Beruflich Dokumente
Kultur Dokumente
I. INTRODUCTION
Online social networks like Myspace, Orkut,
Facebook and Google+ have inadvertently ushered
in unfavorable elements like online bullying, online fraud and privacy infringement. With over a
billion active users[1], Facebook is arguably the
most popular site for users to share and store moments of their personal life. When a user0 s personal
life starts hampering his/her professional life, the
implications can be dire. Many recent stories[2,3]
reveal that employers have fired employees based
on information found online. A recent survey by
Microsoft [4] found that over 79% of recruiters
used information found on OSNs to access candidates. The survey, conducted by Cross-tab Marketing Services,[5] found that 70 percent of the
recruiting professionals in the U.S.A had rejected
job candidates based on the candidate0 s online
profile.
These unfavorable elements are a major cause of
distress and embarrassment for the users of OSNs.
There are various approaches to this, ranging from
blurring the faces in the image to distorting the image itself, if classified as potentially embarrassing.
We look at one approach from each of blurring the
image, reconfirmation, image distortion.
1
Fig. 1.
B. Scenario 2
Alice and Bob are potential candidates for a
promotion. Now Alice has a few pictures that she
had clicked from an event, which portray Bob in
bad light. Alice now wants to upload the image
onto Facebook, knowing that Charlie, who is the
boss of Alice and Bob, and a common friend of
both, would be able to see the image. If Alice does
upload the image, Bob could potentially not get
the promotion or, worse still, Bob might be passed
over for promotion in the coming years too, based
on this one image.
Figure 1 visualizes the propagation of an uploaded image, considering a Facebook user as an
example.
C. Proposed Solution
The authors of the paper have proposed and
implemented a simple three step method to help
protect the privacy of OSN users. The steps are
enumerated below:
1) Use a reliant face detection algorithm to recognize the faces in an image: This happens
once an uploader uploads an image onto the
OSN. The faces are compared to friends,
friends of friends and so on, subsequently
moving outward for each iteration in a graph
structure similar to the one shown above.
2) Template generation: Every recognized user
gets a notification and can set privacy settings for each photo. Default settings can
also be used. Users will be asked to confirm
if the recognized face is indeed him/her and
based on this a template photo is generated.
A template photo is made of the uploaded
image and F layers, where F is the number
of faces recognized. Each layer has a tuple
Fig. 2.
Fig. 3.
Fig. 4.
A. Proposed Method
The paper proposes a multi-region selective
JPEG scrambling scheme to protect visual privacy
in photo for multiple users. In such a scrambling
scheme, one can scramble multiple regions of
interest (ROIs) with arbitrary shapes in an images,
using one or different secret keys. Each scrambled
region is assigned with an ID and the descrambler can selectively descramble the regions using
corresponding scrambling keys. The scrambling
of the JPEG data is achieved by modifying the
signs of the quantized discrete cosine transform
(DCT) coefficients corresponding to the defined
ROIs. Scrambling and descrambling processes can
be done in not only JPEG encoding and decoding
respectively, but JPEG transcoding. Scrambling a
JPEG image in transcoding mode ensures a loss-
Fig. 5.
operation between each DC value and a pseudorandom number with the same length in bits as
the DC coefficient. Figure 5 illustrates scrambled
versions of an image with different strength levels.
3) Scrambling Information Insertion: Once an
image is scrambled, information about the scrambled regions is inserted in one or more application
markers (APPn) in JPEG file header. The information to be inserted includes the elements of the
mask matrix M and the scrambling strength, former of which records the location, shape and IDs
of the scrambled regions. Therefore, the scrambled
image is JPEG-compliant and can be viewed by
a typical JPEG decoder. However, to descramble
and view the original image, a special descrambler
(decoder or transcoder) and the correct scrambling
key(s) are needed. Intuitively, descrambling process simply reverses the scrambling processes described above. Given a region ID, the descrambler
can extract corresponding scrambling strength and
region location and shape from APPn markers of
JPEG header. As long as a correct scrambling
key is provided, the region can be recovered. The
process of a multi-region scrambling and selective
descrambling is illustrated in Figure 6.
V. CONCLUSIONS
While there are people so concerned about privacy that they do not post any pictures of themselves or their loved ones on social media or even
the Internet, this is not the case with a majority
Fig. 6.
[4] Cross-tab
and
Microsoft
Research,
Online
Reputation
in
a
Connected
World
(http://www.slideshare.net/nickbraak/online-reputation-ina-connected-world).
[5] S.J.
Johnston,
Microsoft
Survey:
Online
Reputation
Counts
(http://www.internetnews.com/webcontent/article.php/3861241/Microsoft+
Survey+Online+Reputation+Counts.htm).
[6] P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S.
Ioannidis, Face/Off: Preventing Privacy Leakage From Photos
in Social Networks. ACM Conference on Computer and
Communications Security. pg 781-792. 2015.
[7] C.
Bryant,
Facebooks
A.I.
To
Help
You
Eliminate
Embarrassing
Photos,
Newsy
(http://www.newsy.com/videos/facebook-s-a-i-to-help-youeliminate-embarrassing-photos/)
[8] L. Yuan, P. Korshunov and T. Ebrahimi, Secure JPEG Scrambling enabling Privacy in Photo Sharing. Workshop on Deidentification for privacy protection in multimedia, Ljubljana,
Slovenia, 2015.
[9] A. Acquisti and C. M. Fong. An experiment in hiring discrimination via online social networks, 2013.