SECURE POLICY EVIDENCE OF USER UPLOADING IMAGES ON SHARING OF INFORMATION SITES

G Maheshwara Reddy, Shaik Alimoon

Abstract


With the expanding volumes of pictures client offers through social destinations, keeping up protection has turned into a noteworthy issue. In light of these episodes, the need of instruments to offer clients control access to their common substance some assistance with being exceedingly key. To offer security for the data, we set forward this paper involving Versatile Protection Strategy Forecast (A3P) structure to offer clients some assistance with creating efforts to establish safety for their pictures. The part of pictures and its metadata are investigated as a measure of client's protection inclinations. The Structure decides the best protection approach for the transferred pictures. It incorporates a Picture grouping system for relationship of pictures with comparable to strategies and a strategy expectation method to naturally deliver a security approach for client transferred pictures.


Keywords


Online Information Services; Web-Based Services

References


E. Kee, M. K. Johnson, H. Farid, Digital image authentication from jpeg headers, IEEE transactions on information forensics and security, vol.6,No.3,pages 1066-1095, September 2011.

Z. Li, A. Y. C. Nee, S. K. Ong, W. Gong, Tampered image detection using image matching, Fifth international conference on computer graphics, imaging and visualization, pages 174-179, 26-28 August,2008.

P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer,L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012

J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,” in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining.2009, pp.249–254.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.