Skip to main content

Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services

  • Conference paper
The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

Abstract

Social networking services (SNSs) support communication among people via the Internet. However, sensitive information about a user can be disclosed by the user’s SNS friends. This makes it unsafe for a user to share information with friends in different groups. Moreover, a friend who has disclosed a user’s information is difficult to identify. One approach to overcoming this problem is to anonymize the sensitive information in text to be posted by generalization, but most methods proposed for this approach are for information in a database. Another approach is to create different fingerprints for certain sensitive information by using various synonyms. However, the methods proposed for doing this do not anonymize the information. We have developed an algorithm for automatically creating enough anonymous fingerprints to cover most cases of SNSs containing sensitive phrases. The fingerprints are created using both generalization and synonymization. A different fingerprinted version of sensitive information is created for each friend that will receive the posted text. The fingerprints not only anonymize a user’s sensitive information but also can be used to identify a person who has disclosed sensitive information about the user. Fingerprints are quantified using a modified discernability metric to ensure that an appropriate level of privacy is used for each group to receive the posted text. The use of synonyms ensures that an appropriate level of privacy is used for each group to receive the posted text. Moreover, a fingerprint cannot be converted by an attacker into one that causes the algorithm to incorrectly identify a person who has revealed sensitive information. The algorithm was demonstrated by using it in an application for controlling the disclosure of information on Facebook.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arnold, M., Schmucker, M., Wolthusen, S.: Techniques and applications of digital watermarking and content protection. Artech House Publishers (2003)

    Google Scholar 

  2. Ellison, N., Steinfield, C., Lampe, C.: The benefits of Facebook “friends”: Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication 12(4), 1143–1168 (2007)

    Article  Google Scholar 

  3. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM Press (2005)

    Google Scholar 

  4. Hansen, M., Schwartz, A., Cooper, A.: Privacy and identity management. IEEE Security and Privacy Magazine 6(2), 38–45 (2008)

    Article  Google Scholar 

  5. Joshi, P., Kuo, C.C.: Security and privacy in online social networks: A survey. In: Proceedings of the IEEE International Conference on Multimedia and Expo (2011)

    Google Scholar 

  6. Kataoka, H., Utsumi, A., Hirose, Y., Yoshiura, H.: Disclosure control of natural language information to enable secure and enjoyable communication over the internet. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2007. LNCS, vol. 5964, pp. 178–188. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Madden, M., Smith, A.: Reputation Management and Social Media (2010), http://pewinternet.org/~/media//Files/Reports/2010/PIP_Reputation_Management.pdf

  8. Miller, G., et al.: Wordnet: a lexical database for english. Communications of the ACM 38(11), 39–41 (1995)

    Article  Google Scholar 

  9. Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, vol. 17, pp. 188–188. ACM (1998)

    Google Scholar 

  10. Schrittwieser, S., Kieseberg, P., Echizen, I., Wohlgemuth, S., Sonehara, N., Weippl, E.: An algorithm for k-anonymity-based fingerprinting. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 439–452. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Suchanek, F., Kasneci, G., Weikum, G.: YAGO: a core of semantic knowledge. In: Proceedings of the 16th International Conference on World Wide Web (WWW), pp. 697–706. ACM Press (2007)

    Google Scholar 

  12. Ullyot, T.: Facebook Current Report, Form 8-K, Filing Date July 26, 2012 (2012), http://pdf.secdatabase.com/700/0001193125-12-316895.pdf

  13. Vokel, M., Krotzsch, M., Vrandecic, D., Haller, H., Studer, R.: Semantic Wikipedia. In: Proceedings of the 15th International Conference on World Wide Web (2006)

    Google Scholar 

  14. Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.: Utility-based anonymization using local recoding. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–790. ACM (2006)

    Google Scholar 

  15. Zheng, X., Huang, L., Chen, Z., Yu, Z., Yang, W.: Hiding information by context-based synonym substitution. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 162–169. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nguyen-Son, HQ., Tran, MT., Tien, D.T., Yoshiura, H., Sonehara, N., Echizen, I. (2013). Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics