• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

P3: Toward Privacy-Preserving Photo Sharing (2013)

by Ramesh Govindan
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 11
Next 10 →

Cryptagram: Photo privacy for online social media

by Matt Tierney, Ian Spiro, Christoph Bregler, Lakshminarayanan Subramanian - In Proceeding of the first ACM conference on Online Social Networks (2013), ACM
"... While Online Social Networks (OSNs) enable users to share photos easily, they also expose users to several privacy threats from both the OSNs and external entities. The current pri-vacy controls on OSNs are far from adequate, resulting in inappropriate flows of information when users fail to un-ders ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
While Online Social Networks (OSNs) enable users to share photos easily, they also expose users to several privacy threats from both the OSNs and external entities. The current pri-vacy controls on OSNs are far from adequate, resulting in inappropriate flows of information when users fail to un-derstand their privacy settings or OSNs fail to implement policies correctly. OSNs may further complicate privacy ex-pectations when they reserve the right to analyze uploaded photos using automated face identification techniques. In this paper, we propose the design, implementation and evaluation of Cryptagram, a system designed to enhance online photo privacy. Cryptagram enables users to convert photos into encrypted images, which the users upload to OSNs. Users directly manage access control to those photos via shared keys that are independent of OSNs or other third parties. OSNs apply standard image transformations (JPEG compression) to all uploaded images so Cryptagram provides an image encoding and encryption mechanism that is toler-ant to these transformations. Cryptagram guarantees that the recipient with the right credentials can completely re-trieve the original image from the transformed version of the uploaded encrypted image while the OSN cannot infer the original image. Cryptagram’s browser extension integrates seamlessly with preexisting OSNs, including Facebook and Google+, and currently has over 400 active users.
(Show Context)

Citation Context

... comparing the effective efficiency of our approach to steganography, Cryptagram packs many more bits per pixel (Section 6). Cryptagram differs significantly from the recent work on photo privacy, P3 =-=[29]-=-. Unlike P3, Cryptagram operates completely in encrypted bit space and does not reveal sensitive cleartext data of photos to external entities (Section 8). Cryptagram also does not rely on third-party...

Resource Thrifty Secure Mobile Video Transfers on Open WiFi Networks

by George Papageorgiou, John Gasparis, Srikanth V, Ramesh Govindan, Tom La Porta
"... Video transfers using smartphones are becoming increasingly pop-ular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user’s device. We argue that encrypting only ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Video transfers using smartphones are becoming increasingly pop-ular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user’s device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper pre-serving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limit-ing performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via exten-sive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing de-lay by as much as 75 % and the energy consumption by as much as
(Show Context)

Citation Context

...algorithms in wireless LANs is provided. However, these works do not consider selective encryption of video as we do here. Other Related Work: Partial encryption of content in photos is considered in =-=[29]-=-. An encoding algorithm that extracts and encrypts a small but significant component of a photo, is proposed. In contrast, we consider the structure of a video stream towards preserving its confidenti...

PIC: Enable Large-scale Privacy-preserving Content-based Image Search on Cloud

by Lan Zhang, Taeho Jung, Puchun Feng, Kebin Liu, Xiang-yang Li, Yunhao Liu
"... Abstract—High-resolution cameras produce huge volume of high quality images everyday. It is extremely challenging to store, share and especially search those huge images, for which increasing number of cloud services are presented to support such functionalities. However, images tend to contain rich ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract—High-resolution cameras produce huge volume of high quality images everyday. It is extremely challenging to store, share and especially search those huge images, for which increasing number of cloud services are presented to support such functionalities. However, images tend to contain rich sensitive infor-mation (e.g., people, location and event), and people’s privacy concerns hinder their readily participation into the services provided by untrusted third parties. In this work, we introduce PIC: a Privacy-preserving large-scale Image search system on Cloud. Our system enables efficient yet secure content-based image search with fine-grained access control, and it also provides privacy-preserving image storage and sharing among users. Users can specify who can/cannot search on their images when using the system, and they can search on others ’ images if they satisfy the condition specified by the image owners. Majority of the computationally intensive jobs are outsourced to the cloud side, and users only need to submit the query and receive the result throughout the entire image search. Specially, to deal with massive images, we design our system suitable for distributed and parallel computation and introduce several optimizations to further expedite the search process. We implement a prototype of PIC including both cloud side and client side. The cloud side is a cluster of computers with distributed file system (Hadoop HDFS) and MapReduce architecture (Hadoop MapReduce). The client side is built for both Windows OS laptops and Android phones. We evaluate the prototype system with large sets of real-life photos. Our security analysis and evaluation results show that PIC successfully pro-tect the image privacy at a low cost of computation and communication. I.
(Show Context)

Citation Context

...encrypting the image or blacking out private contents, e.g., human faces. [44] removes facial characteristics from the video frame to protect the face privacy of individuals in video surveillance. P3 =-=[45]-=- proposes a privacy preserving photo sharing scheme by separating an image into private part and public part, and encrypts the private part directly. Many access control mechanisms are proposed to ena...

POP: Privacy-preserving Outsourced Photo Sharing and Searching for Mobile Devices

by Lan Zhang, Taeho Jung Y, Cihang Liu, Xuan Ding, Xiang-yang Liy, Yunhao Liu
"... Abstract—Facing a large number of personal photos and limited resource of mobile devices, cloud plays an important role in photo storing, sharing and searching. Meanwhile, some recent reputation damage and stalk events caused by photo leakage increase people’s concern about photo privacy. Though mos ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract—Facing a large number of personal photos and limited resource of mobile devices, cloud plays an important role in photo storing, sharing and searching. Meanwhile, some recent reputation damage and stalk events caused by photo leakage increase people’s concern about photo privacy. Though most would agree that photo search function and privacy are both valuable, few cloud system supports both of them simultane-ously. The center of such an ideal system is privacy-preserving outsourced image similarity measurement, which is extremely challenging when the cloud is untrusted and a high extra overhead is disliked. In this work, we introduce a framework POP, which enables privacy-seeking mobile device users to outsource burdensome photo sharing and searching safely to untrusted servers. Unauthorized parties, including the server, learn nothing about photos or search queries. This is achieved by our carefully designed architecture and novel non-interactive privacy-preserving protocols for image similarity computation. Our framework is compatible with the state-of-the-art image search techniques, and it requires few changes to existing cloud systems. For efficiency and good user experience, our framework allows users to define personalized private content by a simple check-box configuration and then enjoy the sharing and searching services as usual. All privacy protection modules are transparent to users. The evaluation of our prototype implementation with 31,772 real-life images shows little extra communication and computation overhead caused by our system. I.
(Show Context)

Citation Context

...riend. Using the access control mechanism alone can not protect outsourced photos from untrusted cloud. And simply disabling automatic recognition or simply encrypting the sensitive content (e.g., P3 =-=[3]-=-) is not the desired solution, because it also eliminates the utilities lying in the image search functionality. Though both the search functionality and users’ privacy are valuable, few today’s cloud...

Privacy.Tag: Privacy Concern Expressed and Respected

by Cheng Bo, Guobin Shen, Jie Liu, Xiang-yang Li, Yongguang Zhang, Feng Zhao
"... The ever increasing popularity of social networks and the ever easier photo taking and sharing experience have led to unprecedented concerns on privacy infringement. Inspired by the fact that the Robot Exclusion Protocol, which regu-lates web crawlers ’ behavior according a per-site deployed robots. ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The ever increasing popularity of social networks and the ever easier photo taking and sharing experience have led to unprecedented concerns on privacy infringement. Inspired by the fact that the Robot Exclusion Protocol, which regu-lates web crawlers ’ behavior according a per-site deployed robots.txt, and cooperative practices of major search service providers, have contributed to a healthy web search indus-try, in this paper, we propose Privacy Expressing and Re-specting Protocol (PERP) that consists of a Privacy.tag – a physical tag that enables a user to explicitly and flexibly ex-press their privacy deal, and Privacy Respecting Sharing Pro-tocol (PRSP) – a protocol that empowers the photo service provider to exert privacy protection following users ’ policy expressions, to mitigate the public’s privacy concern, and ul-timately create a healthy photo-sharing ecosystem in the long run. We further design an exemplar Privacy.Tag using cus-tomized yet compatible QR-code, and implement the Proto-col and study the technical feasibility of our proposal. Our evaluation results confirm that PERP and PRSP are indeed feasible and incur negligible computation overhead.
(Show Context)

Citation Context

...tection is also quite different from those lossy methods that cannot restore the original, rooted from the goal to give the publicity control of photos back to the user. A piece of related work is P3 =-=[36]-=- that extracts and encrypts small components of photo while preserving the rest in public. P3 works well only if the photo owner/shares happen to be the user self. Our work aims at a systematic privac...

I met some great people at NYU who made the experience considerably more

by Ian Spiro, Phil Dhingra, Raphael Holmes, Kiefer Katovich, Carrie Kemper, Doug Kenter, Devon Sherman, Murphy Stein, Graham Taylor, Matthew Tierney, George Williams , 2013
"... First and foremost, I would like to thank my partner Molly Tanenbaum for her love, patience, good cheer, and support. I’m excited for our next chapter and looking forward to the day that we can enjoy spiced lamb shanks in a hot tub. Thanks to Chris Bregler, my research advisor and patron. He encoura ..."
Abstract - Add to MetaCart
First and foremost, I would like to thank my partner Molly Tanenbaum for her love, patience, good cheer, and support. I’m excited for our next chapter and looking forward to the day that we can enjoy spiced lamb shanks in a hot tub. Thanks to Chris Bregler, my research advisor and patron. He encouraged me to explore new intellectual paths and brought me along for some wild rides. Thanks to Helen Nissenbaum for leading the Privacy Research Group and for the great discussions in which we managed to bridge the interdisciplinary abyss. Thanks to my family, Mom, Dad, and Miranda. Thanks to the Motion Chain alpha users who tested and invented charades:
(Show Context)

Citation Context

...omparing the effective efficiency of our approach to steganography, Cryptagram packs many more bits per pixel (Section 5.7). Cryptagram differs significantly from the recent work on photo privacy, P3 =-=[61]-=-. Unlike P3, Cryptagram operates completely in encrypted bit space and does not reveal sensitive cleartext data of photos to external entities (Section 5.9). Cryptagram also does not rely on third-par...

Kaleido: You Can Watch It But Cannot Record It

by Lan Zhang, Cheng Bo, Jiahui Hou, Xiang-yang Li, Yu Wang, Kebin Liu, Yunhao Liu
"... Recently a number of systems have been developed to implement and improve the visual communication over screen-camera links. In this paper we study an opposite problem: how to prevent u-nauthorized users from videotaping a video played on a screen, such as in a theater, while do not affect the viewi ..."
Abstract - Add to MetaCart
Recently a number of systems have been developed to implement and improve the visual communication over screen-camera links. In this paper we study an opposite problem: how to prevent u-nauthorized users from videotaping a video played on a screen, such as in a theater, while do not affect the viewing experience of legitimate audiences. We propose and develop a light-weight hardware-free system, called KALEIDO, that ensures these prop-erties by taking advantage of the limited disparities between the screen-eye channel and the screen-camera channel. KALEIDO does not require any extra hardware and is purely based on re-encoding the original video frame into multiple frames used for displaying. We extensively test our system KALEIDO using a variety of smart-phone cameras. Our experiments confirm that KALEIDO preserves the high-quality screen-eye channel while reducing the secondary screen-camera channel quality significantly. 1.
(Show Context)

Citation Context

...e photo sharing services to exert privacy protection by following users’ policy expression. By leveraging the sparsity and quality of images to store most significant information in a secret part, P3 =-=[44]-=- extracts and encrypts such small component while preserving the rest in public. Some methods focus on providing privacy preserving face recognition in a face photos database [47]. A number of creativ...

Short Paper: CHIPS: Content-based Heuristics for Improving Photo Privacy for Smartphones

by Jiaqi Tan, Utsav Drolia, Rolando Martins, Priya Narasimhan
"... The Android permissions system provides all-or-nothing ac-cess to users ’ photos stored on smartphones, and the permis-sions which control access to stored photos can be confusing to the average user. Our analysis found that 73 % of the top 250 free apps on the Google Play store have permissions tha ..."
Abstract - Add to MetaCart
The Android permissions system provides all-or-nothing ac-cess to users ’ photos stored on smartphones, and the permis-sions which control access to stored photos can be confusing to the average user. Our analysis found that 73 % of the top 250 free apps on the Google Play store have permissions that may not reflect their ability to access stored photos. We pro-pose CHIPS, a unique content-based fine-grained run-time access control system for stored photos for Android which requires minimal user assistance, runs entirely locally, and provides low-level enforcement. CHIPS can recognize faces with minimal user training to deny apps access to photos with known faces. CHIPS’s privacy identification has low overheads as privacy checks are cached, and is accurate, with false-positive and false-negative rates of less than 8%.
(Show Context)

Citation Context

...hird-party apps using intercepts at the C and Java library level, whereas CHIPS uses mediation in the kernel to prevent apps from directly invoking system calls to bypass mediation. Photo Privacy. P3 =-=[11]-=- protects the privacy of photos stored on third-party Photo-sharing Service Providers (e.g. social networks, photo-sharing sites). Darkly [6] is a privacypreserving computer-vision library based on th...

USENIX Association 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13) 515 P3: Toward Privacy-Preserving Photo Sharing

by Moo-ryong Ra, Ramesh Govindan
"... With increasing use of mobile devices, photo shar-ing services are experiencing greater popularity. Aside from providing storage, photo sharing services enable bandwidth-efficient downloads to mobile devices by performing server-side image transformations (resizing, cropping). On the flip side, phot ..."
Abstract - Add to MetaCart
With increasing use of mobile devices, photo shar-ing services are experiencing greater popularity. Aside from providing storage, photo sharing services enable bandwidth-efficient downloads to mobile devices by performing server-side image transformations (resizing, cropping). On the flip side, photo sharing services have raised privacy concerns such as leakage of photos to unauthorized viewers and the use of algorithmic recog-nition technologies by providers. To address these con-cerns, we propose a privacy-preserving photo encoding algorithm that extracts and encrypts a small, but signif-icant, component of the photo, while preserving the re-mainder in a public, standards-compatible, part. These two components can be separately stored. This technique significantly reduces the accuracy of automated detec-tion and recognition on the public part, while preserving the ability of the provider to perform server-side trans-formations to conserve download bandwidth usage. Our prototype privacy-preserving photo sharing system, P3, works with Facebook, and can be extended to other ser-vices as well. P3 requires no changes to existing services or mobile application software, and adds minimal photo storage overhead. 1
(Show Context)

Citation Context

... feature extraction algorithm, and a face recognition algorithm on P3. We conclude the evaluation of privacy by discussing the efficacy of guessing attacks. We have also used PSNR to quantify privacy =-=[43]-=-, but have omitted these results for brevity. Finally, we quantify the reconstruction performance, bandwidth savings and the processing overhead of P3. Datasets. We evaluate P3 using four image datase...

home at NYU. The members of the Networking and Wide-Area Systems Group

by An Chakraborty, Jay Chen, Aditya Dhananjay, Eric Hielscher, Paul Gazzillo, David Iserovich, Vipin Jain, Shankar Kalyanaraman, Arthur Meachem, Christopher Mitchell, Michael Paik, Russell Power, Alex Rubinsteyn, Ashlesh Sharma, Robert Soule, Yair Sovran, Nguyen Tran, Robert Grimm
"... His willingness to adapt to and encourage my ever-evolving interests enabled the body of this thesis to come to fruition. I would also like to thank Jinyang Li and Helen Nissenbaum, who have been my co-advisors at NYU. Jinyang’s diversified set of deep knowledge enabled her to provide unparalleled g ..."
Abstract - Add to MetaCart
His willingness to adapt to and encourage my ever-evolving interests enabled the body of this thesis to come to fruition. I would also like to thank Jinyang Li and Helen Nissenbaum, who have been my co-advisors at NYU. Jinyang’s diversified set of deep knowledge enabled her to provide unparalleled guidance as I explored a variety of potential research interests. Helen, of course, is entirely responsible for re-wiring the way I think about privacy. Her work on contextual integrity permeates this research and continues to affect how I operate in everyday life. To paraphrase and apply a farewell address by Dietrich Bonhoeffer, “that you were my teacher for many sessions is a thing of the past; but that I may call myself your pupil remains still.” The members of the NYU Privacy Research Group provided a second academic home during these years. Without that group – and Helen’s gift for academic matchmaking – I would not have had the privilege to work with Luke Stark on Lockbox or Ian Spiro on Cryptagram. The cohort on the 7th Floor of 715/719 Broadway formed my primary academic
(Show Context)

Citation Context

...omparing the effective efficiency of our approach to steganography, Cryptagram packs many more bits per pixel (Section 2.5). Cryptagram differs significantly from the recent work on photo privacy, P3 =-=[106]-=-. Unlike P3, Cryptagram operates completely in encrypted bit space and does not reveal sensitive cleartext data of photos to external entities (Section 5.1). Cryptagram also does not rely on third-par...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University