Skip to main content

Privacy Enhancing Solutions for Personal Information Based Multimedia Content Sharing

  • Chapter
Intelligent Multimedia Analysis for Security Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 282))

  • 822 Accesses

Abstract

User generated content (UGC) is shared in an open space like social media where users can upload and consume contents freely. Since the access to the contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. Although it is contrary to the philosophy of UGC, the contents can be encrypted by a key and the key can be shared among users to protect the contents of a UGC creator. However, it is quite challenging to distribute the key to anonymous users since there is no relationship or acquaintanceship between the content consumers and creators. To solve this problem, user profile or content preference can be utilized. By allowing accessibility to only users who have similar personal information, the contents creator or distributor can select the target group of consumers. In this chapter, we present a method for sharing contents securely based on the personal information of users that includes user profiles and contents preference. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows the UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information during similarity measurement. To realize the virtual secure space, the personal information is applied to fuzzy vault scheme, which enables the generation of secure biometric template.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ames, M., Naaman, M.: Why we tag: motivations for annotation in mobile and online media. In: The Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 971–980 (2007)

    Google Scholar 

  2. Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, p. 531. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Cisco, How virtual private networks work, http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a0080094865.shtml

  4. Dwyer, C., Hiltz, S.R.: Trust and privacy concern within social networking sites: A comparison of facebook and myspace. In: Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado (2007)

    Google Scholar 

  5. Facebook, http://www.facebook.com/

  6. Flickr, http://www.flickr.com/

  7. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceeding of ACM Workshop on Privacy in the Electronic Society (WPES), pp. 71–80 (2005)

    Google Scholar 

  8. Hildebrand, F.B.: Introduction to numerical analysis, New York (1974)

    Google Scholar 

  9. ISO/IEC JTC1/SC29/WG11, Information technology - multimedia content description interface - Part 5: Multimedia description schemes. FDIS (N4242) (2001)

    Google Scholar 

  10. Jain, A.K., Dass, S.C., Nandakumar, K.: Soft biometric traits for personal recognition systems. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 731–738. Springer, Heidelberg (2004)

    Google Scholar 

  11. Jin, A.T.B., Ling, D.N.C., Goh, A.: BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37, 2245–2255 (2004)

    Article  Google Scholar 

  12. Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory, p. 408 (2002)

    Google Scholar 

  13. Lee, H.Y., Kim, J.W.: An approach for content sharing among UPnP devices in different home networks. IEEE Transactions on Consumer and Electronics 53(4), 1419–1426 (2007)

    Article  Google Scholar 

  14. Lee, Y.J., Bae, K., Lee, S.J., Park, K.R., Kim, J.: Biometric key binding: fuzzy vault based on iris images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 800–808. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Lee, Y., Ju, H., Park, J., Han, J.: User authentication mechanism using authentication server in home network. In: International Conference of Advanced Communication Technology (ICACT), vol. 1, pp. 503–506 (2006)

    Google Scholar 

  16. Loia, V., Pedrycz, W., Senatore, S.: Semantic web content analysis: a study in proximity-based collaborative clustering. IEEE Transactions on Fuzzy Systems 15(6), 1294–1312 (2007)

    Article  Google Scholar 

  17. Manjunath, B.S., Salembier, P., Sikora, T.: Introduction to MPEG-7: multimedia content description interface. John Wiley & Sons, Chichester (2002)

    Google Scholar 

  18. Mannan, M., Oorschot, P.C.V.: Privacy-enhanced sharing of personal content on the web. In: Proceeding of the 17th international conference on World Wide Web (WWW), pp. 487–496 (2008)

    Google Scholar 

  19. Myspace, http://www.myspace.com/

  20. Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)

    Article  Google Scholar 

  21. NIST. Advanced Encryption Standard (AES), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  22. OECD study on the participative web: user generated content, http://www.oecd.org

  23. Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical recipes in C. Cambridge University Press, Cambridge (1992)

    MATH  Google Scholar 

  24. Rose, B.: Home networks: a standards perspective. IEEE Communications Magazine 39(12), 78–85 (2001)

    Article  Google Scholar 

  25. Sohn, H., Ro, Y.M., Plataniotis, K.N.: Content sharing based on personal information in virtually secured space. In: International Workshop on Digital Watermarking (IWDW), pp. 401–413 (2008)

    Google Scholar 

  26. Sohn, H., Ro, Y.M., Plataniotis, K.N.: Content sharing between home networks by using personal information and associated fuzzy vault scheme. IEEE Transactions on Consumer and Electronics 55(2), 431–437 (2009)

    Article  Google Scholar 

  27. Teoh, A.B.J., Yuang, C.T.: Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics-part B: Cybernetics 37(5), 1096–1106 (2007)

    Article  Google Scholar 

  28. U.S. Department of Labor, Bureau of Labor Statistics. Standard Occupational Classification (SOC) Major Groups, http://www.bls.gov/soc/soc_majo.htm

  29. Universal Plug and Play, http://www.upnp.org/

  30. Walker, J., Morris, O.J., Marusic, B.: Share It! - the architecture of a rights-manages network of peer-to-peer set-top-boxes. In: The Proceedings of EUROCON (2003)

    Google Scholar 

  31. Wikipedia, List of hobbies, http://en.wikipedia.org/wiki/List_of_hobbies

  32. Yong, W., Plataniotis, K.N.: Fuzzy vault for face based cryptographic key generation biometrics symposium, pp. 1–6 (2007)

    Google Scholar 

  33. Youtube, http://www.youtube.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Sohn, H., Ro, Y.M., Plataniotis, K.N. (2010). Privacy Enhancing Solutions for Personal Information Based Multimedia Content Sharing. In: Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds) Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11756-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11756-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11754-1

  • Online ISBN: 978-3-642-11756-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics