW2con'14 - Xlcloud, 3D rendering in the cloud
OW2con'14 - Xlcloud, 3D rendering in the cloudOW2con'14 - Xlcloud, 3D rendering in the cloud
OW2con'14 - Xlcloud, 3D rendering in the cloud
OW2
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
Research Projects in Software Defined Networking Ideas
Research Projects in Software Defined Networking IdeasResearch Projects in Software Defined Networking Ideas
Research Projects in Software Defined Networking Ideas
Network Simulation Tools
 
Dynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platformDynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platform
霈萱 蔡
 
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011Smarcos Eu
 
Cloud Computing Definition
Cloud Computing DefinitionCloud Computing Definition
Cloud Computing Definition
hadifar
 
Taming limits with approximate networking
Taming limits with approximate networkingTaming limits with approximate networking
Taming limits with approximate networking
Junaid Qadir
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 

What's hot (20)

RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saransh
 
3TU.NIRICT
3TU.NIRICT3TU.NIRICT
3TU.NIRICT
 
Abstract
AbstractAbstract
Abstract
 
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
 
Fog Radio Access Network Research Projects Guidance
Fog Radio Access Network Research Projects  GuidanceFog Radio Access Network Research Projects  Guidance
Fog Radio Access Network Research Projects Guidance
 
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelTowards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
 
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
Technologies to Build Hybrid Clouds on Public-Private InfrastructuresTechnologies to Build Hybrid Clouds on Public-Private Infrastructures
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
 
OW2con'14 - Xlcloud, 3D rendering in the cloud
OW2con'14 - Xlcloud, 3D rendering in the cloudOW2con'14 - Xlcloud, 3D rendering in the cloud
OW2con'14 - Xlcloud, 3D rendering in the cloud
 
Cloud computing ppts
Cloud computing pptsCloud computing ppts
Cloud computing ppts
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
stefan moellmann issil2011
stefan moellmann issil2011stefan moellmann issil2011
stefan moellmann issil2011
 
Research Projects in Software Defined Networking Ideas
Research Projects in Software Defined Networking IdeasResearch Projects in Software Defined Networking Ideas
Research Projects in Software Defined Networking Ideas
 
Dynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platformDynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platform
 
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
E. Mannens - LODGE
E. Mannens - LODGEE. Mannens - LODGE
E. Mannens - LODGE
 
Cloud Computing Definition
Cloud Computing DefinitionCloud Computing Definition
Cloud Computing Definition
 
Taming limits with approximate networking
Taming limits with approximate networkingTaming limits with approximate networking
Taming limits with approximate networking
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 

Viewers also liked

Io stack software defined object storage
Io stack software defined object storageIo stack software defined object storage
Io stack software defined object storage
ieeepondy
 
Facor flexible access control with outsourceable revocation in mobile clouds
Facor flexible access control with outsourceable revocation in mobile cloudsFacor flexible access control with outsourceable revocation in mobile clouds
Facor flexible access control with outsourceable revocation in mobile clouds
ieeepondy
 
Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...
ieeepondy
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloud
ieeepondy
 
Automated system change discovery and management in the cloud
Automated system change discovery and management in the cloudAutomated system change discovery and management in the cloud
Automated system change discovery and management in the cloud
ieeepondy
 
A study on the lower tropospheric thermal inversion over the arabian sea usin...
A study on the lower tropospheric thermal inversion over the arabian sea usin...A study on the lower tropospheric thermal inversion over the arabian sea usin...
A study on the lower tropospheric thermal inversion over the arabian sea usin...
ieeepondy
 
Comments on “public integrity auditing for dynamic data sharing with multiuse...
Comments on “public integrity auditing for dynamic data sharing with multiuse...Comments on “public integrity auditing for dynamic data sharing with multiuse...
Comments on “public integrity auditing for dynamic data sharing with multiuse...
ieeepondy
 
Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...
ieeepondy
 
Building scalable, secure, multi tenant cloud services on ibm bluemix
Building scalable, secure, multi tenant cloud services on ibm bluemixBuilding scalable, secure, multi tenant cloud services on ibm bluemix
Building scalable, secure, multi tenant cloud services on ibm bluemix
ieeepondy
 
Multitenant transport networks with sdnnfv
Multitenant transport networks with sdnnfvMultitenant transport networks with sdnnfv
Multitenant transport networks with sdnnfv
ieeepondy
 
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Cloud performance modeling with benchmark evaluation of elastic scaling strat...Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
ieeepondy
 
Industry 4.1 for wheel machining automation
Industry 4.1 for wheel machining automationIndustry 4.1 for wheel machining automation
Industry 4.1 for wheel machining automation
ieeepondy
 

Viewers also liked (12)

Io stack software defined object storage
Io stack software defined object storageIo stack software defined object storage
Io stack software defined object storage
 
Facor flexible access control with outsourceable revocation in mobile clouds
Facor flexible access control with outsourceable revocation in mobile cloudsFacor flexible access control with outsourceable revocation in mobile clouds
Facor flexible access control with outsourceable revocation in mobile clouds
 
Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloud
 
Automated system change discovery and management in the cloud
Automated system change discovery and management in the cloudAutomated system change discovery and management in the cloud
Automated system change discovery and management in the cloud
 
A study on the lower tropospheric thermal inversion over the arabian sea usin...
A study on the lower tropospheric thermal inversion over the arabian sea usin...A study on the lower tropospheric thermal inversion over the arabian sea usin...
A study on the lower tropospheric thermal inversion over the arabian sea usin...
 
Comments on “public integrity auditing for dynamic data sharing with multiuse...
Comments on “public integrity auditing for dynamic data sharing with multiuse...Comments on “public integrity auditing for dynamic data sharing with multiuse...
Comments on “public integrity auditing for dynamic data sharing with multiuse...
 
Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...
 
Building scalable, secure, multi tenant cloud services on ibm bluemix
Building scalable, secure, multi tenant cloud services on ibm bluemixBuilding scalable, secure, multi tenant cloud services on ibm bluemix
Building scalable, secure, multi tenant cloud services on ibm bluemix
 
Multitenant transport networks with sdnnfv
Multitenant transport networks with sdnnfvMultitenant transport networks with sdnnfv
Multitenant transport networks with sdnnfv
 
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Cloud performance modeling with benchmark evaluation of elastic scaling strat...Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
 
Industry 4.1 for wheel machining automation
Industry 4.1 for wheel machining automationIndustry 4.1 for wheel machining automation
Industry 4.1 for wheel machining automation
 

Similar to D pcode privacy preserving frequent visual patterns publication on cloud

Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
Kumar Goud
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
IJERA Editor
 
A deep intelligence framework for online video processing
A deep intelligence framework for online video processingA deep intelligence framework for online video processing
A deep intelligence framework for online video processing
ieeepondy
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
IJTET Journal
 
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
IJERA Editor
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
journalBEEI
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
IRJET Journal
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection system
jpstudcorner
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
ijtsrd
 
Cloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection SystemCloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection System
1crore projects
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
Science international journal
Science international journalScience international journal
Science international journal
Sarita30844
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
Vijay Karan
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
Vijay Karan
 
journal in research
journal in research journal in research
journal in research
graphicdesigner79
 
journal published
journal publishedjournal published
journal published
graphicdesigner79
 
1.pdf
1.pdf1.pdf
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Editor IJMTER
 
Br36413417
Br36413417Br36413417
Br36413417
IJERA Editor
 

Similar to D pcode privacy preserving frequent visual patterns publication on cloud (20)

Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
A deep intelligence framework for online video processing
A deep intelligence framework for online video processingA deep intelligence framework for online video processing
A deep intelligence framework for online video processing
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Fog computing
Fog computingFog computing
Fog computing
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection system
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
Cloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection SystemCloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection System
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Science international journal
Science international journalScience international journal
Science international journal
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
journal in research
journal in research journal in research
journal in research
 
journal published
journal publishedjournal published
journal published
 
1.pdf
1.pdf1.pdf
1.pdf
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
Br36413417
Br36413417Br36413417
Br36413417
 

More from ieeepondy

Demand aware network function placement
Demand aware network function placementDemand aware network function placement
Demand aware network function placement
ieeepondy
 
Service description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forwardService description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forward
ieeepondy
 
Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...
ieeepondy
 
Standards for hybrid clouds
Standards for hybrid cloudsStandards for hybrid clouds
Standards for hybrid clouds
ieeepondy
 
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configurationRfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configuration
ieeepondy
 
Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...
ieeepondy
 
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
ieeepondy
 
Scalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of thingsScalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of things
ieeepondy
 
Scalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory dataScalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory data
ieeepondy
 
Robust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centersRobust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centers
ieeepondy
 
Privacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learningPrivacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learning
ieeepondy
 
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
ieeepondy
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
ieeepondy
 
Power optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ranPower optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ran
ieeepondy
 
Performance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auctionPerformance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auction
ieeepondy
 
Performance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instancesPerformance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instances
ieeepondy
 
Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...
ieeepondy
 
Predictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacentersPredictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacenters
ieeepondy
 
Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...
ieeepondy
 
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessorOptimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor
ieeepondy
 

More from ieeepondy (20)

Demand aware network function placement
Demand aware network function placementDemand aware network function placement
Demand aware network function placement
 
Service description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forwardService description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forward
 
Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...
 
Standards for hybrid clouds
Standards for hybrid cloudsStandards for hybrid clouds
Standards for hybrid clouds
 
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configurationRfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configuration
 
Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...
 
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
 
Scalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of thingsScalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of things
 
Scalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory dataScalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory data
 
Robust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centersRobust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centers
 
Privacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learningPrivacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learning
 
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Power optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ranPower optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ran
 
Performance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auctionPerformance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auction
 
Performance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instancesPerformance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instances
 
Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...
 
Predictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacentersPredictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacenters
 
Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...
 
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessorOptimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor
 

Recently uploaded

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

D pcode privacy preserving frequent visual patterns publication on cloud

  • 1. DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud Abstract: Nowadays, cloud has become a promising multimedia data processing and sharing platform. Many institutes and companies plan to outsource and share their large-scale video and image datasets oncloud for scientific research and public interest. Among various video applications, the discovery of frequent visual patterns over graphical data is an exploratory and important technique. However, the privacy concerns over the leakage of sensitive information contained in the videos/images impedes the further implementation. Although the frequent visual patterns mining (FVPM) algorithm aggregates summary over individual frames and seems not to pose privacy threat, the private information contained in individual frames still may be leaked from the statistical result. In this paper, we study the problem of privacy-preserving publishing of graphical data FVPM on cloud. We propose the first differentially private frequent visual patterns mining algorithm for graphical data, named DPcode. We propose a novel mechanism that integrates the privacy-preserving visual word conversion with the differentially private mechanism under the noise allocation strategy of the sparse vector technique. The optimized algorithms properly allocate the privacy budgets among different phases in FPM algorithm over images and reduce the corresponding data distortion. Extensive experiments are conducted based on datasets commonly used in visual mining algorithms. The results show that our approach achieves high utility while satisfying a practical privacy requirement.