Abstract
The most unbeatable technology, Internet brings to people for communication is social networks. Starting from exchange of text messages it goes up to posting of images and videos in social networking sites which are viewed by many people. When these social networks are available to all the users for free, it will lead to various types of security issues. Image security has been a topic of research over decades. Enhancements to individual techniques and combinations proposed till date have offered different levels of security assurances. This paper aim to present a technique for secure sharing of image posts in social network. The significant feature of the scheme lies in the selection of security technique based on image content, evaluation of peers with whom the image can be shared based on text classification, transliteration and tone analysis. The proposed scheme a cost effective solution as it does not require any additional hardware. The utility of the model is demonstrated by mapping the scheme with Facebook and analyzing its performance through simulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Echaiz, J., Ardenghi, J.R.: Security and online social networks. In: XV Congreso Argentino de Ciencias de la Computación (2009)
Harini, N., Surya Prabha, K..: ‘CHATGAURD’—a system that ensures safe posting in social networking sites. Int. J. Eng. Technol. (2016)
Metkar, S.P., Lichade, M.V.: Digital image security improvement by integrating watermarking and encryption technique. In: IEEE International Conference on Signal Processing, Computing and Control (ISPCC), pp. 1–6. IEEE (2013)
Liu, T.Y., Tsai, W.H.: Generic lossless visible watermarking—a new approach. IEEE Trans. Image Process. 1224–1235 (2010)
Harini, N., Padmanabhan, T.R.: 3C-Auth: a new scheme for enhancing security. Int. J. Netw. Secur. 18(1), 143–150 (2016)
Saini, J.K., Verma, H.K.: A hybrid approach for image security by combining encryption and steganography. IEEE Second International Conference Image Information Processing (ICIIP), pp. 607–611. IEEE (2013)
Padiya, I., Manure, V., Vidhate, A.: Visual secret sharing scheme using encrypting multiple images. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. (2015)
Omanakuttan, S., Chatterjee, M.: Experimental analysis on access control using trust parameter for social network. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 551–562 (2014)
Ceolin, D., et al.: Trust evaluation through user reputation and provenance analysis. In: Proceedings of the 8th International Conference on Uncertainty Reasoning for the Semantic Web-Volume 900. CEUR-WS.org (2012)
Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Comput. 56–63 (2011)
Joe, M.M., Ramakrishnan, D.B.: A survey of various security issues in online social networks. Int. J. Comput. Netw. Appl. 1(1), 11–14 (2014)
Harini, N.: A system to screen posts that minimize user frustration. Int. J. Appl. Eng. Res. 11(6), 3944–3949 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Neethu, M.R., Harini, N. (2018). Securing Image Posts in Social Networking Sites. In: Hemanth, D., Smys, S. (eds) Computational Vision and Bio Inspired Computing . Lecture Notes in Computational Vision and Biomechanics, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-71767-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-71767-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71766-1
Online ISBN: 978-3-319-71767-8
eBook Packages: EngineeringEngineering (R0)