Paper
22 September 2015 Privacy-preserving photo sharing based on a public key infrastructure
Lin Yuan, David McNally, Alptekin Küpçü, Touradj Ebrahimi
Author Affiliations +
Abstract
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Lin Yuan, David McNally, Alptekin Küpçü, and Touradj Ebrahimi "Privacy-preserving photo sharing based on a public key infrastructure", Proc. SPIE 9599, Applications of Digital Image Processing XXXVIII, 95991I (22 September 2015); https://doi.org/10.1117/12.2190458
Lens.org Logo
CITATIONS
Cited by 8 scholarly publications and 4 patents.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Symmetric-key encryption

Amplitude shift keying

Prototyping

Image processing

Computer security

Information operations

Back to Top