Abstract
Sharing images online has become extremely easy and popular due to the ever-increasing adoption of mobile devices and online social networks (OSNs). The privacy issues arising from image sharing over OSNs have received significant attention in recent years. In this article, we consider the problem of designing a secure, robust, high-fidelity, storage-efficient image-sharing scheme over Facebook, a representative OSN that is widely accessed. To accomplish this goal, we first conduct an in-depth investigation on the manipulations that Facebook performs to the uploaded images. Assisted by such knowledge, we propose a DCT-domain image encryption/decryption framework that is robust against these lossy operations. As verified theoretically and experimentally, superior performance in terms of data privacy, quality of the reconstructed images, and storage cost can be achieved.
- Bechara Al Bouna, Richard Chbeir, Alban Gabillon, and Patrick Capolsini. 2013. A flexible image-based access control model for social networks. In Security and Privacy Preserving in Social Networks (Lecture Notes in Social Networks). 337--364. Google ScholarCross Ref
- Julian Backes, Michael Backes, Markus Dürmuth, Sebastian Gerling, and Stefan Lorenz. 2011. X-pire!-a digital expiration date for images in social networks. arXiv Preprint arXiv:1112.2649 (2011).Google Scholar
- Ero Balsa, Filipe Beato, and Seda Gürses. 2014. Why can’t online social networks encrypt? In Proceedings of W3C Workshop Privacy UserCentric Controls.Google Scholar
- Filipe Beato, Markulf Kohlweiss, and Karel Wouters. 2011. Scramble! your social network data. In Proceedings of the International Symposium Privacy Enhancing Technologies Symposium (PETS’11). Springer, 211--225.Google ScholarCross Ref
- Andrew Besmer and Heather Richter Lipford. 2008. Privacy perceptions of photo sharing in Facebook. In Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS’08). ACM.Google Scholar
- Bechara Al Bouna, Richard Chbeir, and Alban Gabillon. 2011. The image protector-a flexible security rule specification toolkit. In Proceedings of the International Conference on Security and Cryptography (SECRYPT’11). IEEE, 345--350.Google Scholar
- Kwontaeg Choi, Hyeran Byun, and Kar-Ann Toh. 2008. A collaborative face recognition framework on a social network platform. In Proceedings of the 8th International Conference on Automatic Face and Gesture Recognition (FG’08). IEEE, 1--6.Google Scholar
- Leucio Antonio Cutillo, Refik Molva, and Melek Önen. 2012. Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks. In Proceedings of the 5th Workshop on Social Network Systems (SNS’12). ACM, 6.Google ScholarDigital Library
- Ahmet Emir Dirik and Nasir Memon. 2013. Selective robust image encryption for social networks. In Proceedings of the International Conference Multimedia Communications Services and Security (MCSS’13). Springer, 71--81.Google ScholarCross Ref
- Facebook. 2017. Newsroom[Online]. Retrieved December 11, 2017 from http://newsroom.fb.com/company-info/.Google Scholar
- Felix Günther, Mark Manulis, and Thorsten Strufe. 2011. Key management in distributed online social networks. In Proceedings of the IEEE International Symposium on the World of Wireless, Mobile and Multimedia Networks (WoWMoM’11). IEEE, 1--7.Google ScholarDigital Library
- Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, and George Kesidis. 2016. PUPPIES: Transformation-supported personalized privacy preserving partial image sharing. In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable System Networks (DSN’16). IEEE, 359--370.Google ScholarCross Ref
- Zaobo He, Zhipeng Cai, Qilong Han, Weitian Tong, Limin Sun, and Yingshu Li. 2016. An energy efficient privacy-preserving content sharing scheme in mobile social networks. Personal Ubiquitous Computing 20, 5, 833--846. Google ScholarDigital Library
- Taiki Honda, Yasutaka Murakami, Yuki Yanagihara, Takeshi Kumaki, and Takeshi Fujino. 2013. Hierarchical image-scrambling method with scramble-level controllability for privacy protection. In Proceedings of the 56th International Midwest Symposium on Circuits and Systems (MWSCAS’13). IEEE, 1371--1374. Google ScholarCross Ref
- Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, 781--792.Google ScholarDigital Library
- Maritza Johnson, Serge Egelman, and Steven M. Bellovin. 2012. Facebook and privacy: It’s complicated. In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS’12). ACM, 9.Google Scholar
- Peter Klemperer, Yuan Liang, Michelle Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael Reiter. 2012. Tag, you can see it!: Using tags for access control in photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’12). ACM, 377--386.Google ScholarDigital Library
- Kaitai Liang, Joseph K. Liu, Rongxing Lu, and Duncan S. Wong. 2015. Privacy concerns for photo sharing in online social networks. IEEE Internet Computing 19, 2, 58--63. Google ScholarCross Ref
- Ya-Nan Liu, Lein Harn, Lei Mao, and Zhangliang Xiong. 2016. Full-healing group-key distribution in online social networks. International Journal of Security and Networks 11, 1--2, 12--24. Google ScholarDigital Library
- Andrew D. Miller and W. Keith Edwards. 2007. Give and take: A study of consumer photo-sharing culture and practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM, 347--356. Google ScholarDigital Library
- Jianxia Ning, Inderjit Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Guohong Cao, and Prasant Mohapatra. 2014. Secret message sharing using online social media. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’14). IEEE, 319--327. Google ScholarCross Ref
- Frank Pallas, Max-Robert Ulbricht, Lorena Jaume-Palasí, and Ulrike Höppner. 2014. Offlinetags: A novel privacy approach to online photo sharing. In Proceedings of the CHI’14 Extended Abstracts Human Factors in Computing Systems (CHI’14). ACM, 2179--2184.Google ScholarDigital Library
- Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos D. Keromytis. 2014. Faces in the distorting mirror: Revisiting photo-based social authentication. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’14). ACM, 501--512.Google Scholar
- Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward privacy-preserving photo sharing. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13). USENIX, 515--528.Google Scholar
- David Rosenblum. 2007. What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy 5, 3, 40--49. Google ScholarDigital Library
- Gerald Schaefer and Michal Stich. 2004. UCID - An uncompressed colour image database. Storage Retrieval Methods and Applications for Multimedia 5307, 472--480.Google Scholar
- Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. 2011. A3p: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (HT’11). ACM, 261--270.Google ScholarDigital Library
- Zak Stone, Todd Zickler, and Trevor Darrell. 2008. Autotagging Facebook: Social network context improves photo annotation. In Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition Workshops (CVPRW’08). IEEE, 1--8.Google ScholarCross Ref
- Zak Stone, Todd Zickler, and Trevor Darrell. 2010. Toward large-scale face recognition using social network context. Proceedings of IEEE 98, 8, 1408--1415. Google ScholarCross Ref
- Qiudong Sun, Ping Guan, Yongping Qiu, and Yunfeng Xue. 2012. A novel digital image encryption method based on one-dimensional random scrambling. In Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD’10). IEEE, 1669--1672. Google ScholarCross Ref
- Weiwei Sun, Jiantao Zhou, Ran Lyu, and Shuyuan Zhu. 2016. Processing-aware privacy-preserving photo sharing over online social networks. In Proceedings of the ACM Multimedia Conference (ACMMM’16). ACM, 581--585. Google ScholarDigital Library
- Matt Tierney, Ian Spiro, Christoph Bregler, and Lakshminarayanan Subramanian. 2013. Cryptagram: Photo privacy for online social media. In Proceedings of the ACM Conference on Online Social Networks (COSN’13). ACM, 75--88.Google ScholarDigital Library
- Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In Proceedings of the National Conference on Artificial Intelligence (AAAI’16). 1317--1323.Google Scholar
- Gregory K. Wallace. 1992. The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics 38, 1, xviii--xxxiv. Google ScholarDigital Library
- Chung-Ping Wu and C.-C. J. Kuo. 2005. Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 7, 5, 828--839. Google ScholarDigital Library
- Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, and Xiaolin Li. 2014. Control of photo sharing over online social networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’14). IEEE, 704--709. Google ScholarCross Ref
- Lin Yuan, Pavel Korshunov, and Touradj Ebrahimi. 2015. Privacy-preserving photo sharing based on a secure JPEG. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’15). IEEE, 185--190. Google ScholarCross Ref
- Lin Yuan, Pavel Korshunov, and Touradj Ebrahimi. 2015. Secure JPEG scrambling enabling privacy in photo sharing. In Proceedings of the 11th IEEE International Conference Workshops on Automatic Face and Gesture Recognition (FG’15), Vol. 4. IEEE, 1--6. Google ScholarCross Ref
- Lin Yuan, David McNally, Alptekin Küpçü, and Touradj Ebrahimi. 2015. Privacy-preserving photo sharing based on a public key infrastructure. In Proceedings of Applications of Digital Image Processing XXXVIII (SPIE’15). SPIE, 95991I.Google Scholar
- Xingliang Yuan, Xinyu Wang, Cong Wang, Anna C. Squicciarini, and Kui Ren. 2016. Towards privacy-preserving and practical image-centric social discovery. IEEE Transactions on Dependable and Secure Computing. 1--14.Google Scholar
- Zephoria. 2017. The top 20 valuable Facebook statistics. Retrieved December 11, 2017 from https://zephoria.com/top-15-valuable-facebook-statistics/.Google Scholar
- Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, and Yuguang Fang. 2010. Privacy and security for online social networks: Challenges and opportunities. IEEE Network 24, 4, 13--18. Google ScholarDigital Library
- Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, and Yunhao Liu. 2014. Outsource photo sharing and searching for mobile devices with privacy protection. arXiv Preprint arXiv:1410.6589.Google Scholar
- Li Zhang, Xiaolin Tian, and Shaowei Xia. 2011. A scrambling algorithm of image encryption based on Rubik’s cube rotation and logistic sequence. In Proceedings of the International Conference on Multimedia Signal Processing (CMSP’11), Vol. 1. IEEE, 312--315.Google ScholarDigital Library
- Jiantao Zhou, Xianming Liu, Oscar C. Au, and Yuan Yan Tang. 2014. Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Transactions on Information Forensics and Security 9, 1, 39--50. Google ScholarDigital Library
Index Terms
- Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs)
Recommendations
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks
Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also increased the risk of privacy invasion. An online image can reveal various types of sensitive information, prompting the public to ...
Processing-Aware Privacy-Preserving Photo Sharing over Online Social Networks
MM '16: Proceedings of the 24th ACM international conference on MultimediaWith the ever-increasing popularity of mobile devices and online social networks (OSNs), sharing photos online has become extremely easy and popular. The privacy issues of shared photos and the associated protection schemes have received significant ...
Towards Privacy-Preserving Content Sharing for Online Social Networks
UbiComp '18: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable ComputersThis paper presents presents an approach to preserve privacy for content sharing in online social networks. The approach is based on the concept of friendship strengths and social ties within a friendship circle. Friends can be categorized into ...
Comments