Skip to main content

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media

  • Conference paper
  • First Online:
Web Information Systems Engineering – WISE 2017 (WISE 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10570))

Included in the following conference series:

Abstract

In social media such as Facebook, the sharing of photos among users is common and enjoyable but also very dangerous when the uploader posts photo online without the consents from other participants in the same photo. As a solution, recent research has developed a fine-grained access control on social media photos. Every participant will be tagged by the uploader and notified through internal messages to initialise their own access control strategies. The appearance of participants will be blurred if they want to preserve their own privacy in a photo. However, these methods highly depend on the uploader’s reputation of tagging behaviours. Adversaries can easily manipulate unpermitted tagging processes and then publish photos, which should have kept confidential to the public in social media. In order to solve this critical problem, we propose developing a participant-free tagging system for social media photos. This system excludes potential adversaries through automatic tagging processes over two cascading stages: (1) participants are tagged through internal searching which is based on the portrait samples collected in initialisation stage for every new user; (2) the remaining untagged participants will be identified cooperatively through tagged users. In the evaluation, we carried out a series of experiments to validate our system’s efficiency and effectiveness. All the results demonstrate the tagging efficiency and effectiveness in protecting users’ privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., Beaton, M.: Teens, social media, and privacy. Pew Research Center, May 2013

    Google Scholar 

  2. Kathrin, K., Baran, K.S.: Facets of Facebook: Use and Users. Walter de Gruyter & Co., Hawthorne, NJ, USA (2016). 3110419351, 9783110419351

    Google Scholar 

  3. Kaszubska, G.: Not just revenge porn image-based abuse hits 1 in 5 Australians. RMIT, October 2017

    Google Scholar 

  4. Jansons, P.: Businesses use social media to screen job candidates. CareerBuilder, April 2016

    Google Scholar 

  5. Bort, J.: A high school coach was fired for this Facebook photo. Business, November 2013

    Google Scholar 

  6. Smith, A.: 6 new facts about Facebook. Pew Research Center, February 2014

    Google Scholar 

  7. Trenholm, R.: Most Facebook photos are taken while we’re drunk, survey says. CNET, December 2011

    Google Scholar 

  8. Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., Ioannidis, S.: Face/off: Preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 781–792. ACM (2015)

    Google Scholar 

  9. Liridona, G., Kathrin, K.: Chapter 1. Unfriending and becoming unfriended on Facebook, January 2016

    Google Scholar 

  10. Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)

    Article  Google Scholar 

  11. Enamul Kabir, M., Wang, H., Bertino, E.: A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3), 1482–1489 (2011)

    Article  Google Scholar 

  12. Squicciarini, A.C., Sundareswaran, S., Lin, D., Wede, J.: A3P: adaptive policy prediction for shared images over popular content sharing sites. In: Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia, HT 2011, pp. 261–270. ACM, New York (2011)

    Google Scholar 

  13. Bounan, B.A., Chbeir, R., Gabillon, A., Capolsin, P.: A flexible image-based access control model for social networks. In: Chbeir, R., Al Bouna, B. (eds.) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks, pp. 337–364. Springer, Vienna (2013). doi:10.1007/978-3-7091-0894-9_11

    Google Scholar 

  14. Such, J.M., Rovatsos, M.: Privacy policy negotiation in social media. ACM Trans. Auton. Adapt. Syst. 11(1), 4:1–4:29 (2016)

    Article  Google Scholar 

  15. Xu, K., Xiong, G., Guo, L., Fang, Y., Li, X.: My privacy my decision: control of photo sharing on online social networks. IEEE Trans. Dependable Secure Comput. 14, 199–210 (2017). IEEE

    Article  Google Scholar 

  16. Such, J., Porter, J., Preibusch, S., Joinson, A.: Photo privacy conflicts in social media: a large-scale empirical study, January 2017

    Google Scholar 

  17. Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, pp. 1563–1572. ACM, New York (2010)

    Google Scholar 

  18. Hu, H., Ahn, G.-J., Jorgensen, J.: Enabling collaborative data sharing in Google+. In: IEEE Global Communications Conference, ACSAC 2011, pp. 103–112. ACM (2012)

    Google Scholar 

  19. Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, pp. 521–530. ACM (2009)

    Google Scholar 

  20. Cutillo, L.A., Molva, R., Önen, M.: Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks. In: Proceedings of the Fifth Workshop on Social Network Systems, SNS 2012, pp. 6:1–6:6. ACM (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheng Wen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Tang, L., Ma, W., Wen, S., Grobler, M., Xiang, Y., Zhou, W. (2017). My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media. In: Bouguettaya, A., et al. Web Information Systems Engineering – WISE 2017. WISE 2017. Lecture Notes in Computer Science(), vol 10570. Springer, Cham. https://doi.org/10.1007/978-3-319-68786-5_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68786-5_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68785-8

  • Online ISBN: 978-3-319-68786-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics