Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs)

Published: 04 January 2018 Publication History

Abstract

Sharing images online has become extremely easy and popular due to the ever-increasing adoption of mobile devices and online social networks (OSNs). The privacy issues arising from image sharing over OSNs have received significant attention in recent years. In this article, we consider the problem of designing a secure, robust, high-fidelity, storage-efficient image-sharing scheme over Facebook, a representative OSN that is widely accessed. To accomplish this goal, we first conduct an in-depth investigation on the manipulations that Facebook performs to the uploaded images. Assisted by such knowledge, we propose a DCT-domain image encryption/decryption framework that is robust against these lossy operations. As verified theoretically and experimentally, superior performance in terms of data privacy, quality of the reconstructed images, and storage cost can be achieved.

References

[1]
Bechara Al Bouna, Richard Chbeir, Alban Gabillon, and Patrick Capolsini. 2013. A flexible image-based access control model for social networks. In Security and Privacy Preserving in Social Networks (Lecture Notes in Social Networks). 337--364.
[2]
Julian Backes, Michael Backes, Markus Dürmuth, Sebastian Gerling, and Stefan Lorenz. 2011. X-pire!-a digital expiration date for images in social networks. arXiv Preprint arXiv:1112.2649 (2011).
[3]
Ero Balsa, Filipe Beato, and Seda Gürses. 2014. Why can’t online social networks encrypt? In Proceedings of W3C Workshop Privacy UserCentric Controls.
[4]
Filipe Beato, Markulf Kohlweiss, and Karel Wouters. 2011. Scramble! your social network data. In Proceedings of the International Symposium Privacy Enhancing Technologies Symposium (PETS’11). Springer, 211--225.
[5]
Andrew Besmer and Heather Richter Lipford. 2008. Privacy perceptions of photo sharing in Facebook. In Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS’08). ACM.
[6]
Bechara Al Bouna, Richard Chbeir, and Alban Gabillon. 2011. The image protector-a flexible security rule specification toolkit. In Proceedings of the International Conference on Security and Cryptography (SECRYPT’11). IEEE, 345--350.
[7]
Kwontaeg Choi, Hyeran Byun, and Kar-Ann Toh. 2008. A collaborative face recognition framework on a social network platform. In Proceedings of the 8th International Conference on Automatic Face and Gesture Recognition (FG’08). IEEE, 1--6.
[8]
Leucio Antonio Cutillo, Refik Molva, and Melek Önen. 2012. Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks. In Proceedings of the 5th Workshop on Social Network Systems (SNS’12). ACM, 6.
[9]
Ahmet Emir Dirik and Nasir Memon. 2013. Selective robust image encryption for social networks. In Proceedings of the International Conference Multimedia Communications Services and Security (MCSS’13). Springer, 71--81.
[10]
Facebook. 2017. Newsroom[Online]. Retrieved December 11, 2017 from http://newsroom.fb.com/company-info/.
[11]
Felix Günther, Mark Manulis, and Thorsten Strufe. 2011. Key management in distributed online social networks. In Proceedings of the IEEE International Symposium on the World of Wireless, Mobile and Multimedia Networks (WoWMoM’11). IEEE, 1--7.
[12]
Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, and George Kesidis. 2016. PUPPIES: Transformation-supported personalized privacy preserving partial image sharing. In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable System Networks (DSN’16). IEEE, 359--370.
[13]
Zaobo He, Zhipeng Cai, Qilong Han, Weitian Tong, Limin Sun, and Yingshu Li. 2016. An energy efficient privacy-preserving content sharing scheme in mobile social networks. Personal Ubiquitous Computing 20, 5, 833--846.
[14]
Taiki Honda, Yasutaka Murakami, Yuki Yanagihara, Takeshi Kumaki, and Takeshi Fujino. 2013. Hierarchical image-scrambling method with scramble-level controllability for privacy protection. In Proceedings of the 56th International Midwest Symposium on Circuits and Systems (MWSCAS’13). IEEE, 1371--1374.
[15]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, 781--792.
[16]
Maritza Johnson, Serge Egelman, and Steven M. Bellovin. 2012. Facebook and privacy: It’s complicated. In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS’12). ACM, 9.
[17]
Peter Klemperer, Yuan Liang, Michelle Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael Reiter. 2012. Tag, you can see it!: Using tags for access control in photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’12). ACM, 377--386.
[18]
Kaitai Liang, Joseph K. Liu, Rongxing Lu, and Duncan S. Wong. 2015. Privacy concerns for photo sharing in online social networks. IEEE Internet Computing 19, 2, 58--63.
[19]
Ya-Nan Liu, Lein Harn, Lei Mao, and Zhangliang Xiong. 2016. Full-healing group-key distribution in online social networks. International Journal of Security and Networks 11, 1--2, 12--24.
[20]
Andrew D. Miller and W. Keith Edwards. 2007. Give and take: A study of consumer photo-sharing culture and practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM, 347--356.
[21]
Jianxia Ning, Inderjit Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Guohong Cao, and Prasant Mohapatra. 2014. Secret message sharing using online social media. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’14). IEEE, 319--327.
[22]
Frank Pallas, Max-Robert Ulbricht, Lorena Jaume-Palasí, and Ulrike Höppner. 2014. Offlinetags: A novel privacy approach to online photo sharing. In Proceedings of the CHI’14 Extended Abstracts Human Factors in Computing Systems (CHI’14). ACM, 2179--2184.
[23]
Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos D. Keromytis. 2014. Faces in the distorting mirror: Revisiting photo-based social authentication. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’14). ACM, 501--512.
[24]
Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward privacy-preserving photo sharing. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13). USENIX, 515--528.
[25]
David Rosenblum. 2007. What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy 5, 3, 40--49.
[26]
Gerald Schaefer and Michal Stich. 2004. UCID - An uncompressed colour image database. Storage Retrieval Methods and Applications for Multimedia 5307, 472--480.
[27]
Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. 2011. A3p: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (HT’11). ACM, 261--270.
[28]
Zak Stone, Todd Zickler, and Trevor Darrell. 2008. Autotagging Facebook: Social network context improves photo annotation. In Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition Workshops (CVPRW’08). IEEE, 1--8.
[29]
Zak Stone, Todd Zickler, and Trevor Darrell. 2010. Toward large-scale face recognition using social network context. Proceedings of IEEE 98, 8, 1408--1415.
[30]
Qiudong Sun, Ping Guan, Yongping Qiu, and Yunfeng Xue. 2012. A novel digital image encryption method based on one-dimensional random scrambling. In Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD’10). IEEE, 1669--1672.
[31]
Weiwei Sun, Jiantao Zhou, Ran Lyu, and Shuyuan Zhu. 2016. Processing-aware privacy-preserving photo sharing over online social networks. In Proceedings of the ACM Multimedia Conference (ACMMM’16). ACM, 581--585.
[32]
Matt Tierney, Ian Spiro, Christoph Bregler, and Lakshminarayanan Subramanian. 2013. Cryptagram: Photo privacy for online social media. In Proceedings of the ACM Conference on Online Social Networks (COSN’13). ACM, 75--88.
[33]
Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In Proceedings of the National Conference on Artificial Intelligence (AAAI’16). 1317--1323.
[34]
Gregory K. Wallace. 1992. The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics 38, 1, xviii--xxxiv.
[35]
Chung-Ping Wu and C.-C. J. Kuo. 2005. Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 7, 5, 828--839.
[36]
Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, and Xiaolin Li. 2014. Control of photo sharing over online social networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’14). IEEE, 704--709.
[37]
Lin Yuan, Pavel Korshunov, and Touradj Ebrahimi. 2015. Privacy-preserving photo sharing based on a secure JPEG. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’15). IEEE, 185--190.
[38]
Lin Yuan, Pavel Korshunov, and Touradj Ebrahimi. 2015. Secure JPEG scrambling enabling privacy in photo sharing. In Proceedings of the 11th IEEE International Conference Workshops on Automatic Face and Gesture Recognition (FG’15), Vol. 4. IEEE, 1--6.
[39]
Lin Yuan, David McNally, Alptekin Küpçü, and Touradj Ebrahimi. 2015. Privacy-preserving photo sharing based on a public key infrastructure. In Proceedings of Applications of Digital Image Processing XXXVIII (SPIE’15). SPIE, 95991I.
[40]
Xingliang Yuan, Xinyu Wang, Cong Wang, Anna C. Squicciarini, and Kui Ren. 2016. Towards privacy-preserving and practical image-centric social discovery. IEEE Transactions on Dependable and Secure Computing. 1--14.
[41]
Zephoria. 2017. The top 20 valuable Facebook statistics. Retrieved December 11, 2017 from https://zephoria.com/top-15-valuable-facebook-statistics/.
[42]
Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, and Yuguang Fang. 2010. Privacy and security for online social networks: Challenges and opportunities. IEEE Network 24, 4, 13--18.
[43]
Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, and Yunhao Liu. 2014. Outsource photo sharing and searching for mobile devices with privacy protection. arXiv Preprint arXiv:1410.6589.
[44]
Li Zhang, Xiaolin Tian, and Shaowei Xia. 2011. A scrambling algorithm of image encryption based on Rubik’s cube rotation and logistic sequence. In Proceedings of the International Conference on Multimedia Signal Processing (CMSP’11), Vol. 1. IEEE, 312--315.
[45]
Jiantao Zhou, Xianming Liu, Oscar C. Au, and Yuan Yan Tang. 2014. Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Transactions on Information Forensics and Security 9, 1, 39--50.

Cited By

View all
  • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
  • (2024)PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic AlgorithmIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332476919(571-585)Online publication date: 1-Jan-2024
  • (2024)Enhancing Storage Efficiency for Health Data Records through Block chain-Based Storj Mechanism2024 Third International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS)10.1109/INCOS59338.2024.10527538(1-7)Online publication date: 14-Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 14, Issue 1
February 2018
287 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/3173554
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 January 2018
Accepted: 01 November 2017
Revised: 01 September 2017
Received: 01 April 2017
Published in TOMM Volume 14, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. JPEG
  2. Online social networks
  3. image sharing
  4. privacy-preserving

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Research Committee at the University of Macau
  • Macau Science and Technology Development Fund
  • National Science Foundation of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)5
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
  • (2024)PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic AlgorithmIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332476919(571-585)Online publication date: 1-Jan-2024
  • (2024)Enhancing Storage Efficiency for Health Data Records through Block chain-Based Storj Mechanism2024 Third International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS)10.1109/INCOS59338.2024.10527538(1-7)Online publication date: 14-Mar-2024
  • (2024)A Comparison Between EtC and SPN Systems: The Security Cost of Compatibility in JPEG ImagesIEEE Access10.1109/ACCESS.2024.341268112(81506-81517)Online publication date: 2024
  • (2023)Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo SharingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320893420:5(3572-3587)Online publication date: 1-Sep-2023
  • (2023)Minimum Noticeable Difference-Based Adversarial Privacy Preserving Image GenerationIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2022.321001033:3(1069-1081)Online publication date: Mar-2023
  • (2023)APCAS: Autonomous Privacy Control and Authentication Sharing in Social NetworksIEEE Transactions on Computational Social Systems10.1109/TCSS.2022.321888310:6(3169-3180)Online publication date: Dec-2023
  • (2023)Towards perceptual image watermarking with robust texture measurement▪Expert Systems with Applications: An International Journal10.1016/j.eswa.2023.119649219:COnline publication date: 1-Jun-2023
  • (2023)Stereo image encryption using vector decomposition and symmetry of 2D-DFT in quaternion gyrator domainMultimedia Tools and Applications10.1007/s11042-023-16755-283:10(29667-29687)Online publication date: 13-Sep-2023
  • (2022)Privacy Intelligence: A Survey on Image Privacy in Online Social NetworksACM Computing Surveys10.1145/354729955:8(1-35)Online publication date: 13-Jul-2022
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media