Secure Photo Sharing in Online Social Network

Krithikaa Venket*, R. Chithra Devi**
* PG Scholar, Department of Information Technology, Dr. Sivanthi Aditanar College of Engineering, Tiruchendur, India.
** Assistant Professor, Department of Information Technology, Dr. Sivanthi Aditanar College of Engineering, Tiruchendur, India.
Periodicity:September - November'2015
DOI : https://doi.org/10.26634/jit.4.4.3647

Abstract

A popular feature of many Online Social Network (OSN) is photo tagging and photo sharing that allows users to annotate the images who are present in the uploaded images. To overcome the user's privacy, a Facial Recognition (FR) system has been designed effectively during sharing, posting and liking of the photos. An increasing number of personal photographs are uploaded to Online Social Networks, and these photos do not exist in isolation. Photo tagging is a popular feature of many social network sites. The FR system is superior to some possible approaches in terms of increase in recognition ratio and efficiency. To achieve this, OSN specifies a privacy policy and an exposure policy. By these policies, individuals are enabled in a photo by providing permissions before posting a co-photo [11]. Exploring computational techniques and confidentiality of training sets that takes advantage of these trends seems a worthwhile endeavor. To share our photo safely we need an effective FR system, which can recognize everyone in the photo. We also attempted to develop users' private photos for designing an adaptive Face Recognition system specifically used to share a photo with their permission. Finally, the system protects user's privacy in photo sharing over Online Social Network.

Keywords

Online Social Network, Annotate, Photo Privacy, Photo Sharing

How to Cite this Article?

Venket. V. S. K and Devi. R. C (2015). Secure Photo Sharing in Online Social Network. i-manager’s Journal on Information Technology, 4(4), 42-51. https://doi.org/10.26634/jit.4.4.3647

References

[1]. A. Besmer and H. Richter Lipford. (2010). Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems ,CHI '10 , pages1563–1572, New York, NY, USA,. ACM.
[2]. Z. Stone, T. Zickler, and T. Darrell. Toward large-scale face recognition using social network context. Proceedings of the IEEE Vol. 98, No. 8, pp.1408–1415.
[3]. Z.Stone, T. Zickler, and T. Darrell. (2008). Autotagging facebook: Social network context improves photo annotation. In Computer Vision and Pattern Recognition Workshops, 2008. CVPRW'08. IEEE Computer Society Conference, pages 1–8. IEEE,
[4]. L. Palen. (2003). Unpacking privacy for a networked world. pages 129–136. Press,
[5]. K. Choi, H. Byun, and K.-A. Toh. (2008). A collaborative face recognition framework on a social network platform. In Automatic Face Gesture Recognition, 2008. FG '08. 8th IEEE International Conference, pages 1–6,.
[6]. J. Y. Choi, W. De Neve, K. Plataniotis, and Y.-M. Ro. (2011). Collaborative face recognition for improved faceannotation in personal photo collections shared on online social networks Multimedia, IEEE Transactions on, Vol. 13, No. 1, pp.14–28,.
[7]. M. Jones and P. Viola, (2001). "Rapid Object Detection using a Boosted Cascade of Simple Features Computer Vision and Pattern Recognition, 2001. Proceedings of the 2001 IEEE Computer Society Conference, VoI, pp. 511- 518,
[8]. K. Thomas, C. Grier, and D. M. Nicol. (2010). unfriendly: Multi-party privacy risks in social networks. Privacy Enhancing Technologies, Lecture Notes in Computer Science, Vol. 6205, pages 236–252. Springer,
[9]. S. Wang, Amr and Abdel-Dayem, (2012). "Improved Viola-Jones Face Detector," ICCIT-7th International Conference on Computer Sciences and Convergence Information Technology, pp. 124-126,
[10]. B. Carminati, E. Ferrari, and A. Perego. (2006). Rulebased access control for social networks. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Vol 4278 of Lecture Notes in Computer Science, pp. 1734–1744. Springer Berlin Heidelberg,
[11]. V.S. KrithikaaVenket, R.Chithra Devi, and P.Sahana (2015). “Privacy-Preserving of Photo Sharing in a Tagged World”, International Journal of Innovative Research in Computer and Communication Engineering. Vol. 3, No.9
[12]. Kaih Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, and Xiaolin Li (2014). “Control of Photo Sharing over Online Social Networks ”, Communication and Information System Security Symposium.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.