Skip to main content

Securing Image Posts in Social Networking Sites

  • Conference paper
  • First Online:
Computational Vision and Bio Inspired Computing

Part of the book series: Lecture Notes in Computational Vision and Biomechanics ((LNCVB,volume 28))

Abstract

The most unbeatable technology, Internet brings to people for communication is social networks. Starting from exchange of text messages it goes up to posting of images and videos in social networking sites which are viewed by many people. When these social networks are available to all the users for free, it will lead to various types of security issues. Image security has been a topic of research over decades. Enhancements to individual techniques and combinations proposed till date have offered different levels of security assurances. This paper aim to present a technique for secure sharing of image posts in social network. The significant feature of the scheme lies in the selection of security technique based on image content, evaluation of peers with whom the image can be shared based on text classification, transliteration and tone analysis. The proposed scheme a cost effective solution as it does not require any additional hardware. The utility of the model is demonstrated by mapping the scheme with Facebook and analyzing its performance through simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Echaiz, J., Ardenghi, J.R.: Security and online social networks. In: XV Congreso Argentino de Ciencias de la Computación (2009)

    Google Scholar 

  2. Harini, N., Surya Prabha, K..: ‘CHATGAURD’—a system that ensures safe posting in social networking sites. Int. J. Eng. Technol. (2016)

    Google Scholar 

  3. Metkar, S.P., Lichade, M.V.: Digital image security improvement by integrating watermarking and encryption technique. In: IEEE International Conference on Signal Processing, Computing and Control (ISPCC), pp. 1–6. IEEE (2013)

    Google Scholar 

  4. Liu, T.Y., Tsai, W.H.: Generic lossless visible watermarking—a new approach. IEEE Trans. Image Process. 1224–1235 (2010)

    Google Scholar 

  5. Harini, N., Padmanabhan, T.R.: 3C-Auth: a new scheme for enhancing security. Int. J. Netw. Secur. 18(1), 143–150 (2016)

    Google Scholar 

  6. Saini, J.K., Verma, H.K.: A hybrid approach for image security by combining encryption and steganography. IEEE Second International Conference Image Information Processing (ICIIP), pp. 607–611. IEEE (2013)

    Google Scholar 

  7. Padiya, I., Manure, V., Vidhate, A.: Visual secret sharing scheme using encrypting multiple images. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. (2015)

    Google Scholar 

  8. Omanakuttan, S., Chatterjee, M.: Experimental analysis on access control using trust parameter for social network. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 551–562 (2014)

    Google Scholar 

  9. Ceolin, D., et al.: Trust evaluation through user reputation and provenance analysis. In: Proceedings of the 8th International Conference on Uncertainty Reasoning for the Semantic Web-Volume 900. CEUR-WS.org (2012)

    Google Scholar 

  10. Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Comput. 56–63 (2011)

    Google Scholar 

  11. Joe, M.M., Ramakrishnan, D.B.: A survey of various security issues in online social networks. Int. J. Comput. Netw. Appl. 1(1), 11–14 (2014)

    Google Scholar 

  12. Harini, N.: A system to screen posts that minimize user frustration. Int. J. Appl. Eng. Res. 11(6), 3944–3949 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. R. Neethu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Neethu, M.R., Harini, N. (2018). Securing Image Posts in Social Networking Sites. In: Hemanth, D., Smys, S. (eds) Computational Vision and Bio Inspired Computing . Lecture Notes in Computational Vision and Biomechanics, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-71767-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71767-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71766-1

  • Online ISBN: 978-3-319-71767-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics