skip to main content
research-article

Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs)

Published:04 January 2018Publication History
Skip Abstract Section

Abstract

Sharing images online has become extremely easy and popular due to the ever-increasing adoption of mobile devices and online social networks (OSNs). The privacy issues arising from image sharing over OSNs have received significant attention in recent years. In this article, we consider the problem of designing a secure, robust, high-fidelity, storage-efficient image-sharing scheme over Facebook, a representative OSN that is widely accessed. To accomplish this goal, we first conduct an in-depth investigation on the manipulations that Facebook performs to the uploaded images. Assisted by such knowledge, we propose a DCT-domain image encryption/decryption framework that is robust against these lossy operations. As verified theoretically and experimentally, superior performance in terms of data privacy, quality of the reconstructed images, and storage cost can be achieved.

References

  1. Bechara Al Bouna, Richard Chbeir, Alban Gabillon, and Patrick Capolsini. 2013. A flexible image-based access control model for social networks. In Security and Privacy Preserving in Social Networks (Lecture Notes in Social Networks). 337--364. Google ScholarGoogle ScholarCross RefCross Ref
  2. Julian Backes, Michael Backes, Markus Dürmuth, Sebastian Gerling, and Stefan Lorenz. 2011. X-pire!-a digital expiration date for images in social networks. arXiv Preprint arXiv:1112.2649 (2011).Google ScholarGoogle Scholar
  3. Ero Balsa, Filipe Beato, and Seda Gürses. 2014. Why can’t online social networks encrypt? In Proceedings of W3C Workshop Privacy UserCentric Controls.Google ScholarGoogle Scholar
  4. Filipe Beato, Markulf Kohlweiss, and Karel Wouters. 2011. Scramble! your social network data. In Proceedings of the International Symposium Privacy Enhancing Technologies Symposium (PETS’11). Springer, 211--225.Google ScholarGoogle ScholarCross RefCross Ref
  5. Andrew Besmer and Heather Richter Lipford. 2008. Privacy perceptions of photo sharing in Facebook. In Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS’08). ACM.Google ScholarGoogle Scholar
  6. Bechara Al Bouna, Richard Chbeir, and Alban Gabillon. 2011. The image protector-a flexible security rule specification toolkit. In Proceedings of the International Conference on Security and Cryptography (SECRYPT’11). IEEE, 345--350.Google ScholarGoogle Scholar
  7. Kwontaeg Choi, Hyeran Byun, and Kar-Ann Toh. 2008. A collaborative face recognition framework on a social network platform. In Proceedings of the 8th International Conference on Automatic Face and Gesture Recognition (FG’08). IEEE, 1--6.Google ScholarGoogle Scholar
  8. Leucio Antonio Cutillo, Refik Molva, and Melek Önen. 2012. Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks. In Proceedings of the 5th Workshop on Social Network Systems (SNS’12). ACM, 6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ahmet Emir Dirik and Nasir Memon. 2013. Selective robust image encryption for social networks. In Proceedings of the International Conference Multimedia Communications Services and Security (MCSS’13). Springer, 71--81.Google ScholarGoogle ScholarCross RefCross Ref
  10. Facebook. 2017. Newsroom[Online]. Retrieved December 11, 2017 from http://newsroom.fb.com/company-info/.Google ScholarGoogle Scholar
  11. Felix Günther, Mark Manulis, and Thorsten Strufe. 2011. Key management in distributed online social networks. In Proceedings of the IEEE International Symposium on the World of Wireless, Mobile and Multimedia Networks (WoWMoM’11). IEEE, 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, and George Kesidis. 2016. PUPPIES: Transformation-supported personalized privacy preserving partial image sharing. In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable System Networks (DSN’16). IEEE, 359--370.Google ScholarGoogle ScholarCross RefCross Ref
  13. Zaobo He, Zhipeng Cai, Qilong Han, Weitian Tong, Limin Sun, and Yingshu Li. 2016. An energy efficient privacy-preserving content sharing scheme in mobile social networks. Personal Ubiquitous Computing 20, 5, 833--846. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Taiki Honda, Yasutaka Murakami, Yuki Yanagihara, Takeshi Kumaki, and Takeshi Fujino. 2013. Hierarchical image-scrambling method with scramble-level controllability for privacy protection. In Proceedings of the 56th International Midwest Symposium on Circuits and Systems (MWSCAS’13). IEEE, 1371--1374. Google ScholarGoogle ScholarCross RefCross Ref
  15. Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, 781--792.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Maritza Johnson, Serge Egelman, and Steven M. Bellovin. 2012. Facebook and privacy: It’s complicated. In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS’12). ACM, 9.Google ScholarGoogle Scholar
  17. Peter Klemperer, Yuan Liang, Michelle Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael Reiter. 2012. Tag, you can see it!: Using tags for access control in photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’12). ACM, 377--386.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kaitai Liang, Joseph K. Liu, Rongxing Lu, and Duncan S. Wong. 2015. Privacy concerns for photo sharing in online social networks. IEEE Internet Computing 19, 2, 58--63. Google ScholarGoogle ScholarCross RefCross Ref
  19. Ya-Nan Liu, Lein Harn, Lei Mao, and Zhangliang Xiong. 2016. Full-healing group-key distribution in online social networks. International Journal of Security and Networks 11, 1--2, 12--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Andrew D. Miller and W. Keith Edwards. 2007. Give and take: A study of consumer photo-sharing culture and practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM, 347--356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jianxia Ning, Inderjit Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Guohong Cao, and Prasant Mohapatra. 2014. Secret message sharing using online social media. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’14). IEEE, 319--327. Google ScholarGoogle ScholarCross RefCross Ref
  22. Frank Pallas, Max-Robert Ulbricht, Lorena Jaume-Palasí, and Ulrike Höppner. 2014. Offlinetags: A novel privacy approach to online photo sharing. In Proceedings of the CHI’14 Extended Abstracts Human Factors in Computing Systems (CHI’14). ACM, 2179--2184.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos D. Keromytis. 2014. Faces in the distorting mirror: Revisiting photo-based social authentication. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’14). ACM, 501--512.Google ScholarGoogle Scholar
  24. Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward privacy-preserving photo sharing. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13). USENIX, 515--528.Google ScholarGoogle Scholar
  25. David Rosenblum. 2007. What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy 5, 3, 40--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Gerald Schaefer and Michal Stich. 2004. UCID - An uncompressed colour image database. Storage Retrieval Methods and Applications for Multimedia 5307, 472--480.Google ScholarGoogle Scholar
  27. Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. 2011. A3p: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (HT’11). ACM, 261--270.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Zak Stone, Todd Zickler, and Trevor Darrell. 2008. Autotagging Facebook: Social network context improves photo annotation. In Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition Workshops (CVPRW’08). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  29. Zak Stone, Todd Zickler, and Trevor Darrell. 2010. Toward large-scale face recognition using social network context. Proceedings of IEEE 98, 8, 1408--1415. Google ScholarGoogle ScholarCross RefCross Ref
  30. Qiudong Sun, Ping Guan, Yongping Qiu, and Yunfeng Xue. 2012. A novel digital image encryption method based on one-dimensional random scrambling. In Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD’10). IEEE, 1669--1672. Google ScholarGoogle ScholarCross RefCross Ref
  31. Weiwei Sun, Jiantao Zhou, Ran Lyu, and Shuyuan Zhu. 2016. Processing-aware privacy-preserving photo sharing over online social networks. In Proceedings of the ACM Multimedia Conference (ACMMM’16). ACM, 581--585. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Matt Tierney, Ian Spiro, Christoph Bregler, and Lakshminarayanan Subramanian. 2013. Cryptagram: Photo privacy for online social media. In Proceedings of the ACM Conference on Online Social Networks (COSN’13). ACM, 75--88.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In Proceedings of the National Conference on Artificial Intelligence (AAAI’16). 1317--1323.Google ScholarGoogle Scholar
  34. Gregory K. Wallace. 1992. The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics 38, 1, xviii--xxxiv. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Chung-Ping Wu and C.-C. J. Kuo. 2005. Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 7, 5, 828--839. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, and Xiaolin Li. 2014. Control of photo sharing over online social networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’14). IEEE, 704--709. Google ScholarGoogle ScholarCross RefCross Ref
  37. Lin Yuan, Pavel Korshunov, and Touradj Ebrahimi. 2015. Privacy-preserving photo sharing based on a secure JPEG. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’15). IEEE, 185--190. Google ScholarGoogle ScholarCross RefCross Ref
  38. Lin Yuan, Pavel Korshunov, and Touradj Ebrahimi. 2015. Secure JPEG scrambling enabling privacy in photo sharing. In Proceedings of the 11th IEEE International Conference Workshops on Automatic Face and Gesture Recognition (FG’15), Vol. 4. IEEE, 1--6. Google ScholarGoogle ScholarCross RefCross Ref
  39. Lin Yuan, David McNally, Alptekin Küpçü, and Touradj Ebrahimi. 2015. Privacy-preserving photo sharing based on a public key infrastructure. In Proceedings of Applications of Digital Image Processing XXXVIII (SPIE’15). SPIE, 95991I.Google ScholarGoogle Scholar
  40. Xingliang Yuan, Xinyu Wang, Cong Wang, Anna C. Squicciarini, and Kui Ren. 2016. Towards privacy-preserving and practical image-centric social discovery. IEEE Transactions on Dependable and Secure Computing. 1--14.Google ScholarGoogle Scholar
  41. Zephoria. 2017. The top 20 valuable Facebook statistics. Retrieved December 11, 2017 from https://zephoria.com/top-15-valuable-facebook-statistics/.Google ScholarGoogle Scholar
  42. Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, and Yuguang Fang. 2010. Privacy and security for online social networks: Challenges and opportunities. IEEE Network 24, 4, 13--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, and Yunhao Liu. 2014. Outsource photo sharing and searching for mobile devices with privacy protection. arXiv Preprint arXiv:1410.6589.Google ScholarGoogle Scholar
  44. Li Zhang, Xiaolin Tian, and Shaowei Xia. 2011. A scrambling algorithm of image encryption based on Rubik’s cube rotation and logistic sequence. In Proceedings of the International Conference on Multimedia Signal Processing (CMSP’11), Vol. 1. IEEE, 312--315.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Jiantao Zhou, Xianming Liu, Oscar C. Au, and Yuan Yan Tang. 2014. Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Transactions on Information Forensics and Security 9, 1, 39--50. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs)

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 14, Issue 1
        February 2018
        287 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3173554
        Issue’s Table of Contents

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 January 2018
        • Accepted: 1 November 2017
        • Revised: 1 September 2017
        • Received: 1 April 2017
        Published in tomm Volume 14, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader