Digital Watermrking Methods for Image Privacy Protection in Social Networking Framework
DOI:
https://doi.org/10.32628/CSEIT2390576Keywords:
Image Privacy, Data Science and Engineering, Watermarking, Encryption, Sensitive ImageAbstract
The image is transferred or sent between servers and users via the social network. Because it is very sensitive information, the privacy of such data is quite vital. If a hacker obtains access to an image, it can be used to slander a person's social data. Text-based encryption can be applied in social network using existing systems. End-to-end encrypted data transfer, dynamic credential generation just for text data are only a few of the methods for securely storing data in the social media utilizing data privacy. In this paper, we will use a wavelet algorithm called discrete wavelet transform to propose a novel watermarking strategy in a real-time social network application like Facebook. We can use photos in this scheme and save them in a secure format on the server. We further broaden the scope of the study by classifying the image as sensitive or normal. Copyright algorithms should be used if the means are sensitive. Then give the recipient end permission to download the photos in a secure manner. The experimental results reveal that in real-time contexts, as well as a comparison of existing algorithms based on computing time and privacy rate.
References
- M. Cheung, J. She, and Z. Jie, “Connection discovery using big data of user-shared images in social media,” Multimedia, IEEE Transactions on, vol. 17, no. 9, pp. 1417–1428, 2015.
- M. Cheung and J. She, “Evaluating the privacy risk of user-shared images,” ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 12, no. 4s, p. 58, 2016.
- M. Cheung, J. She, and X. Li, “Non-user generated annotation on user shared images for connection discovery,” in 2015 IEEE International Conference on Data Science and Data Intensive Systems. IEEE, 2015, pp. 204–209.
- M. Douze, H. J´egou, H. Sandhawalia, L. Amsaleg, and C. Schmid, “Evaluation of gist descriptors for web-scale image search,” in Proceedings of the ACM International Conference on Image and Video Retrieval. ACM, 2009, p. 19.
- A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105.
- K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman, “Return of the devil in the details: Delving deep into convolutional nets,” arXiv preprint arXiv:1405.3531, 2014.
- Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell, “Caffe: Convolutional architecture for fast feature embedding,” in Proceedings of the ACM International Conference on Multimedia. ACM, 2014, pp. 675–678.
- E. M. Jin, M. Girvan, and M. E. Newman, “Structure of growing social networks,” Physical review E, vol. 64, no. 4, p. 046132, 2001.
- A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, “Measurement and analysis of online social networks,” in Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. ACM, 2007, pp. 29–42.
- J.-D. Zhang and C.-Y. Chow, “igslr: personalized geo-social location recommendation: a kernel density estimation approach,” in Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 2013, pp. 334–343
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.