{"title":"PROvacy: Protecting image privacy in social networking sites using reversible data hiding","authors":"Aswathy Achuthshankar, Aswin Achuthshankar","doi":"10.1109/ISCO.2016.7726913","DOIUrl":null,"url":null,"abstract":"The crimes in the social networking sites are increasing day by day. One of the main crimes is misusing the image by morphing and using it for blackmailing. Users can view the image and edit the image. On social networking sites, users post their own pictures and these pictures can be viewed by anyone. Anyone can access the image, whether the users are authorized or unauthorized. There is no centralized privacy. This paper deals with how to protect the image's privacy using reversible data hiding. In this technique, the image privacy information is embedded into the image, and only based on this privacy information the users on the social networking sites are able to view the image. By this method we make sure that only authorized users have access to the image.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCO.2016.7726913","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The crimes in the social networking sites are increasing day by day. One of the main crimes is misusing the image by morphing and using it for blackmailing. Users can view the image and edit the image. On social networking sites, users post their own pictures and these pictures can be viewed by anyone. Anyone can access the image, whether the users are authorized or unauthorized. There is no centralized privacy. This paper deals with how to protect the image's privacy using reversible data hiding. In this technique, the image privacy information is embedded into the image, and only based on this privacy information the users on the social networking sites are able to view the image. By this method we make sure that only authorized users have access to the image.