
SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users
Fenghua Li, Zhe Sun, Ben Niu, Yunchuan Guo, Ziwen Liu
Engineering ›› 2018, Vol. 4 ›› Issue (1) : 85-93.
SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users
With the development of online social networks (OSNs) and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM) scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme.
Impression management / Relational privacy / Photo sharing / Policy recommendation / Proxemics
[1] |
|
[2] |
|
[3] |
Tran L, Kong D, Jin H, Liu J. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12-17; Phoenix, AZ, USA; 2016. p. 1317-23.
|
[4] |
|
[5] |
|
[6] |
Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S. Face/off: Preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security; 2015 Oct 12-16; Denver, CO, USA; 2015. p. 35-44.
|
[7] |
Besmer A, Lipford HR. Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2010 Apr 10-15; Atlanta, GA, USA; 2010. p. 1563-72.
|
[8] |
Klemperer P, Liang Y, Mazurek M, Sleeper M, Ur B, Bauer L, et al. Tag, you can see it! Using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2012 May 5-10; Austin, TX, USA; 2012. p. 377-86.
|
[9] |
Hoyle R, Templeman R, Anthony D, Crandall D, Kapadia A. Sensitive lifelogs: A privacy analysis of photos from wearable cameras. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems; 2015 Apr 18-23; Seoul, Korea; 2015. p. 1645-8.
|
[10] |
|
[11] |
|
[12] |
Fathi A, Hodgins JK, Rehg JM. Social interactions: A first-person perspective. In: Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition; 2012 Jun 16-21; Providence, RI, USA; 2012. p. 1226-33.
|
[13] |
|
[14] |
|
[15] |
|
[16] |
Yang M, Yu Y, Bandara AK, Nuseibeh B. Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications; 2014 Sep 24-26; Beijing, China; 2014. p. 45-52.
|
[17] |
|
[18] |
|
[19] |
|
[20] |
|
[21] |
|
[22] |
|
[23] |
|
[24] |
|
[25] |
|
[26] |
|
[27] |
|
[28] |
Taigman Y, Yang M, Ranzato M, Wolf L. Deepface: Closing the gap to human-level performance in face verification. In: Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition; 2014 Jun 23-28; Columbus, OH, USA; 2014. p. 1701-8.
|
/
〈 |
|
〉 |