Securing Image Posts in Social Networking Sites

  • M. R. NeethuEmail author
  • N. Harini
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 28)


The most unbeatable technology, Internet brings to people for communication is social networks. Starting from exchange of text messages it goes up to posting of images and videos in social networking sites which are viewed by many people. When these social networks are available to all the users for free, it will lead to various types of security issues. Image security has been a topic of research over decades. Enhancements to individual techniques and combinations proposed till date have offered different levels of security assurances. This paper aim to present a technique for secure sharing of image posts in social network. The significant feature of the scheme lies in the selection of security technique based on image content, evaluation of peers with whom the image can be shared based on text classification, transliteration and tone analysis. The proposed scheme a cost effective solution as it does not require any additional hardware. The utility of the model is demonstrated by mapping the scheme with Facebook and analyzing its performance through simulation.


Image security Peer recommender Online social network Secure sharing Tone analysis 


  1. 1.
    Echaiz, J., Ardenghi, J.R.: Security and online social networks. In: XV Congreso Argentino de Ciencias de la Computación (2009)Google Scholar
  2. 2.
    Harini, N., Surya Prabha, K..: ‘CHATGAURD’—a system that ensures safe posting in social networking sites. Int. J. Eng. Technol. (2016)Google Scholar
  3. 3.
    Metkar, S.P., Lichade, M.V.: Digital image security improvement by integrating watermarking and encryption technique. In: IEEE International Conference on Signal Processing, Computing and Control (ISPCC), pp. 1–6. IEEE (2013)Google Scholar
  4. 4.
    Liu, T.Y., Tsai, W.H.: Generic lossless visible watermarking—a new approach. IEEE Trans. Image Process. 1224–1235 (2010)Google Scholar
  5. 5.
    Harini, N., Padmanabhan, T.R.: 3C-Auth: a new scheme for enhancing security. Int. J. Netw. Secur. 18(1), 143–150 (2016)Google Scholar
  6. 6.
    Saini, J.K., Verma, H.K.: A hybrid approach for image security by combining encryption and steganography. IEEE Second International Conference Image Information Processing (ICIIP), pp. 607–611. IEEE (2013)Google Scholar
  7. 7.
    Padiya, I., Manure, V., Vidhate, A.: Visual secret sharing scheme using encrypting multiple images. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. (2015)Google Scholar
  8. 8.
    Omanakuttan, S., Chatterjee, M.: Experimental analysis on access control using trust parameter for social network. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 551–562 (2014)Google Scholar
  9. 9.
    Ceolin, D., et al.: Trust evaluation through user reputation and provenance analysis. In: Proceedings of the 8th International Conference on Uncertainty Reasoning for the Semantic Web-Volume 900. (2012)Google Scholar
  10. 10.
    Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Comput. 56–63 (2011)Google Scholar
  11. 11.
    Joe, M.M., Ramakrishnan, D.B.: A survey of various security issues in online social networks. Int. J. Comput. Netw. Appl. 1(1), 11–14 (2014)Google Scholar
  12. 12.
    Harini, N.: A system to screen posts that minimize user frustration. Int. J. Appl. Eng. Res. 11(6), 3944–3949 (2016)Google Scholar

Copyright information

© Springer International Publishing AG  2018

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, Amrita School of EngineeringAmrita Vishwa Vidyapeetham, Amrita UniversityCoimbatoreIndia

Personalised recommendations