Img-Shelter : Privacy Protection of Images In Online Social Networks Using Watermarking Scheme

Authors

  • P. Ponvasan  M.E, Assistant Professor, Department of Computer Science and Engineering, Sri Raaja Raajan College of Engineering and Technology, Amaravathipudhur, Karaikudi, Tamil Nadu, India
  • M. Muthusangari  PG Scholar, Department of Computer Science and Engineering, Sri Raaja Raajan College of Engineering and Technology, Amaravathipudhur, Karaikudi Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195344

Keywords:

Online Social Network, Image Privacy, Copyrights, Watermarking Scheme, Information Privacy

Abstract

Social networking sites are very useful in sharing information, making friends and keeping in touch with old friends. It is an online service, platform, or site that focuses on facilitating the building of social networks and social elation among peoples for sharing interests, activities, backgrounds, or real-life connections. But with the increasing demand of social networking sites (SNS) privacy and security concern have also increased. Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users’ privacy. These risks include the misuse of personal information which may lead to illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their personal information privacy, as well as the suitability of the privacy systems which they use to modify privacy settings. In this paper, categorize the picture as sensitive or normal. If it is sensitive means, perform copyrights algorithms. Then provide the permission to the receiver end for download the images in secure manner. Experimental result can be shows that in real time environments using C#.NET as front end and SQL SERVER as back end and comparative study of existing algorithms based on computational time and privacy rate.

References

  1. B. Wang, G. Chen, L. Fu, L. Song, and X. Wang, “Drimux: Dynamic rumor influence minimization with user experience in social networks,” in Proc. 30th AAAI Int. Conf. Artif. Intell., Feb. 2016.
  2. D. N. Yang, H. J. Hung, W. C. Lee, and W. Chen, “Maximizing acceptance probability for active friending in online social networks,” in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 713–721.
  3. A. McCallum, A. Corrada-Emmanuel, and X. Wang, “Topic and role discovery in social networks,” in Proc. 19th Int. Joint Conf. Artif. Intell., 2005, pp. 786–791.
  4. L. Fu, W. Huang, X. Gan, F. Yang, and X. Wang, “Capacity of wireless networks with social characteristics,” IEEE Trans. Wireless Commun., vol. 15, pp. 1505–1516, Feb. 2016.
  5. A. Montanari and A. Saberi, “The spread of innovations in social networks,” in Proc. National Academy of Sciences of the United States of America PNAS, Aug. 2010, pp. 20 196–202
  6. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology-Eurocrypt. Springer, 2004, pp. 506–522.
  7. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. of IEEE Symposium on Security and Privacy. IEEE, 2000, pp. 44–55.
  8. E.-J. Goh et al., “Secure indexes.” IACR Cryptology ePrint Archive, vol. 2003, p. 216, 2003.
  9. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proc. of 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79–88.
  10. J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, vol. 16, no. 1, pp. 171–178, 2015.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
P. Ponvasan, M. Muthusangari, " Img-Shelter : Privacy Protection of Images In Online Social Networks Using Watermarking Scheme, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.110-120, May-June-2019. Available at doi : https://doi.org/10.32628/CSEIT195344