Proceedings of the 2017 on Multimedia Privacy and Security最新文献

筛选
英文 中文
Approximate Thumbnail Preserving Encryption 近似缩略图保留加密
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137621
Byron Marohn, C. V. Wright, W. Feng, Mike Rosulek, R. Bobba
{"title":"Approximate Thumbnail Preserving Encryption","authors":"Byron Marohn, C. V. Wright, W. Feng, Mike Rosulek, R. Bobba","doi":"10.1145/3137616.3137621","DOIUrl":"https://doi.org/10.1145/3137616.3137621","url":null,"abstract":"Thumbnail preserving encryption (TPE) was suggested by Wright et al. [Information Hiding & Multimedia Security Workshop 2015] as a way to balance privacy and usability for online image sharing. The idea is to encrypt a plaintext image into a ciphertext image that has roughly the same thumbnail as well as retaining the original image format. At the same time, TPE allows users to take advantage of much of the functionality of online photo management tools, while still providing some level of privacy against the service provider. In this work we present two new approximate TPE encryption schemes. In our schemes, ciphertexts and plaintexts have perceptually similar, but not identical, thumbnails. Our constructions are the first TPE schemes designed to work well with JPEG compression. In addition, we show that they also have provable security guarantees that characterize precisely what information about the plaintext is leaked by the ciphertext image. We empirically evaluate our schemes according to the similarity of plaintext & ciphertext thumbnails, increase in file size under JPEG compression, preservation of perceptual image hashes, among other aspects. We also show how approximate TPE can be an effective tool to thwart inference attacks by machine-learning image classifiers, which have shown to be effective against other image obfuscation techniques.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An NSF View of Multimedia Privacy and Security: Extended Abstract 多媒体隐私与安全的NSF观点:扩展摘要
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137622
J. Epstein
{"title":"An NSF View of Multimedia Privacy and Security: Extended Abstract","authors":"J. Epstein","doi":"10.1145/3137616.3137622","DOIUrl":"https://doi.org/10.1145/3137616.3137622","url":null,"abstract":"Multimedia introduces whole new worlds of opportunities and challenges for security and privacy. The NSF Secure and Trustworthy Cyberspace (SaTC) program funds a wide range of research in the area, and welcomes proposals for additional areas. This extended abstract identifies some of the topic areas that have been funded in the past and are of interest for the future.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 4: Intrusion Detection and Prevention 会话详细信息:会话4:入侵检测和防御
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3252985
K. Rohloff
{"title":"Session details: Session 4: Intrusion Detection and Prevention","authors":"K. Rohloff","doi":"10.1145/3252985","DOIUrl":"https://doi.org/10.1145/3252985","url":null,"abstract":"","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 2: Invited Talk: Mr. Jeremy Epstein, National Science Foundation 第二部分:特邀演讲:Jeremy Epstein先生,美国国家科学基金会
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3252983
Roger A. Hallman
{"title":"Session details: Session 2: Invited Talk: Mr. Jeremy Epstein, National Science Foundation","authors":"Roger A. Hallman","doi":"10.1145/3252983","DOIUrl":"https://doi.org/10.1145/3252983","url":null,"abstract":"","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131879493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1: Privacy 会话详细信息:会话1:隐私
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3252982
K. Rohloff
{"title":"Session details: Session 1: Privacy","authors":"K. Rohloff","doi":"10.1145/3252982","DOIUrl":"https://doi.org/10.1145/3252982","url":null,"abstract":"","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 2017 on Multimedia Privacy and Security 2017多媒体隐私与安全论文集
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3137616
Roger A. Hallman, K. Rohloff, Victor Chang
{"title":"Proceedings of the 2017 on Multimedia Privacy and Security","authors":"Roger A. Hallman, K. Rohloff, Victor Chang","doi":"10.1145/3137616","DOIUrl":"https://doi.org/10.1145/3137616","url":null,"abstract":"It is our great pleasure to welcome you to the 1st International Workshop on Multimedia Privacy and Security - MPS 2017. We are pleased to present this newly-established workshop that brings together researchers and practitioners in the fields of multimedia, data privacy, and cybersecurity. MPS 2017 highlights the important intersection of these fields that has been brought about by the emergence and widespread adoption of social media, Internet of Things (IoT), and other ubiquitous computing platforms. Indeed, with the rise of social media, mobile technologies, cloud services, and IoT, massive quantities of multimedia content are created and disseminated as users post updates that include personal information, video and audio data, and other analytical information. Multimedia has arguably expanded well beyond the scope of its original definition. \u0000 \u0000Our call for papers attracted submissions from North America, Central America, Asia, and Europe. We received seven submissions, of which three were selected as Full Papers (42%) and two were accepted as Short Papers after a double-blind review by our program committee. In addition to these presentations, we will feature an invited keynote address and discussion panel: \u0000An NSF View of Multimedia Privacy and Security, Mr. Jeremy Epstein (Deputy Division Director, Computer and Network Systems, National Science Foundation) \u0000Multimedia Security and Privacy with IoT and Social Networks, moderated by Kurt Rohloff and Roger Hallman","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116012488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 3: Image and Video Security 会议详情:会议3:图像和视频安全
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3252984
Roger A. Hallman
{"title":"Session details: Session 3: Image and Video Security","authors":"Roger A. Hallman","doi":"10.1145/3252984","DOIUrl":"https://doi.org/10.1145/3252984","url":null,"abstract":"","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123870546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures 基于自编码器的wifi位置数据擦除重构方法研究
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137620
Tetsushi Ohki, Akira Otsuka
{"title":"A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures","authors":"Tetsushi Ohki, Akira Otsuka","doi":"10.1145/3137616.3137620","DOIUrl":"https://doi.org/10.1145/3137616.3137620","url":null,"abstract":"Anonymization is one of the major processes to protect location-based services (LBS) from privacy leakage. However, there are many discussions about de-anonymization attacks to LBS and whether anonymization processing is a sufficient countermeasure for privacy leakage. In this paper, we proposed a novel method to reconstruct the location of user considering the time series using the Markov Transition Field (MTF) and Denoising Auto Encoder (DAE). We also focused on Wi-Fi location data including many erasures errors. We conducted an evaluation of de-anonymization attack using our reconstruction method to the Wi-Fi location dataset that was consisted of 10000 devices / four weeks in the four wards of Tokyo. We confirmed that the successful attack rate (SAR) was 24% when the number of candidate devices was 100 and 6% when that was 10000 devices.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"949 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Spying and Fraud Browser Extensions: Short Paper 检测间谍和欺诈浏览器扩展:短论文
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137619
G. Varshney, M. Misra, P. Atrey
{"title":"Detecting Spying and Fraud Browser Extensions: Short Paper","authors":"G. Varshney, M. Misra, P. Atrey","doi":"10.1145/3137616.3137619","DOIUrl":"https://doi.org/10.1145/3137616.3137619","url":null,"abstract":"Due to the flaws in policy followed by web browsers for granting permissions to browser extensions and due to a lack of effective static and dynamic detection systems for identifying malicious extensions uploaded on the web stores, malicious browser extensions have become the easiest way to carry out phishing, spying, fraud and other kinds of advanced attacks. This paper identifies and analyzes a subset of these attacks which can be performed with the use of malicious browser extensions (using Google Chrome) and discusses the research gaps of the existing prevention and detection schemes to adequately defend against these attacks. An initial set of malicious signatures responsible for cyber fraud and spying is identified during the study. We use this set of signatures to develop a lightweight malicious extension detection system which can alert users of suspected spying or fraud extensions installed on the Chrome browser on a PC. Results show that the proposed detection system performs better than known malicious extension detectors such as Chrome Cleanup tool and Chrome safeguard tool.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129402710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks 解开阿里阿德涅的身份线索:健身追踪器和在线社交网络的隐私风险
Proceedings of the 2017 on Multimedia Privacy and Security Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137617
Angeliki Aktypi, Jason R. C. Nurse, M. Goldsmith
{"title":"Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks","authors":"Angeliki Aktypi, Jason R. C. Nurse, M. Goldsmith","doi":"10.1145/3137616.3137617","DOIUrl":"https://doi.org/10.1145/3137616.3137617","url":null,"abstract":"The recent expansion of Internet of Things (IoT) and the grow- ing trends towards a healthier lifestyle, have been followed by a proliferation in the use of tness-trackers in our daily life. These wearable IoT devices combined with the extensive use by individu- als of Online Social Networks (OSNs) have raised many security and privacy concerns. Individuals enrich the content of their online posts with their physical performance and attendance at sporting events, without considering the plausible risks that this may result in. This paper aims to examine the potential exposure of users- identity that is caused by information that they share online and personal data that are stored by their tness-trackers. We approach the privacy concerns that arise by building an interactive tool. This tool models online information shared by individuals and elaborates on how they might be exposed to the unwanted leakage of further personal data. The tool also illustrates the privacy risks that arise from information that people expose, which could be exploited by malicious parties such as fraudsters, stalkers and other online and o ine criminals. To understand the level of users-awareness con- cerning their identity exposure when engaging with such devices and online services, we also have conducted a qualitative analysis and present our ndings here.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信