Digital Watermrking Methods for Image Privacy Protection in Social Networking Framework

Authors

  • G. Ananthi  Department of Computer Science, Thanthai Hans Roever College (Autonomous), Perambalur, Tamilnadu, India
  • Dr. S. Sivakumar  Department of Computer Science, Thanthai Hans Roever College (Autonomous), Perambalur, Tamilnadu, India

DOI:

https://doi.org/10.32628/CSEIT2390576

Keywords:

Image Privacy, Data Science and Engineering, Watermarking, Encryption, Sensitive Image

Abstract

The image is transferred or sent between servers and users via the social network. Because it is very sensitive information, the privacy of such data is quite vital. If a hacker obtains access to an image, it can be used to slander a person's social data. Text-based encryption can be applied in social network using existing systems. End-to-end encrypted data transfer, dynamic credential generation just for text data are only a few of the methods for securely storing data in the social media utilizing data privacy. In this paper, we will use a wavelet algorithm called discrete wavelet transform to propose a novel watermarking strategy in a real-time social network application like Facebook. We can use photos in this scheme and save them in a secure format on the server. We further broaden the scope of the study by classifying the image as sensitive or normal. Copyright algorithms should be used if the means are sensitive. Then give the recipient end permission to download the photos in a secure manner. The experimental results reveal that in real-time contexts, as well as a comparison of existing algorithms based on computing time and privacy rate.

References

  1. M. Cheung, J. She, and Z. Jie, “Connection discovery using big data of user-shared images in social media,” Multimedia, IEEE Transactions on, vol. 17, no. 9, pp. 1417–1428, 2015.
  2. M. Cheung and J. She, “Evaluating the privacy risk of user-shared images,” ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 12, no. 4s, p. 58, 2016.
  3. M. Cheung, J. She, and X. Li, “Non-user generated annotation on user shared images for connection discovery,” in 2015 IEEE International Conference on Data Science and Data Intensive Systems. IEEE, 2015, pp. 204–209.
  4. M. Douze, H. J´egou, H. Sandhawalia, L. Amsaleg, and C. Schmid, “Evaluation of gist descriptors for web-scale image search,” in Proceedings of the ACM International Conference on Image and Video Retrieval. ACM, 2009, p. 19.
  5. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105.
  6. K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman, “Return of the devil in the details: Delving deep into convolutional nets,” arXiv preprint arXiv:1405.3531, 2014.
  7. Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell, “Caffe: Convolutional architecture for fast feature embedding,” in Proceedings of the ACM International Conference on Multimedia. ACM, 2014, pp. 675–678.
  8. E. M. Jin, M. Girvan, and M. E. Newman, “Structure of growing social networks,” Physical review E, vol. 64, no. 4, p. 046132, 2001.
  9. A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, “Measurement and analysis of online social networks,” in Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. ACM, 2007, pp. 29–42.
  10. J.-D. Zhang and C.-Y. Chow, “igslr: personalized geo-social location recommendation: a kernel density estimation approach,” in Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 2013, pp. 334–343

Downloads

Published

2023-11-05

Issue

Section

Research Articles

How to Cite

[1]
G. Ananthi, Dr. S. Sivakumar, " Digital Watermrking Methods for Image Privacy Protection in Social Networking Framework" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 5, pp.21-30, September-October-2023. Available at doi : https://doi.org/10.32628/CSEIT2390576