A Fine-Grained Image Access Control Model

Sharing and publishing images and photos have become the trend of nowadays (social networks, messengers, etc.). Providing appropriate techniques to preserve privacy and protect content of sensitive and private images is an essential need. In this paper, we present a novel security model for image content protection. In our model, we provide dynamic security rules based on first order logic to express constraints that can be applied to contextual information as well as low level features of images. We finally discuss a set of experiments and studies carried out to evaluate the proposed approach.

[1]  Alban Gabillon,et al.  Rule-based policy enforcement point for map services , 2010, SPRINGL '10.

[2]  Frédéric Cuppens,et al.  Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[3]  Konstantinos N. Plataniotis,et al.  A Novel Vector-Based Approach to Color Image Retrieval Using a Vector Angular-Based Distance Measure , 1999, Comput. Vis. Image Underst..

[4]  Om Prakash Vyas,et al.  A Novel Approach of Multilevel Positive and Negative Association Rule Mining for Spatial Databases , 2005, MLDM.

[5]  Jianping Fan,et al.  Access control, confidentiality and privacy for video surveillance databases , 2006, SACMAT '06.

[6]  Richard Chbeir,et al.  Content-Based Policy Specification for Multimedia Authorization and Access Control Model , 2007 .

[7]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[8]  Ninghui Li,et al.  Understanding SPKI/SDSI using first-order logic , 2005, International Journal of Information Security.

[9]  Dekang Lin,et al.  An Information-Theoretic Definition of Similarity , 1998, ICML.

[10]  Richard Chbeir,et al.  The image protector - A flexible security rule specification toolkit , 2011, Proceedings of the International Conference on Security and Cryptography.

[11]  Tsung-Yi Chen,et al.  Knowledge sharing in virtual enterprises via an ontology-based access control approach , 2008, Comput. Ind..

[12]  Max J. Egenhofer,et al.  Query Processing in Spatial-Query-by-Sketch , 1997, J. Vis. Lang. Comput..

[13]  Bhavani Thuraisingham,et al.  Security and privacy for multimedia database management systems , 2007, Multimedia Tools and Applications.

[14]  Lixin Pan A criterion-based multilayer access control model for multimedia applications in mpeg-7 , 2007 .

[15]  Roy Rada,et al.  Development and application of a metric on semantic nets , 1989, IEEE Trans. Syst. Man Cybern..

[16]  James F. Allen Maintaining knowledge about temporal intervals , 1983, CACM.

[17]  Richard Chbeir,et al.  MCA2CM: Multimedia Context-Aware Access Control Model , 2007, 2007 IEEE Intelligence and Security Informatics.

[18]  V. S. Subrahmanian,et al.  A multi-similarity algebra , 1998, SIGMOD '98.

[19]  Elisa Bertino,et al.  An access control model for video database systems , 2000, CIKM '00.

[20]  Jianping Fan,et al.  A hierarchical access control model for video database systems , 2003, TOIS.

[21]  Richard Chbeir,et al.  User Profile Matching in Social Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[22]  Basit Shafiq,et al.  A model for secure multimedia document database system in a distributed environment , 2002, IEEE Trans. Multim..

[23]  Andrew U. Frank,et al.  A Topological Data Model for Spatial Databases , 1990, SSD.

[24]  Elisa Bertino,et al.  A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..

[25]  Essam A. El-Kwae,et al.  A robust framework for content-based retrieval by spatial similarity in image databases , 1999, TOIS.

[26]  Amirreza Masoumzadeh,et al.  OSNAC: An Ontology-based Access Control Model for Social Networking Systems , 2010, 2010 IEEE Second International Conference on Social Computing.

[27]  Richard Chbeir,et al.  Novel Indexing Method of Relations Between Salient Objects , 2003, Effective Databases for Text & Document Management.

[28]  H. Lan,et al.  SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .

[29]  Philip Resnik,et al.  Using Information Content to Evaluate Semantic Similarity in a Taxonomy , 1995, IJCAI.

[30]  Chang Nian Zhang,et al.  A criterion-based multilayer access control approach for multimedia applications and the implementation considerations , 2008, TOMCCAP.

[31]  Alban Gabillon,et al.  Security mechanisms for geographic data , 2010, MEDES.

[32]  Jianping Fan,et al.  A novel approach for privacy-preserving video sharing , 2005, CIKM '05.

[33]  Vijayalakshmi Atluri,et al.  An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.

[34]  Leon Pan A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7 , 2007, Int. J. Netw. Secur..

[35]  Max J. Egenhofer,et al.  Determining Semantic Similarity among Entity Classes from Different Ontologies , 2003, IEEE Trans. Knowl. Data Eng..

[36]  York Sure-Vetter,et al.  Ontology Mapping - An Integrated Approach , 2004, ESWS.

[37]  Alban Gabillon,et al.  Enforcing Protection Mechanisms for Geographic Data , 2012, W2GIS.