{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T15:58:48Z","timestamp":1769356728768,"version":"3.49.0"},"reference-count":30,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T00:00:00Z","timestamp":1550620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["MAKE"],"abstract":"<jats:p>The ubiquity of data, including multi-media data such as images, enables easy mining and analysis of such data. However, such an analysis might involve the use of sensitive data such as medical records (including radiological images) and financial records. Privacy-preserving machine learning is an approach that is aimed at the analysis of such data in such a way that privacy is not compromised. There are various privacy-preserving data analysis approaches such as k-anonymity, l-diversity, t-closeness and Differential Privacy (DP). Currently, DP is a golden standard of privacy-preserving data analysis due to its robustness against background knowledge attacks. In this paper, we report a scheme for privacy-preserving image classification using Support Vector Machine (SVM) and DP. SVM is chosen as a classification algorithm because unlike variants of artificial neural networks, it converges to a global optimum. SVM kernels used are linear and Radial Basis Function (RBF), while \u03f5 -differential privacy was the DP framework used. The proposed scheme achieved an accuracy of up to 98%. The results obtained underline the utility of using SVM and DP for privacy-preserving image classification.<\/jats:p>","DOI":"10.3390\/make1010029","type":"journal-article","created":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T11:45:39Z","timestamp":1550663139000},"page":"483-491","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Differentially Private Image Classification Using Support Vector Machine and Differential Privacy"],"prefix":"10.3390","volume":"1","author":[{"given":"Makhamisa","family":"Senekane","sequence":"first","affiliation":[{"name":"Department of Physics and Electronics, National University of Lesotho, P.O. Roma 180, Maseru 100, Lesotho"}]}],"member":"1968","published-online":{"date-parts":[[2019,2,20]]},"reference":[{"key":"ref_1","first-page":"1069","article-title":"Differentially private empirical risk minimization","volume":"12","author":"Chaudhuri","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., and Srikant, R. (2000, January 15\u201318). Privacy-preserving data mining. Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA.","DOI":"10.1145\/342009.335438"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Du, W., and Zhan, Z. (2003, January 24\u201327). Using randomized response techniques for privacy-preserving data mining. Proceedings of the ninth ACM SIGKDD International Conference On Knowledge Discovery and Data Mining, Washington, DC, USA.","DOI":"10.1145\/956750.956810"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Xu, K., Yue, H., Guo, L., Guo, Y., and Fang, Y. (July, January 29). Privacy-preserving machine learning algorithms for big data systems. Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems, Columbus, OH, USA.","DOI":"10.1109\/ICDCS.2015.40"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Shokri, R., and Shmatikov, V. (2015, January 12\u201316). Privacy-preserving deep learning. Proceedings of the 22nd ACM SIGSAC Conference on Computer And Communications Security, Denver, CO, USA.","DOI":"10.1145\/2810103.2813687"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzz. Knowl. Based Syst."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkitasubramaniam, M. (2007). L-diversity: Privacy Beyond K-anonymity. ACM Trans. Knowl. Discov. Data, 1.","DOI":"10.1145\/1217299.1217302"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., and Philip, S.Y. (2008). A general survey of privacy-preserving data mining models and algorithms. Privacy-Preserving Data Mining, Springer.","DOI":"10.1007\/978-0-387-70992-5"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., and Venkatasubramanian, S. (2007, January 15\u201320). t-closeness: Privacy beyond k-anonymity and l-diversity. Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006, January 4\u20137). Calibrating noise to sensitivity in private data analysis. Proceedings of the Theory of Cryptography Conference, New York, NY, USA.","DOI":"10.1007\/11681878_14"},{"key":"ref_11","unstructured":"Michalski, R.S., Carbonell, J.G., and Mitchell, T.M. (2013). Machine Learning: An Artificial Intelligence Approach, Springer Science & Business Media."},{"key":"ref_12","unstructured":"Russell, S.J., and Norvig, P. (2016). Artificial Intelligence: A Modern Approach, Pearson Education Limited."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Scholkopf, B., and Smola, A.J. (2001). Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond, MIT Press.","DOI":"10.7551\/mitpress\/4175.001.0001"},{"key":"ref_14","unstructured":"Goodfellow, I., Bengio, Y., Courville, A., and Bengio, Y. (2016). Deep Learning, MIT Press."},{"key":"ref_15","unstructured":"LeCun, Y., and Cortes, C. (2018, December 29). MNIST Handwritten Digit Database. Available online: http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"ref_16","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., and Naor, M. (June, January 28). Our data, ourselves: Privacy via distributed noise generation. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"ref_18","unstructured":"Dwork, C. (2008, January 25\u201329). Differential privacy: A survey of results. Proceedings of the International Conference on Theory and Applications of Models of Computation, Xi\u2019an, China."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhu, T., Li, G., Zhou, W., and Yu, P.S. (2017). Differential Privacy and Applications. Advances in Information Security, Springer.","DOI":"10.1007\/978-3-319-62004-6"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Attoh-Okine, N.O. (2017). Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering, John Wiley & Sons.","DOI":"10.1002\/9781119229070"},{"key":"ref_21","unstructured":"Chaudhuri, K., and Hsu, D. (2011, January 9\u201311). Sample complexity bounds for differentially private learning. Proceedings of the 24th Annual Conference on Learning Theory, Budapest, Hungary."},{"key":"ref_22","unstructured":"Ji, Z., Lipton, Z.C., and Elkan, C. (arXiv, 2014). Differential privacy and machine learning: A survey and review, arXiv."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., and Korolova, A. (2014, January 3\u20137). RAPPOR: Randomized aggregatable privacy-preserving ordinal response. Proceedings of the 2014 ACM SIGSAC Conference on Computer And Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2660348"},{"key":"ref_24","unstructured":"Apple (2017). Learning with privacy at scale. Appl. Mach. Learn. J., 1, 1\u201325."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Senekane, M., Mafu, M., and Taele, B.M. (2017, January 18\u201320). Privacy-preserving quantum machine learning using differential privacy. Proceedings of the 2017 IEEE AFRICON, Cape Town, South Africa.","DOI":"10.1109\/AFRCON.2017.8095692"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1145\/3187009.3177733","article-title":"Towards practical differential privacy for SQL queries","volume":"11","author":"Johnson","year":"2018","journal-title":"Proc. VLDB Endowment"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Choi, W.S., Tomei, M., Vicarte, J.R.S., Hanumolu, P.K., and Kumar, R. (2018, January 1\u20136). Guaranteeing local differential privacy on ultra-low-power systems. Proceedings of the 2018 ACM\/IEEE 45th Annual International Symposium on Computer Architecture (ISCA), Los Angeles, CA, USA.","DOI":"10.1109\/ISCA.2018.00053"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., and Zhang, L. (2016, January 24\u201328). Deep learning with differential privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978318"},{"key":"ref_29","unstructured":"Chaudhuri, K., and Monteleoni, C. (2009). Privacy-preserving logistic regression. Advances in Neural Information Processing Systems, Curran Associates, Inc."},{"key":"ref_30","first-page":"65","article-title":"Learning in a large function space: Privacy-preserving mechanisms for SVM learning","volume":"4","author":"Rubinstein","year":"2012","journal-title":"J. Priv. Confid."}],"container-title":["Machine Learning and Knowledge Extraction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-4990\/1\/1\/29\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:33:38Z","timestamp":1760186018000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-4990\/1\/1\/29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,20]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,3]]}},"alternative-id":["make1010029"],"URL":"https:\/\/doi.org\/10.3390\/make1010029","relation":{},"ISSN":["2504-4990"],"issn-type":[{"value":"2504-4990","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,20]]}}}