Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Engineering >> 2018, Volume 4, Issue 1 doi: 10.1016/j.eng.2018.02.003

SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

a State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
b School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China

Received: 2017-12-08 Revised: 2017-12-23 Accepted: 2017-12-27 Available online: 2018-02-14

Next Previous

Abstract

With the development of online social networks (OSNs) and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM) scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme.

Figures

Fig.1

Fig.2

Fig.3

Fig.4

Fig.5

Fig.6

References

[ 1 ] Hu H, Ahn GJ, Jorgensen J. Multiparty access control for online social networks: Model and mechanisms. IEEE Trans Knowl Data Eng 2013;25(7):1614–27. link1

[ 2 ] Zerr S, Siersdorfer S, Hare J, Demidova E. Privacy-aware image classification and search. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval; 2012 Aug 12–16; Portland, OR, USA; 2012. p. 35–44.

[ 3 ] Tran L, Kong D, Jin H, Liu J. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12–17; Phoenix, AZ, USA; 2016. p. 1317–23. link1

[ 4 ] Tonge AK, Caragea C. Image privacy prediction using deep features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12–17; Phoenix, AZ, USA; 2016. p. 4266–7. link1

[ 5 ] Xu K, Guo Y, Guo L, Fang Y, Li X. My privacy my decision: Control of photo sharing on online social networks. IEEE Trans Depend Secure Comput 2015;14 (2):199–210. link1

[ 6 ] Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S. Face/off: Preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security; 2015 Oct 12–16; Denver, CO, USA; 2015. p. 35–44. link1

[ 7 ] Besmer A, Lipford HR. Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2010 Apr 10–15; Atlanta, GA, USA; 2010. p. 1563–72. link1

[ 8 ] Klemperer P, Liang Y, Mazurek M, Sleeper M, Ur B, Bauer L, et al. Tag, you can see it! Using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2012 May 5–10; Austin, TX, USA; 2012. p. 377–86. link1

[ 9 ] Hoyle R, Templeman R, Anthony D, Crandall D, Kapadia A. Sensitive lifelogs: Aprivacy analysis of photos from wearable cameras. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems; 2015 Apr 18–23; Seoul, Korea; 2015. p. 1645–8. link1

[10] Yang Y, Ramanan D. Articulated pose estimation using flexible mixtures of parts. In: Proceedings of the 2011 IEEE Conference on Computer Vision and Pattern Recognition; 2011 Jun 20–25; Colorado Springs, CO, USA; 2011. p. 1385–92. link1

[11] Yang Y, Baker S, Kannan A, Ramanan D. Recognizing proxemics in personal photos. In: Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition; 2012; Jun 16–21; Providence, RI, USA; 2012. p. 3522–9. link1

[12] Fathi A, Hodgins JK, Rehg JM. Social interactions: A first-person perspective. In: Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition; 2012 Jun 16–21; Providence, RI, USA; 2012. p. 1226–33. link1

[13] Chakraborty I, Cheng H, Javed O. 3D visual proxemics: Recognizing human interactions in 3D from a single image. In: Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition; 2013 Jun 23–28; Portland, OR, USA; 2013. p. 3406–13.

[14] Liu B, Gould S, Koller D. Single image depth estimation from predicted semantic labels. In: Proceedings of the 2010 IEEE Conference on Computer Vision and Pattern Recognition; 2010 Jun 13–18; San Francisco, CA, USA; 2010. link1

[15] Fesnin A, Gouet-Brunet V, Kominen S, Oria V, Sun J. Towards a privacy preserving personal photo album manager with semantic classification, indexing and querying capabilities. In: Proceedings of the 19th ACM International Conference on Multimedia; 2011 Nov 28–Dec 1; Scottsdale, AZ, USA; 2011. p. 835–6. link1

[16] Yang M, Yu Y, Bandara AK, Nuseibeh B. Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications; 2014 Sep 24–26; Beijing, China; 2014. p. 45–52. F. Li et al. / Engineering 4 (2018) 85–93 link1

[17] Pang J, Zhang Y. A new access control scheme for facebook-style social networks. Comput Secur 2015;54:44–59. link1

[18] Palomar E, Gonzalez-Manzano L, Alcaide A, Galán Á. Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management. IET Inf Secur 2016;10(2):60–8. link1

[19] Squicciarini AC, Lin D, Sundareswaran S, Wede J. Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans Knowl Data Eng 2015;27(1):193–206. link1

[20] Kairam S, Kaye J, Guerra-Gomez JA, Shamma DA. Snap decisions? How users, content, and aesthetics interact to shape photo sharing behaviors. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems; 2016 May 7–12; San Jose, CA, USA; 2016. p. 113–24. link1

[21] Ni M, Zhang Y, Han W, Pang J. An empirical study on user access control in online social networks. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies; 2016 Jun 6–8; Shanghai, China; 2016. p. 13–23. link1

[22] Goffman E. The presentation of self in everyday life. New York: Doubleday; 1959.

[23] Hall ET. The hidden dimension. New York: Doubleday; 1966.

[24] Besmer A, Lipford HR. Privacy perceptions of photo sharing in facebook. In: Proceedings of the Symposium on Usable Privacy and Security; 2008 Jul 23– 25; Pittsburgh, PA, USA; 2008. link1

[25] McAndrew FT, Jeong HS. Who does what on facebook? Age, sex, and relationship status as predictors of facebook use. Comput Human Behav 2012;28(6):2359–65. link1

[26] Fan H, Yang M, Cao Z, Jiang Y, Yin Q. Learning compact face representation: packing a face into an int32. In: Proceedings of the 22nd ACM International Conference on Multimedia; 2014 Nov 3–7; Orlando, FL, USA; 2014. p. 933–6. link1

[27] Hu H, Ahn GJ, Zhao Z, Yang D. Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM symposium on Access Control Models and Technologies; 2014 Jun 25–7; London, ON, Canada; 2014. p. 93–102. link1

[28] Taigman Y, Yang M, Ranzato M, Wolf L. Deepface: Closing the gap to human-level performance in face verification. In: Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition; 2014 Jun 23–28; Columbus, OH, USA; 2014. p. 1701–8. link1

Related Research