10. METHOD
•Level of noise between the original and
distorted data is found out.
• If it is higher than the threshold
value, then it can be easily hacked.
• Data holder add some more noise.
• Process repeated until it falls within
minimum threshold value.
• Thus the privacy level is raised.
11.
12.
13.
14. PERFORMANCE
EVALUVATION
• The proposed system is trained to overcome
both the linear and non-linear attacks from
the hackers.
• The existing system deals only with linear
attacks.
• Checking with the existing noise level until
there is no similarity we can increase the
privacy to greater extent.
15. Additive
petrubatio
n
Non linear perturbation Petrubation
techniques
Multiplicative
petrubation