Showing 1 - 10 of 54
Reversible data hiding in the encrypted domain is an emerging technology, as it can preserve the confidentiality. In this article, an efficient method of reversible data hiding in encrypted images is proposed. The cover image is first partitioned into non-overlapping blocks. A specific modulo...
Persistent link: https://www.econbiz.de/10012043964
This article describes how the most widely used clustering, k-means, is prone to fall into a local optimum. Notably, traditional clustering approaches are directly performed on private data and fail to cope with malicious attacks in massive data mining tasks against attackers' arbitrary...
Persistent link: https://www.econbiz.de/10012044241
The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim...
Persistent link: https://www.econbiz.de/10012045103
Beyond l-diversity model, an algorithm (l-BDT) based on state decision tree is proposed in this paper, which aims at protecting multi-sensitive attributes from being attacked. The algorithm considers the whole situations in equivalence partitioning for the first, prunes the decision tree...
Persistent link: https://www.econbiz.de/10012045929
Pieces of personal information (e.g. contact details, photos, thoughts and opinions on issues and things) on online social network sites are susceptible to third-party surveillance. While users are provided with the possibility to prevent unwarranted access using available privacy settings, such...
Persistent link: https://www.econbiz.de/10012048436
Many new Privacy Laws and Regulations have placed an increased importance on the correct design and implementation of information systems. This is an attempt to preserve and protect user and information privacy. Incorporating privacy regulations and guidelines into an active information system...
Persistent link: https://www.econbiz.de/10009434972
It is widely acknowledged that Information Privacy is subjective in nature and contextually influenced. Individuals value their personal privacy differently with many willing to trade-off of privacy for some form of reward or personal gain. Many of the proposed privacy protection schemes do not...
Persistent link: https://www.econbiz.de/10009434999
Some policymakers argue that consumers need legal protection of theirprivacy before they adopt interactive technologies. Others contend thatprivacy regulations impose costs that deter adoption. We contribute tothis growing debate by quantifying the effect of state privacyregulation on the...
Persistent link: https://www.econbiz.de/10009435115
This paper investigates one possible explanation for people’s conflicting attitudes regarding protection of private information. The proliferation of studies about crimes such as identity theft and cyber-stalking, together with the sharp increase in the number of victims, and the easiness with...
Persistent link: https://www.econbiz.de/10009441070
We performed a series of in-depth qualitative interviews with 14 subjects who answered advertisements to participate in a university study about Internet advertising. Subjects were not informed this study had to do with behavioral advertising privacy, but raised privacy concerns on their own...
Persistent link: https://www.econbiz.de/10009441168