A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Thumbnail-Preserving Encryption for JPEG
2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '15
Experiments of the proposed approach using an online selfie database show that it can achieve a good balance of privacy, utility, image quality, and file size. ...
With more and more data being stored in the cloud, securing multimedia data is becoming increasingly important. ...
Experiments with a data set of real selfie images from the web show that, by selecting an appropriate block size, we can achieve a good balance between convenience, privacy, image quality, and file size ...
doi:10.1145/2756601.2756618
dblp:conf/ih/WrightFL15
fatcat:2ectannhoveajggy2qgkl4tvkq
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks
[article]
2021
arXiv
pre-print
At each stage, we identify typical user behaviors in OSN image sharing and the privacy issues associated with these behaviors. ...
Specifically, we present a definition and a taxonomy of OSN image privacy, and a high-level privacy analysis framework based on the lifecycle of OSN image sharing. ...
Privacyrespecting browsing [192] 2019 Formatpreserving encryption Proposed a thumbnail-preserving encryption strategy to balance usability and privacy in privacy-respecting browsing [194] 2016 Distortion ...
arXiv:2008.12199v2
fatcat:vxv6rsnyavesjiw2bbnc4jzsiy
Cryptagram guarantees that the recipient with the right credentials can completely retrieve the original image from the transformed version of the uploaded encrypted image while the OSN cannot infer the ...
OSNs apply standard image transformations (JPEG compression) to all uploaded images so Cryptagram provides an image encoding and encryption mechanism that is tolerant to these transformations. ...
Acknowledgments: We would like to thank Helen Nissenbaum, Alex Rubinsteyn, David Iserovich, the members of the NYU Networking and Wide-area Systems Group, the members of the NYU Privacy Research Group, ...
doi:10.1145/2512938.2512939
dblp:conf/cosn/TierneySBS13
fatcat:67msp336uvas5ewyaljbw3uxyq
On the (Im)Practicality of Adversarial Perturbation for Image Privacy
2021
Proceedings on Privacy Enhancing Technologies
AbstractImage hosting platforms are a popular way to store and share images with family members and friends. However, such platforms typically have full access to images raising privacy concerns. ...
These concerns are further exacerbated with the advent of Convolutional Neural Networks (CNNs) that can be trained on available images to automatically detect and recognize faces with high accuracy.Recently ...
Thumbnail Preserving Encryption (TPE) schemes [44, 74, 78] have been proposed to preserve privacy of images while allowing image owners to distinguish between ciphertexts of different images naturally ...
doi:10.2478/popets-2021-0006
fatcat:jo2rhutycnachcg2n3hendciwq
Beeswax: a platform for private web apps
2016
Proceedings on Privacy Enhancing Technologies
This focuses scrutiny and trust on the platform itself, rather than on all the applications using it. ...
Acknowledgements We would like to thank Arthur Loris for contributions to the implementation, as well as our shepherd, David Fifield, and reviewers for their invaluable feedback. ...
First, having no capability to reduce images to thumbnails, PicSure renders album photos as full resolution images. ...
doi:10.1515/popets-2016-0014
dblp:journals/popets/LegareSA16
fatcat:zohfxak72jfsrjxmwgs24mitae
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues
2020
IEEE Communications Surveys and Tutorials
A further challenge is the end-to-end encryption which represents a trade-off between users' right to privacy and the success of the forensics investigation. ...
Special attention is paid to frameworks that aim to extract data in a privacy-preserving manner or secure the evidence integrity using decentralized blockchain-based solutions. ...
Finding the balance between preserving users' privacy and obtaining key evidence will continue to be a major challenge in the field of Digital Forensics. ...
doi:10.1109/comst.2019.2962586
fatcat:crd72xiwnzekjkaf4xkrixvpsu
Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents
2012
Social Science Research Network
To begin with, regulators must ensure that when companies balance privacy design requirements against business objectives, they adhere to the well-established engineering and usability principles discussed ...
Tygar, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, in SECURITY AND USABILITY, supra note 94, at 669 (arguing that effective computer security measures require enhanced and particularized ...
doi:10.2139/ssrn.2128146
fatcat:kwowtarpa5e4jbhizbuagepfne
Privacy and security in online social networks: A survey
2017
Online Social Networks and Media
This article provides an overview of the privacy and security issues that emerged so far in OSNs. ...
We introduce a taxonomy of privacy and security attacks in OSNs, we overview existing solutions to mitigate those attacks, and outline challenges still to overcome. ...
However, this substitution is not sufficient to preserve users' privacy. ...
doi:10.1016/j.osnem.2017.09.001
fatcat:xme5wwkyfbhnpgoiwgadknageq
Interfaces and tools for the library of congress national digital library program
1998
Information Processing & Management
Interfaces were guided by an assessment of user needs and aimed to maximize interaction with primary resources and support both browsing and analytical search strategies. ...
Digital Libraries (DL) offer new challenges to an emerging breed of digital librarians who must combine the principles and practices of information management with rapidly evolving technological developments ...
( Figure 6b) or the full resolution image(Figure 6a). Selected images shown with their flag up are collected in the bottom frame as thumbnails and can be saved on-the-fly in a personal web page. ...
doi:10.1016/s0306-4573(98)00020-x
fatcat:yajtgbqclrfdha64pbp6ywetjq
The language of privacy
2005
ACM Transactions on Computer-Human Interaction
Although there are techniques proposed to preserve privacy in video media spaces, e.g., video blurring, their effectiveness and usability are not known. ...
This thesis informs the design and development of video media spaces that enrich distributed collaboration and preserve privacy. ...
As indicated in Table 4 .2, this balance of awareness and privacy occurs at level 5 with the blur filter. ...
doi:10.1145/1067860.1067868
fatcat:zrkyacghsfdmzpn6zm7r442bke
Fast and Fuzzy Private Set Intersection
[article]
2014
arXiv
pre-print
This is demonstrated in the case where the sets consist of English words processed with WordNet. ...
encrypted once, after which each pair of users need only one ordinary set comparison. ...
Standard compression tools can further reduce that by a factor of several [10] ; in this way most encrypted messages typically take the space of a thumbnail image. ...
arXiv:1405.3272v2
fatcat:urxgckegcvac5nywvp7uoegoxi
Here's what i did
2010
Proceedings of the 28th international conference on Human factors in computing systems - CHI '10
In this paper, we describe the ActionShot and our initial explorations of the tool through field deployments within our organization and a lab study. ...
ActionShot provides interfaces to facilitate browsing and searching through this history, sharing portions of the history through established social networking tools such as Facebook, and creating scripts ...
ACKNOWLEDGMENTS We would like to thank all of the participants in our user studies and the reviewers for their helpful comments. ...
doi:10.1145/1753326.1753432
dblp:conf/chi/LiNLDC10
fatcat:zwtjhy7hpjftrpcftgtxmavxum
Accessing the spoken word
2005
International Journal on Digital Libraries
the collection and preservation of spoken audio content. ...
The collection, access and preservation of such data is stimulated by political, economic, cultural and educational needs. ...
The working group was co-chaired by Jerry Goldman and Steve Renals, and met twice in Evanston IL, USA (June 2002) and in Delft, NL (September 2002). ...
doi:10.1007/s00799-004-0101-0
fatcat:smhkfrkbrjbq7pepyd3wyl37yq
Easy Encryption for Email, Photo, and Other Cloud Services
2021
I design, implement, and evaluate three client-side encryption schemes supported by PDK, with a focus on designing around usability to bring transparent encryption to users. ...
is transparent and largely unnoticeable to users even on multiple devices, and encryption can be used with existing services without any server-side modifications. ...
Like CONIKS, EDP uses a prefix tree structure with privacy-preserving index keys, but the purpose and motivations differ. ...
doi:10.7916/d8-40ce-qn14
fatcat:mryc5fruojgttot57unwakr2dq
Improving Smartphone Security and Reliability
2017
Journal of Interconnection Networks (JOIN)
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. ...
Developing these tools has required surmounting many challenges unique to the smartphone platform: dealing with input non-determinism in sensor-oriented apps, non-standard control flow, low-overhead yet ...
The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory ...
doi:10.1142/s0219265917400023
fatcat:yq7yda6d4ras7a75jr33mzm3la
« Previous
Showing results 1 — 15 out of 91 results