期刊首页 优先出版 当期阅读 过刊浏览 作者中心 关于期刊 English

《工程(英文)》 >> 2018年 第4卷 第1期 doi: 10.1016/j.eng.2018.02.003

照片分享服务中的人际关系印象管理

a State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
b School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China

收稿日期: 2017-12-08 修回日期: 2017-12-23 录用日期: 2017-12-27 发布日期: 2018-02-14

下一篇 上一篇

摘要

随着社交网络和移动设备的发展,照片分享已成为一种非常流行的社交活动。由于人们在日常生活中希望展现一种积极的印象,照片分享中的印象管理已变得越来越重要。然而,大多数现有的隐私保护工作都存在两个问题:①为了建立一个合适的印象,用户必须由自己决定是否将照片分享给其他用户;②用户在分享合影照片时,隐含在合影中的人际关系信息也存在泄漏风险,如通过人脸的相对位置可以推断用户的情侣关系或者性倾向。本文提出了一种人际关系印象管理方案(SRIM),通过为用户自动推荐照片分享策略保护用户的关系隐私信息。具体来说,本文设计了一种轻量级的人脸距离测量方法,利用照片的元数据和人脸检测结果计算用户在合影中的实际距离,再通过关系印象评估算法对合影中的人际关系进行评估和管理。基于该方案,本文实现了一个原型系统,并邀请了21 位志愿者对系统的功能进行了验证,评估结果验证了该方案的有效性和效率。

图片

图1

图2

图3

图4

图5

图6

参考文献

[ 1 ] Hu H, Ahn GJ, Jorgensen J. Multiparty access control for online social networks: Model and mechanisms. IEEE Trans Knowl Data Eng 2013;25(7):1614–27. 链接1

[ 2 ] Zerr S, Siersdorfer S, Hare J, Demidova E. Privacy-aware image classification and search. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval; 2012 Aug 12–16; Portland, OR, USA; 2012. p. 35–44.

[ 3 ] Tran L, Kong D, Jin H, Liu J. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12–17; Phoenix, AZ, USA; 2016. p. 1317–23. 链接1

[ 4 ] Tonge AK, Caragea C. Image privacy prediction using deep features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12–17; Phoenix, AZ, USA; 2016. p. 4266–7. 链接1

[ 5 ] Xu K, Guo Y, Guo L, Fang Y, Li X. My privacy my decision: Control of photo sharing on online social networks. IEEE Trans Depend Secure Comput 2015;14 (2):199–210. 链接1

[ 6 ] Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S. Face/off: Preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security; 2015 Oct 12–16; Denver, CO, USA; 2015. p. 35–44. 链接1

[ 7 ] Besmer A, Lipford HR. Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2010 Apr 10–15; Atlanta, GA, USA; 2010. p. 1563–72. 链接1

[ 8 ] Klemperer P, Liang Y, Mazurek M, Sleeper M, Ur B, Bauer L, et al. Tag, you can see it! Using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2012 May 5–10; Austin, TX, USA; 2012. p. 377–86. 链接1

[ 9 ] Hoyle R, Templeman R, Anthony D, Crandall D, Kapadia A. Sensitive lifelogs: Aprivacy analysis of photos from wearable cameras. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems; 2015 Apr 18–23; Seoul, Korea; 2015. p. 1645–8. 链接1

[10] Yang Y, Ramanan D. Articulated pose estimation using flexible mixtures of parts. In: Proceedings of the 2011 IEEE Conference on Computer Vision and Pattern Recognition; 2011 Jun 20–25; Colorado Springs, CO, USA; 2011. p. 1385–92. 链接1

[11] Yang Y, Baker S, Kannan A, Ramanan D. Recognizing proxemics in personal photos. In: Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition; 2012; Jun 16–21; Providence, RI, USA; 2012. p. 3522–9. 链接1

[12] Fathi A, Hodgins JK, Rehg JM. Social interactions: A first-person perspective. In: Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition; 2012 Jun 16–21; Providence, RI, USA; 2012. p. 1226–33. 链接1

[13] Chakraborty I, Cheng H, Javed O. 3D visual proxemics: Recognizing human interactions in 3D from a single image. In: Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition; 2013 Jun 23–28; Portland, OR, USA; 2013. p. 3406–13.

[14] Liu B, Gould S, Koller D. Single image depth estimation from predicted semantic labels. In: Proceedings of the 2010 IEEE Conference on Computer Vision and Pattern Recognition; 2010 Jun 13–18; San Francisco, CA, USA; 2010. 链接1

[15] Fesnin A, Gouet-Brunet V, Kominen S, Oria V, Sun J. Towards a privacy preserving personal photo album manager with semantic classification, indexing and querying capabilities. In: Proceedings of the 19th ACM International Conference on Multimedia; 2011 Nov 28–Dec 1; Scottsdale, AZ, USA; 2011. p. 835–6. 链接1

[16] Yang M, Yu Y, Bandara AK, Nuseibeh B. Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications; 2014 Sep 24–26; Beijing, China; 2014. p. 45–52. F. Li et al. / Engineering 4 (2018) 85–93 链接1

[17] Pang J, Zhang Y. A new access control scheme for facebook-style social networks. Comput Secur 2015;54:44–59. 链接1

[18] Palomar E, Gonzalez-Manzano L, Alcaide A, Galán Á. Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management. IET Inf Secur 2016;10(2):60–8. 链接1

[19] Squicciarini AC, Lin D, Sundareswaran S, Wede J. Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans Knowl Data Eng 2015;27(1):193–206. 链接1

[20] Kairam S, Kaye J, Guerra-Gomez JA, Shamma DA. Snap decisions? How users, content, and aesthetics interact to shape photo sharing behaviors. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems; 2016 May 7–12; San Jose, CA, USA; 2016. p. 113–24. 链接1

[21] Ni M, Zhang Y, Han W, Pang J. An empirical study on user access control in online social networks. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies; 2016 Jun 6–8; Shanghai, China; 2016. p. 13–23. 链接1

[22] Goffman E. The presentation of self in everyday life. New York: Doubleday; 1959.

[23] Hall ET. The hidden dimension. New York: Doubleday; 1966.

[24] Besmer A, Lipford HR. Privacy perceptions of photo sharing in facebook. In: Proceedings of the Symposium on Usable Privacy and Security; 2008 Jul 23– 25; Pittsburgh, PA, USA; 2008. 链接1

[25] McAndrew FT, Jeong HS. Who does what on facebook? Age, sex, and relationship status as predictors of facebook use. Comput Human Behav 2012;28(6):2359–65. 链接1

[26] Fan H, Yang M, Cao Z, Jiang Y, Yin Q. Learning compact face representation: packing a face into an int32. In: Proceedings of the 22nd ACM International Conference on Multimedia; 2014 Nov 3–7; Orlando, FL, USA; 2014. p. 933–6. 链接1

[27] Hu H, Ahn GJ, Zhao Z, Yang D. Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM symposium on Access Control Models and Technologies; 2014 Jun 25–7; London, ON, Canada; 2014. p. 93–102. 链接1

[28] Taigman Y, Yang M, Ranzato M, Wolf L. Deepface: Closing the gap to human-level performance in face verification. In: Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition; 2014 Jun 23–28; Columbus, OH, USA; 2014. p. 1701–8. 链接1

相关研究