Filters








91 Hits in 3.9 sec

Thumbnail-Preserving Encryption for JPEG

Charles V. Wright, Wu-chi Feng, Feng Liu
2015 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '15  
Experiments of the proposed approach using an online selfie database show that it can achieve a good balance of privacy, utility, image quality, and file size.  ...  With more and more data being stored in the cloud, securing multimedia data is becoming increasingly important.  ...  Experiments with a data set of real selfie images from the web show that, by selecting an appropriate block size, we can achieve a good balance between convenience, privacy, image quality, and file size  ... 
doi:10.1145/2756601.2756618 dblp:conf/ih/WrightFL15 fatcat:2ectannhoveajggy2qgkl4tvkq

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks [article]

Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou
2021 arXiv   pre-print
At each stage, we identify typical user behaviors in OSN image sharing and the privacy issues associated with these behaviors.  ...  Specifically, we present a definition and a taxonomy of OSN image privacy, and a high-level privacy analysis framework based on the lifecycle of OSN image sharing.  ...  Privacyrespecting browsing [192] 2019 Formatpreserving encryption Proposed a thumbnail-preserving encryption strategy to balance usability and privacy in privacy-respecting browsing [194] 2016 Distortion  ... 
arXiv:2008.12199v2 fatcat:vxv6rsnyavesjiw2bbnc4jzsiy

Cryptagram

Matt Tierney, Ian Spiro, Christoph Bregler, Lakshminarayanan Subramanian
2013 Proceedings of the first ACM conference on Online social networks - COSN '13  
Cryptagram guarantees that the recipient with the right credentials can completely retrieve the original image from the transformed version of the uploaded encrypted image while the OSN cannot infer the  ...  OSNs apply standard image transformations (JPEG compression) to all uploaded images so Cryptagram provides an image encoding and encryption mechanism that is tolerant to these transformations.  ...  Acknowledgments: We would like to thank Helen Nissenbaum, Alex Rubinsteyn, David Iserovich, the members of the NYU Networking and Wide-area Systems Group, the members of the NYU Privacy Research Group,  ... 
doi:10.1145/2512938.2512939 dblp:conf/cosn/TierneySBS13 fatcat:67msp336uvas5ewyaljbw3uxyq

On the (Im)Practicality of Adversarial Perturbation for Image Privacy

Arezoo Rajabi, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng
2021 Proceedings on Privacy Enhancing Technologies  
AbstractImage hosting platforms are a popular way to store and share images with family members and friends. However, such platforms typically have full access to images raising privacy concerns.  ...  These concerns are further exacerbated with the advent of Convolutional Neural Networks (CNNs) that can be trained on available images to automatically detect and recognize faces with high accuracy.Recently  ...  Thumbnail Preserving Encryption (TPE) schemes [44, 74, 78] have been proposed to preserve privacy of images while allowing image owners to distinguish between ciphertexts of different images naturally  ... 
doi:10.2478/popets-2021-0006 fatcat:jo2rhutycnachcg2n3hendciwq

Beeswax: a platform for private web apps

Jean-Sébastien Légaré, Robert Sumi, William Aiello
2016 Proceedings on Privacy Enhancing Technologies  
This focuses scrutiny and trust on the platform itself, rather than on all the applications using it.  ...  Acknowledgements We would like to thank Arthur Loris for contributions to the implementation, as well as our shepherd, David Fifield, and reviewers for their invaluable feedback.  ...  First, having no capability to reduce images to thumbnails, PicSure renders album photos as full resolution images.  ... 
doi:10.1515/popets-2016-0014 dblp:journals/popets/LegareSA16 fatcat:zohfxak72jfsrjxmwgs24mitae

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues

Maria Stoyanova, Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Pallis, Evangelos K. Markakis
2020 IEEE Communications Surveys and Tutorials  
A further challenge is the end-to-end encryption which represents a trade-off between users' right to privacy and the success of the forensics investigation.  ...  Special attention is paid to frameworks that aim to extract data in a privacy-preserving manner or secure the evidence integrity using decentralized blockchain-based solutions.  ...  Finding the balance between preserving users' privacy and obtaining key evidence will continue to be a major challenge in the field of Digital Forensics.  ... 
doi:10.1109/comst.2019.2962586 fatcat:crd72xiwnzekjkaf4xkrixvpsu

Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents

Ira Rubinstein, Nathan Good
2012 Social Science Research Network  
To begin with, regulators must ensure that when companies balance privacy design requirements against business objectives, they adhere to the well-established engineering and usability principles discussed  ...  Tygar, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, in SECURITY AND USABILITY, supra note 94, at 669 (arguing that effective computer security measures require enhanced and particularized  ... 
doi:10.2139/ssrn.2128146 fatcat:kwowtarpa5e4jbhizbuagepfne

Privacy and security in online social networks: A survey

Imrul Kayes, Adriana Iamnitchi
2017 Online Social Networks and Media  
This article provides an overview of the privacy and security issues that emerged so far in OSNs.  ...  We introduce a taxonomy of privacy and security attacks in OSNs, we overview existing solutions to mitigate those attacks, and outline challenges still to overcome.  ...  However, this substitution is not sufficient to preserve users' privacy.  ... 
doi:10.1016/j.osnem.2017.09.001 fatcat:xme5wwkyfbhnpgoiwgadknageq

Interfaces and tools for the library of congress national digital library program

Gary Marchionini, Catherine Plaisant, Anita Komlodi
1998 Information Processing & Management  
Interfaces were guided by an assessment of user needs and aimed to maximize interaction with primary resources and support both browsing and analytical search strategies.  ...  Digital Libraries (DL) offer new challenges to an emerging breed of digital librarians who must combine the principles and practices of information management with rapidly evolving technological developments  ...  ( Figure 6b) or the full resolution image(Figure 6a). Selected images shown with their flag up are collected in the bottom frame as thumbnails and can be saved on-the-fly in a personal web page.  ... 
doi:10.1016/s0306-4573(98)00020-x fatcat:yajtgbqclrfdha64pbp6ywetjq

The language of privacy

Michael Boyle, Saul Greenberg
2005 ACM Transactions on Computer-Human Interaction  
Although there are techniques proposed to preserve privacy in video media spaces, e.g., video blurring, their effectiveness and usability are not known.  ...  This thesis informs the design and development of video media spaces that enrich distributed collaboration and preserve privacy.  ...  As indicated in Table 4 .2, this balance of awareness and privacy occurs at level 5 with the blur filter.  ... 
doi:10.1145/1067860.1067868 fatcat:zrkyacghsfdmzpn6zm7r442bke

Fast and Fuzzy Private Set Intersection [article]

Nicholas Kersting
2014 arXiv   pre-print
This is demonstrated in the case where the sets consist of English words processed with WordNet.  ...  encrypted once, after which each pair of users need only one ordinary set comparison.  ...  Standard compression tools can further reduce that by a factor of several [10] ; in this way most encrypted messages typically take the space of a thumbnail image.  ... 
arXiv:1405.3272v2 fatcat:urxgckegcvac5nywvp7uoegoxi

Here's what i did

Ian Li, Jeffrey Nichols, Tessa Lau, Clemens Drews, Allen Cypher
2010 Proceedings of the 28th international conference on Human factors in computing systems - CHI '10  
In this paper, we describe the ActionShot and our initial explorations of the tool through field deployments within our organization and a lab study.  ...  ActionShot provides interfaces to facilitate browsing and searching through this history, sharing portions of the history through established social networking tools such as Facebook, and creating scripts  ...  ACKNOWLEDGMENTS We would like to thank all of the participants in our user studies and the reviewers for their helpful comments.  ... 
doi:10.1145/1753326.1753432 dblp:conf/chi/LiNLDC10 fatcat:zwtjhy7hpjftrpcftgtxmavxum

Accessing the spoken word

Jerry Goldman, Steve Renals, Steven Bird, Franciska de Jong, Marcello Federico, Carl Fleischhauer, Mark Kornbluh, Lori Lamel, Douglas W. Oard, Claire Stewart, Richard Wright
2005 International Journal on Digital Libraries  
the collection and preservation of spoken audio content.  ...  The collection, access and preservation of such data is stimulated by political, economic, cultural and educational needs.  ...  The working group was co-chaired by Jerry Goldman and Steve Renals, and met twice in Evanston IL, USA (June 2002) and in Delft, NL (September 2002).  ... 
doi:10.1007/s00799-004-0101-0 fatcat:smhkfrkbrjbq7pepyd3wyl37yq

Easy Encryption for Email, Photo, and Other Cloud Services

John Seunghyun Koh
2021
I design, implement, and evaluate three client-side encryption schemes supported by PDK, with a focus on designing around usability to bring transparent encryption to users.  ...  is transparent and largely unnoticeable to users even on multiple devices, and encryption can be used with existing services without any server-side modifications.  ...  Like CONIKS, EDP uses a prefix tree structure with privacy-preserving index keys, but the purpose and motivations differ.  ... 
doi:10.7916/d8-40ce-qn14 fatcat:mryc5fruojgttot57unwakr2dq

Improving Smartphone Security and Reliability

IULIAN NEAMTIU, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, ZHIYONG SHAN
2017 Journal of Interconnection Networks (JOIN)  
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing.  ...  Developing these tools has required surmounting many challenges unique to the smartphone platform: dealing with input non-determinism in sensor-oriented apps, non-standard control flow, low-overhead yet  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
doi:10.1142/s0219265917400023 fatcat:yq7yda6d4ras7a75jr33mzm3la
« Previous Showing results 1 — 15 out of 91 results