Call For Papers
Contact Us

  My Privacy My Authorization: Control of Photograph Sharing in Online Social Media  
  Authors : Nirajkumar Kunturkar; Dr. S.N.Kakarwal
  Cite as:


Image sharing is the new cool feature which is successful in ruling Online Social Networks (OSNs). Unknowingly, it may expose users¶ privacy if they can post, comment, and tag a photo without any restriction. In this paper, we are attempting to address this issue and study the scenario when a user shares a photo containing individuals¶ other than himself/ herself (referred as co-photo for short). To refrain the possible privacy leakage of a photograph, we are suggesting an approach to entitle everyone in a photo to acknowledge the act of image posting and enable them to be a decisive authority on the photo sharing. To achieve this feat, we require coherent facial recognition (FR) system to identify everyone in the photo. However, as the need of the privacy concerns in people increases it may limit the publicly available photos to train the FR system. To deal with this trauma, we suggest an approach to consider private photos to design personalized FR system which can be trained to recognize possible co-owners without compromising their privacy. With our suggested approach, we think the computational complexity will reduce as we are not relying on the photos available on social platform for the training purpose but instead asking users to provide their photos from their gallery which is reliable source and the private training set is also not exposed on the platform to maintain secrecy about this dataset.


Published In : IJCSN Journal Volume 6, Issue 6

Date of Publication : December 2017

Pages : 694-701

Figures :07

Tables : --


Nirajkumar Kunturkar : received B.Tech. from COEP, Pune university in Information Technology. At Present he is pursuing M.E. in department of Computer Science and Engineering, P.E.S. College of Engineering, Aurangabad, MS-India.

S. N. Kakarwal : received Ph.D., M.E. and B.E. degree in Computer Science and Engineering. She Presently working as Professor in Department of Computer Science and Engineering, P.E.S. College of Engineering, Aurangabad, MS-India. Her research interests include Image Processing, Pattern Recognition and Artificial Neural Network. In these areas, she has published 28 research papers in leading Journals, National and International conferences proceedings. She has bagged 3 Best paper award.


Online social networks, FR system, Open social, privacy

Photo sharing is amongst the top activities on online social networks such as facebook and it has got lot of popularity in recent times. Unfortunately, and unwillingly careless photo post, may reveal individual¶s privacy appearing in a photo. To get rid of the privacy concern, we have proposed an approach which enables everyone appearing in a photo to give permission before photo is getting posted publicly on a platform. We have designed a privacy preserving FR system to identify each individual in a photo. This system has pure confidentiality of the photos used for training. We have carried out experiment with standard database to show the effectiveness and the capability of the system to protect the privacy of the user. The analysis carried out shows the efficiency of the system; with the Face94db we observed that the identification of a user when his photo is given to the system it identified the user correctly in all of the three Eigen, RGB pixel comparison and fisher algorithms correctly. All of the test data for 11 users; 5 photos each recognized correctly.


[1] M. Ames and M. Naaman. Why we tag: Motivations for annotation in mobile and online media In V. Shoup, editor, CRYPTO, volume 3621 of Lecture Notes in Computer Science, pages 241±257. Springer, 2005. [2] Z. Stone, T. Zickler, and T. Darrell. Autotagging facebook: Social network context improves photo annotation. In Computer Vision and Pattern Recognition Workshops, 2008. CVPRW¶08. IEEE Computer Society Conference on, pages 1±8. IEEE, 2008. [3] L. Kissner and D. X. Song. Privacy-preserving set operations. In V. Shoup, editor, CRYPTO, volume 3621 of Lecture Notes in Computer Science, pages 241±257. Springer, 2005. [4] A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the Facebook. MCS¶05, pages 278±285, Berlin, Heidelberg, 2005. Springer-Verlag. [5] Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair. Trends Mach. Learn., 3(1):1±122, Jan. 2011. [6] J. Bonneau, J. Anderson, and G. Danezis Prying data out of a social network OTM 2006 Workshops, volume 4278 of Lecture Notes in Computer Science, pages 1734±1744. Springer Berlin Heidelberg, 2006. [7] M. E. Newman. The structure and function of complex networks. SIAM review, 45(2):167±256, 2003. [8] A. Besmer and H. Lipford. Tagged photos: Concerns, perceptions, and protections. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ¶10, New York, NY, USA, 2012. ACM. [9] K. Choi, H. Byun, and K.-A. Toh. A collaborative face recognition framework on a social network platform. In Automatic Face Gesture Recognition, 2008. FG ¶08. 8th IEEE International Conference on, pages 1±6, 2008. [10] Z. Stone, T. Zickler, and T. Darrell. Toward largescale face recognition using social network context. Proceedings of the IEEE, 98(8):1408±1415. [11] Detecting Social Cliques for Automated Privacy Control in Online Social Networks.