[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2512938.2512939acmconferencesArticle/Chapter ViewAbstractPublication PagescosnConference Proceedingsconference-collections
research-article

Cryptagram: photo privacy for online social media

Published: 07 October 2013 Publication History

Abstract

While Online Social Networks (OSNs) enable users to share photos easily, they also expose users to several privacy threats from both the OSNs and external entities. The current privacy controls on OSNs are far from adequate, resulting in inappropriate flows of information when users fail to understand their privacy settings or OSNs fail to implement policies correctly. OSNs may further complicate privacy expectations when they reserve the right to analyze uploaded photos using automated face identification techniques.
In this paper, we propose the design, implementation and evaluation of Cryptagram, a system designed to enhance online photo privacy. Cryptagram enables users to convert photos into encrypted images, which the users upload to OSNs. Users directly manage access control to those photos via shared keys that are independent of OSNs or other third parties. OSNs apply standard image transformations (JPEG compression) to all uploaded images so Cryptagram provides an image encoding and encryption mechanism that is tolerant to these transformations. Cryptagram guarantees that the recipient with the right credentials can completely retrieve the original image from the transformed version of the uploaded encrypted image while the OSN cannot infer the original image. Cryptagram's browser extension integrates seamlessly with preexisting OSNs, including Facebook and Google+, and currently has over 400 active users.

References

[1]
Backes, J., Backes, M., Dürmuth, M., Gerling, S., and Lorenz, S. X-pire! - a digital expiration date for images in social networks. CoRR abs/1112.2649 (2011).
[2]
boyd, d. m., and Ellison, N. B. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13, 1 (2007), 210--230.
[3]
Burt, P. J. Fast filter transform for image processing. Computer graphics and image processing 16, 1 (1981), 20--51.
[4]
Cheddad, A., Condell, J., Curran, K., and Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (2010), 727--752.
[5]
Crandall, R. Some notes on steganography. Posted on steganography mailing list (1998).
[6]
Crowley, J. L. A representation for visual information. Tech. Rep. Carnegie Mellon University-RI-TR-82-07, Robotics Institute, Pittsburgh, PA, November 1981.
[7]
Daniel, A. CLOC: Count Lines of Code. http://cloc.sourceforge.net/.
[8]
Duce, D., and Boutell, T. Portable network graphics (png) specification. Information technology ISO/IEC 15948 (2003), 2003.
[9]
Duell, M. Mark Zuckerberg's private Facebook photos revealed: Security "glitch" allows web expert to access billionaire's personal pictures. The Daily Mail (MailOnline)(December 2011). http://www.dailymail.co.uk/news/article-2070749/Facebook-security-glitch-reveals-Mark-Zuckerbergs-private-photos.html.
[10]
Finkenzeller, K. Data Integrity. Wiley Online Library, 2003.
[11]
Fridrich, J. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, 2009.
[12]
Galand, F., and Kabatiansky, G. Information hiding by coverings. In Information Theory Workshop, 2003. Proceedings. 2003 IEEE (2003), IEEE, pp. 151--154.
[13]
Garfinkel, S. L., and Miller, R. C. Johnny 2: a user test of key continuity management with s/mime and outlook express. In Proceedings of the 2005 symposium on Usable privacy and security (2005), ACM, pp. 13--24.
[14]
Good, J. How many photos have ever been taken?http://blog.1000memories.com/94-number-of-photos-ever-taken-digital-and-analog-in-shoebox.
[15]
Google. Closure Tools. https://developers.google.com/closure/.
[16]
Google. webp: A new image format for the Web. https://developers.google.com/speed/webp/.
[17]
Hwang, R.-J., Shih, T., Kao, C.-H., and Chang, T.-M. Lossy compression tolerant steganography. In The Human Society and the Internet Internet-Related Socio-Economic Issues, W. Kim, T.-W. Ling, Y.-J. Lee, and S.-S. Park, Eds., vol. 2105 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2001, pp. 427--435.
[18]
Johnson, M., Egelman, S., and Bellovin, S. M. Facebook and privacy: it's complicated. In SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security (2012).
[19]
Kosinski, R. J. A literature review on reaction time. Clemson University 10 (2008).
[20]
Li, W., and Yu, N. A robust chaos-based image encryption scheme. In Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on (2009), IEEE, pp. 1034--1037.
[21]
Lin, K.-Y., and Lu, H.-P. Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior 27, 3 (2011), 1152--1161.
[22]
Microsoft Safety Security Center. Create strong passwords, 2013. http://www.microsoft.com/security/online-privacy/passwords-create.aspx.
[23]
Nissenbaum, H. Privacy in context: Technology, policy, and the integrity of social life. Stanford Law Books, 2009.
[24]
Parr, B. Facebook by the Numbers. http://mashable.com/2011/10/21/facebook-infographic/.
[25]
Pfeil, U., Arjan, R., and Zaphiris, P. Age differences in online social networking'a study of user profiles and the social capital divide among teenagers and older users in myspace. Computers in Human Behavior 25, 3 (2009), 643--654.
[26]
Poller, A., Steinebach, M., and Liu, H. Robust image obfuscation for privacy protection in web 2.0 applications. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series (2012), vol. 8303, p. 1.
[27]
Powell, J. 33 million people in the room: how to create, influence, and run a successful business with social networking. Ft Press, 2008.
[28]
Princeton University Office of Information Technology IT Security. Tips for creating strong, easy-to-remember passwords, 2013. http://www.princeton.edu/itsecurity/basics/passwords/.
[29]
Ra, M.-R., Govindan, R., and Ortega, A. P3: Toward Privacy-Preserving Photo Sharing. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (2013), USENIX Association.
[30]
Security, M. McAfee Social Protection. https://apps.facebook.com/socialprotection/.
[31]
Sengupta, S., and O'Brien, K. J. Facebook Can ID Faces, but Using Them Grows Tricky. The New York Times (2012).
[32]
Shankland, S. Facebook tries Google's WebP image format. http://news.cnet.com/8301-1023_3-57580664-93/facebook-tries-googles-webp-image-format-users-squawk/.
[33]
Stone, Z., Zickler, T., and Darrell, T. Toward large-scale face recognition using social network context. Proceedings of the IEEE 98, 8 (2010), 1408--1415.
[34]
Tapscott, D. Grown Up Digital: How the Net Generation is Changing Your World HC, 1 ed. Mcgraw-Hill, 2008.
[35]
The Chromium Authors. libjpeg | The Chromium Projects. http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libjpeg/.
[36]
Union, I. T. Digital Compression and Coding of Continuous-tone Still images. CCITT Rec. T.81, 1992.
[37]
Westfeld, A., and Pfitzmann, A. High capacity despite better steganalysis (f5--a steganographic algorithm). In Information Hiding, 4th International Workshop (2001), vol. 2137, Pittsburgh, PA, pp. 289--302.
[38]
Wheeler, D. SLOCCount. http://www.dwheeler.com/sloccount/.
[39]
Zimmermann, P. R. The official PGP user's guide. MIT press, 1995.

Cited By

View all
  • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
  • (2024)Image sensitive identification and protection based on semantic segmentationThird International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024)10.1117/12.3031222(213)Online publication date: 19-Jul-2024
  • (2024)Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryptionInformation Processing & Management10.1016/j.ipm.2024.10378961:5(103789)Online publication date: Sep-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
COSN '13: Proceedings of the first ACM conference on Online social networks
October 2013
254 pages
ISBN:9781450320849
DOI:10.1145/2512938
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 October 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. online social media
  2. photo privacy

Qualifiers

  • Research-article

Conference

COSN'13
Sponsor:
COSN'13: Conference on Online Social Networks
October 7 - 8, 2013
Massachusetts, Boston, USA

Acceptance Rates

COSN '13 Paper Acceptance Rate 22 of 138 submissions, 16%;
Overall Acceptance Rate 69 of 307 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)8
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
  • (2024)Image sensitive identification and protection based on semantic segmentationThird International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024)10.1117/12.3031222(213)Online publication date: 19-Jul-2024
  • (2024)Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryptionInformation Processing & Management10.1016/j.ipm.2024.10378961:5(103789)Online publication date: Sep-2024
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • (2023)A thumbnail preserving encryption scheme based on bit plane scramblingSecond International Symposium on Computer Applications and Information Systems (ISCAIS 2023)10.1117/12.2683415(30)Online publication date: 26-Jun-2023
  • (2022)Privacy Intelligence: A Survey on Image Privacy in Online Social NetworksACM Computing Surveys10.1145/354729955:8(1-35)Online publication date: 23-Dec-2022
  • (2022)Obfuscation Remedies Harms Arising from Content Flagging of PhotosProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3517520(1-25)Online publication date: 29-Apr-2022
  • (2022)TPEIPJournal of Information Security and Applications10.1016/j.jisa.2022.10335270:COnline publication date: 1-Nov-2022
  • (2022)Examining Co-Owners’ Privacy Consideration in Collaborative Photo SharingComputer Supported Cooperative Work (CSCW)10.1007/s10606-021-09421-4Online publication date: 17-Jan-2022
  • (2022)TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embeddingApplied Intelligence10.1007/s10489-022-03597-y53:4(4027-4046)Online publication date: 4-Jun-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media