Steganography and Secure Communication on Online Social Networks and Online Photo Sharing

Author(s):  
Aniello Castiglione ◽  
Bonaventura D'Alessio ◽  
Alfredo De Santis
Author(s):  
Kaihe Xu ◽  
Yuanxiong Guo ◽  
Linke Guo ◽  
Yuguang Fang ◽  
Xiaolin Li

Author(s):  
Fatemeh Jalali ◽  
Chrispin Gray ◽  
Arun Vishwanath ◽  
Robert Ayre ◽  
Tansu Alpcan ◽  
...  

2015 ◽  
Vol 19 (2) ◽  
pp. 58-63 ◽  
Author(s):  
Kaitai Liang ◽  
Joseph K. Liu ◽  
Rongxing Lu ◽  
Duncan S. Wong

2019 ◽  
Vol 21 (3) ◽  
pp. 591-602 ◽  
Author(s):  
Lei Xu ◽  
Ting Bao ◽  
Liehuang Zhu ◽  
Yan Zhang

Author(s):  
Yifang Li ◽  
Nishant Vishwamitra ◽  
Hongxin Hu ◽  
Bart P. Knijnenburg ◽  
Kelly Caine

Photo sharing on online social networks (OSNs) can cause privacy issues. Face blurring is one strategy to increase privacy while still allowing users to share photos. To explore the potential blurring has as a privacy-enhancing technology for OSN photos, we conducted an online experiment with 47 participants to evaluate the effectiveness of face blurring compared to the original photo (as-is), and users’ experience (satisfaction, information sufficiency, enjoyment, social presence, and filter likeability). Users’ experience ratings for face blurring were positive, indicating blurring may be an acceptable way to modify photos from the users’ perspective. However, from a privacy-enhancement perspective, while face blurring may be useful in some situations, such as those where the person in the photo is unknown to the viewer, in other cases, such as in an OSN where the person in the image is known to the viewer, face blurring does not provide privacy protection.


IJARCCE ◽  
2017 ◽  
Vol 6 (6) ◽  
pp. 512-515
Author(s):  
Harshali Chandel ◽  
Dr. Bagade A. M.

2020 ◽  
Vol 17 (9) ◽  
pp. 4692-4697
Author(s):  
Radhika Goriparthi ◽  
Kanyakumari Jagadish Basani

Online Social Networks were famous for the data sharing etc., they have many features like chatting, photo sharing etc. A photo can be leaked without prior permission of the owner. A mechanism was developed to allow each individual in the group aware of the photo posting activity. An efficient facial recognition system that can recognize two different photos was designed. Only the owner of the photo can share the photo, this system is superior to other systems in terms of recognition ratio. This application is developed on the windows platform.


2020 ◽  
Vol 1 (5) ◽  
Author(s):  
Newton Masinde ◽  
Kalman Graffi

Abstract The use of online social networks, such as Facebook and Twitter, has grown at a phenomenal rate. These platforms offer services that support interactions via messaging, chatting or audio/video conferencing, and also sharing of content. Most, if not all, of these platforms use centralized computing systems; therefore, the control and management of the systems lies entirely in the hands of one provider, who must be trusted to treat the data and communication traces securely. As a zero-trust alternative, peer-to-peer (P2P) technologies promise to support end-to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks through misused trust. The goals of this survey are threefold. First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure communication, access control and general-purpose extensibility, which are not properly addressed in other P2P surveys. As a third point, it gives a comprehensive analysis of proposed P2P-based online social network applications, frameworks and architectures by exploring the technical details, inter-dependencies and maturity of these solutions.


Sign in / Sign up

Export Citation Format

Share Document