2020 International Conference on Emerging Trends in Information Technology and Engineering (Ic-Etite) 2020
DOI: 10.1109/ic-etite47903.2020.244
|View full text |Cite
|
Sign up to set email alerts
|

A Fuzzy based Data Perturbation Technique for Privacy Preserved Data Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…In order to strengthen the possibilistic c-mean algorithm, we have hybridization with an intuitionist fuzzy c-mean algorithm. The Intuitionist fuzzy c-mean algorithm used to solve uncertainty issues by addressing degree of hesitation during the membership function [ 51 , 52 , 53 ].…”
Section: Methodsmentioning
confidence: 99%
“…In order to strengthen the possibilistic c-mean algorithm, we have hybridization with an intuitionist fuzzy c-mean algorithm. The Intuitionist fuzzy c-mean algorithm used to solve uncertainty issues by addressing degree of hesitation during the membership function [ 51 , 52 , 53 ].…”
Section: Methodsmentioning
confidence: 99%
“…This work may consider the various images of varying sizes in pixels. P. G. Shynu et al [1] proposed a fuzzy-based data transformation technique to preserve privacy by using privacy-preserving data mining (PPDM) in the database. Privacy-preserving data mining is used to transform fuzzy data original dataset.…”
Section: Related Workmentioning
confidence: 99%
“…The light has a photon; it carries a rigid amount of energy and polarization physical property. Polarization node is classified into two types [1]. One is a rectilinear polarization node; another one is the diagonal polarization node.…”
Section: Introductionmentioning
confidence: 99%
“…In order to disorder the rectangular blocks after the image was segmented, rectangle blocks scrambling algorithm is used to reorganize the segmented image [14]- [15]. A set of random non-repeated sequence are created according to logistic iterative formula.…”
Section: B Rectangle Blocks Scramblingmentioning
confidence: 99%