Privacy-preserving photo sharing based on a secure JPEG

Sharing photos online is a common activity on social networks and photo hosting platforms, such as Facebook, Pinterest, Instagram, or Flickr. However, after reports of citizens surveillance by governmental agencies and the scandalous leakage of celebrities private photos online, people have become concerned about their online privacy and are looking for ways to protect it. Popular social networks typically offer privacy protection solutions only in response to the public demand and therefore are often rudimental, complex to use, and provide limited degree of control and protection. Most solutions either allow users to control who can access the shared photos or for how long they can be accessed. In contrast, in this paper, we take a structured privacy by design approach to the problem of online photo privacy protection. We propose a privacy-preserving photo sharing architecture that takes into account content and context of a photo with privacy protection integrated inside the JPEG file itself in a secure way. We demonstrate the proposed architecture with a prototype mobile iOS application called ProShare that offers scrambling as the privacy protection tool for a selected region in a photo, secure access to the protected images, and secure photo sharing on Facebook.

[1]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.

[2]  Refik Molva,et al.  Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks , 2012, SNS '12.

[3]  Gerald Friedland,et al.  Cybercasing the Joint: On the Privacy Implications of Geo-Tagging , 2010, HotSec.

[4]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Blase Ur,et al.  Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.

[6]  João Paulo Pesce,et al.  Privacy attacks in social media using photo tagging networks: a case study with Facebook , 2012, PSOSM '12.

[7]  Touradj Ebrahimi,et al.  Using warping for privacy protection in video surveillance , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[8]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[9]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[10]  Touradj Ebrahimi,et al.  MPEG-7 camera , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[11]  Mc Mohan Aa Rao D Kishore,et al.  Security and Privacy in Big Data , 2017 .

[12]  Andrew C. Gallagher,et al.  Understanding images of groups of people , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[13]  Kien A. Hua,et al.  A general framework for managing and processing live video data with privacy protection , 2011, Multimedia Systems.

[14]  Kiyoshi Tanaka,et al.  DCT based scalable scrambling method with reversible data hiding functionality , 2010, 2010 4th International Symposium on Communications, Control and Signal Processing (ISCCSP).

[15]  X. Tian,et al.  A Scrambling Algorithm of Image Encryption Based on Rubik's Cube Rotation and Logistic Sequence , 2011, 2011 International Conference on Multimedia and Signal Processing.

[16]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[17]  Volker Gruhn,et al.  Utilizing Social Networking Platforms to Support Public Key Infrastructures , 2007, SECRYPT.

[18]  Touradj Ebrahimi,et al.  Toward a secure JPEG , 2006, SPIE Optics + Photonics.

[19]  Ping Guan,et al.  A novel digital image encryption method based on one-dimensional random scrambling , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[20]  Nalini Venkatasubramanian,et al.  Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.

[21]  Hideki Noda,et al.  Protection of privacy in JPEG files using reversible information hiding , 2012, 2012 International Symposium on Intelligent Signal Processing and Communications Systems.

[22]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[23]  Touradj Ebrahimi,et al.  Using face morphing to protect privacy , 2013, 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance.

[24]  Minghua Chen,et al.  Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.

[25]  Takeshi Kumaki,et al.  Hierarchical image-scrambling method with scramble-level controllability for privacy protection , 2013, 2013 IEEE 56th International Midwest Symposium on Circuits and Systems (MWSCAS).

[26]  Lujo Bauer,et al.  Toward strong, usable access control for shared distributed data , 2014, FAST.

[27]  Zhenjun Tang,et al.  Secure Image Encryption without Size Limitation Using Arnold Transform and Random Strategies , 2011, J. Multim..

[28]  グレゴリー・ゴードン・ローズ,et al.  Of social network-based pki authentication , 2012 .