Abstract
User generated content (UGC) is shared in an open space like social media where users can upload and consume contents freely. Since the access to the contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. Although it is contrary to the philosophy of UGC, the contents can be encrypted by a key and the key can be shared among users to protect the contents of a UGC creator. However, it is quite challenging to distribute the key to anonymous users since there is no relationship or acquaintanceship between the content consumers and creators. To solve this problem, user profile or content preference can be utilized. By allowing accessibility to only users who have similar personal information, the contents creator or distributor can select the target group of consumers. In this chapter, we present a method for sharing contents securely based on the personal information of users that includes user profiles and contents preference. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows the UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information during similarity measurement. To realize the virtual secure space, the personal information is applied to fuzzy vault scheme, which enables the generation of secure biometric template.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ames, M., Naaman, M.: Why we tag: motivations for annotation in mobile and online media. In: The Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 971–980 (2007)
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, p. 531. Springer, Heidelberg (2000)
Cisco, How virtual private networks work, http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a0080094865.shtml
Dwyer, C., Hiltz, S.R.: Trust and privacy concern within social networking sites: A comparison of facebook and myspace. In: Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado (2007)
Facebook, http://www.facebook.com/
Flickr, http://www.flickr.com/
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceeding of ACM Workshop on Privacy in the Electronic Society (WPES), pp. 71–80 (2005)
Hildebrand, F.B.: Introduction to numerical analysis, New York (1974)
ISO/IEC JTC1/SC29/WG11, Information technology - multimedia content description interface - Part 5: Multimedia description schemes. FDIS (N4242) (2001)
Jain, A.K., Dass, S.C., Nandakumar, K.: Soft biometric traits for personal recognition systems. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 731–738. Springer, Heidelberg (2004)
Jin, A.T.B., Ling, D.N.C., Goh, A.: BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37, 2245–2255 (2004)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory, p. 408 (2002)
Lee, H.Y., Kim, J.W.: An approach for content sharing among UPnP devices in different home networks. IEEE Transactions on Consumer and Electronics 53(4), 1419–1426 (2007)
Lee, Y.J., Bae, K., Lee, S.J., Park, K.R., Kim, J.: Biometric key binding: fuzzy vault based on iris images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 800–808. Springer, Heidelberg (2007)
Lee, Y., Ju, H., Park, J., Han, J.: User authentication mechanism using authentication server in home network. In: International Conference of Advanced Communication Technology (ICACT), vol. 1, pp. 503–506 (2006)
Loia, V., Pedrycz, W., Senatore, S.: Semantic web content analysis: a study in proximity-based collaborative clustering. IEEE Transactions on Fuzzy Systems 15(6), 1294–1312 (2007)
Manjunath, B.S., Salembier, P., Sikora, T.: Introduction to MPEG-7: multimedia content description interface. John Wiley & Sons, Chichester (2002)
Mannan, M., Oorschot, P.C.V.: Privacy-enhanced sharing of personal content on the web. In: Proceeding of the 17th international conference on World Wide Web (WWW), pp. 487–496 (2008)
Myspace, http://www.myspace.com/
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)
NIST. Advanced Encryption Standard (AES), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
OECD study on the participative web: user generated content, http://www.oecd.org
Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical recipes in C. Cambridge University Press, Cambridge (1992)
Rose, B.: Home networks: a standards perspective. IEEE Communications Magazine 39(12), 78–85 (2001)
Sohn, H., Ro, Y.M., Plataniotis, K.N.: Content sharing based on personal information in virtually secured space. In: International Workshop on Digital Watermarking (IWDW), pp. 401–413 (2008)
Sohn, H., Ro, Y.M., Plataniotis, K.N.: Content sharing between home networks by using personal information and associated fuzzy vault scheme. IEEE Transactions on Consumer and Electronics 55(2), 431–437 (2009)
Teoh, A.B.J., Yuang, C.T.: Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics-part B: Cybernetics 37(5), 1096–1106 (2007)
U.S. Department of Labor, Bureau of Labor Statistics. Standard Occupational Classification (SOC) Major Groups, http://www.bls.gov/soc/soc_majo.htm
Universal Plug and Play, http://www.upnp.org/
Walker, J., Morris, O.J., Marusic, B.: Share It! - the architecture of a rights-manages network of peer-to-peer set-top-boxes. In: The Proceedings of EUROCON (2003)
Wikipedia, List of hobbies, http://en.wikipedia.org/wiki/List_of_hobbies
Yong, W., Plataniotis, K.N.: Fuzzy vault for face based cryptographic key generation biometrics symposium, pp. 1–6 (2007)
Youtube, http://www.youtube.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Sohn, H., Ro, Y.M., Plataniotis, K.N. (2010). Privacy Enhancing Solutions for Personal Information Based Multimedia Content Sharing. In: Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds) Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11756-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-11756-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11754-1
Online ISBN: 978-3-642-11756-5
eBook Packages: EngineeringEngineering (R0)