CFP last date
20 January 2025
Reseach Article

Preventing Unauthorized Photo to be Published by Erasing Unapproved User Picture – Proposed Solution

by Mansour A. Abu Sameeha, Namer Ali Al Etawi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 25
Year of Publication: 2018
Authors: Mansour A. Abu Sameeha, Namer Ali Al Etawi
10.5120/ijca2018916528

Mansour A. Abu Sameeha, Namer Ali Al Etawi . Preventing Unauthorized Photo to be Published by Erasing Unapproved User Picture – Proposed Solution. International Journal of Computer Applications. 179, 25 ( Mar 2018), 7-9. DOI=10.5120/ijca2018916528

@article{ 10.5120/ijca2018916528,
author = { Mansour A. Abu Sameeha, Namer Ali Al Etawi },
title = { Preventing Unauthorized Photo to be Published by Erasing Unapproved User Picture – Proposed Solution },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2018 },
volume = { 179 },
number = { 25 },
month = { Mar },
year = { 2018 },
issn = { 0975-8887 },
pages = { 7-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number25/29086-2018916528/ },
doi = { 10.5120/ijca2018916528 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:26.242557+05:30
%A Mansour A. Abu Sameeha
%A Namer Ali Al Etawi
%T Preventing Unauthorized Photo to be Published by Erasing Unapproved User Picture – Proposed Solution
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 25
%P 7-9
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main aim of this project is to conceal and hide any photo for any user who does not give the permission for showing his picture, in this case need to have data base set for each user and the permission table for him /her to show his photos on OSN, and a FR system is to be established with a solid dataset for users and also to recognize the faces within photos, after finding a match for user’s face in a the picture a process is triggered to know the type of permission for showing or not this face, if yes the photo will be shown and on the contrary if no the user’s picture within the photo will be selected and the whole users picture will hollowed or emptied, in this case the use of edge detecting technique in image processing will take over the user’s pictureand the selected picture will totally be moved ( hollowed).

References
  1. Journal of Computer-Mediated Communication 12 (2007) 1143–1168 International Communication Association,https://www.lifewire.com/upload-saved-photos-or-videos-to-snapchat-4103878
  2. Ardion D. Beldad & Sabrina M. Hegner (2017) More Photos From Me to Thee: Factors Influencing the Intention to Continue Sharing Personal Photos on an Online Social Networking (OSN) Site among Young Adults in the Netherlands, International Journal of Human–Computer Interaction
  3. Constine, Josh. 2017. “Facebook Now Has 2 Billion Monthly Users…and Responsibility.” TechCrunch. http://social.techcrunch.com/2017/06/27/facebook-2-billion-users/; https://techcrunch.com/2017/06/27/facebook-2-billionusers/
  4. Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Proceedings of the WPES 2005 Workshop on Privacy in the Electronic Society. New York, NY:ACM.
  5. http://www.ijetcse.com/wp-content/plugins/ijetcse/file/upload/docx/462A-NOVEL-APPROACH-FOR-PRIVACY-PRESERVING-PHOTO-SHARING-ON-SNSS-pdf.pdfSecurity and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on18-21 July 2011
  6. Panagiotis Ilia, Elias Athanasopoulos & Iasonas Polakis (2015). Face/Off: Preventing Privacy Leakage From Photos in Social Networks ,CCS '15 Proceeding of the 22nd ACM SIGSAC conference on computer and communications security paged 781-792
  7. Bechara Al Bouna , Richard Chbeir , Alban Gabillon ,the image protector a flexible security rule specification toolkit, conference: secrypt 2011 - proceedings of the international conference on security and cryptography, seville, spain, 18 - 21 july, (2011)
  8. V.Abinaya, R.Jancy, C.Pavithra, D.Nandhini, K.Saranya (2017), My Privacy My Decision: Control of Photo Sharing on OSN Using Cloud, South Asian Journal of Engineering and Technology Vol.3, No.5 (2017) 130–133
  9. https://docs.microsoft.com/en-us/azure/cognitive-services/face/
  10. Andrews,lori B. I Know Who You Are and I Saw What You Did: Social Networks and the Death of privacy. free press, NY 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Online social network edge detection shared photo.