Secure Authentic Image Injection Scheme in Social Networking

DOI : 10.17577/IJERTCONV4IS19048

Download Full-Text PDF Cite this Publication

Text Only Version

Secure Authentic Image Injection Scheme in Social Networking

  1. Ramya1, S. Supriya2, S. Vinitha3

    1,2,3UG Scholar,8 Sem,

    Department of CSE, V.S.B Engineering College, Karur, TamilNadu, India.

    1. P. V.Raghavendra4

4Assistant Professor,

Department of CSE, V.S.B Engineering College, Karur, TamilNadu, India

Abstract-Nowadays in this globalized world all the people in the society are obsessed to the social network. It plays a major role in our society. Maintaining privacy has a major problem, our proposed system provides additional security to the social network which is achieved by using Adaptive Privacy Policy Prediction (A3P).This system provides the privacy setting for the user. The features are selecting friend from friend list, follower request, news feed filtering, block the person and send the notification to the user when the violation is found. Our solution relies on an image classify which may be related with similar policies, and on a policy prediction algorithm to automatically generate a policy for all the image, also according to users social features.

Key words- Additional Security-Privacy Policy-Friend list- Filtering-Notification.

1 INTRODUCTION

At present social networking are best place for sharing information between friends and relatives these sites helps users to share daily in order, update daily news, share education information, update latest jobs postings etc. Users can get in touch with old friends and video chat with friends. Project design must be in Asp.net programming language and SQL server. Members should have secured user login and users data must be private. Users must have features to search friends, send friend request, add friends, post comments and scraps, uploaded images, block, delete existing users. Quick progress in the world has given a different form for communication over the computers for the past few years. Apart from email, this form of interactions allows different users to share their information to the desired people all around the world through a common medium. The common example for such a medium is Social Networking, which is a web application used for incorporating different kinds of communities for people who share a common attention or actions.

The basic types of services that are provided by the social networks are communities, friends list, testimonial, and the users profile. Even chat sessions and number of applications are available today. Most likely Facebook has a notion of social proximity, which is one of their secret sauces. Think of every user on Facebook as a node and majority of these nodes are connected to other nodes via multiple relationship edges with friendship being the most common edge. Each of these edges must carry a certain weight and the sum total of them would be the social proximity score between two user. Privacy Policy Inference

of User-Uploaded Images on Content Sharing Sites[1] Most content sharing websites allow user to enter their privacy preferences. Unfortunately, recent studies have shown that user struggle to set up and maintain such privacy policy setting. Design the interaction flows between the two building blocks to balance the benefits from meeting personal characteristics and obtaining community advice. Filtering is based on descriptions of administrator.[2]Filtering is considered as removing of data from an incoming content or finding data in that content. content-based post filtering service for Online Social Networks (OSNs). Our system allows OSN users to have a direct control on the messages that are posted on their walls[2][3]. A user can follow any other user only with their consent[4]. If the user blocks a person, the shared content and the images of the user are not allowed to view by the blocked person[5]. If the defiance is occurred then the notification will send to the user[6].In this generation, using online social network (OSN) is an unavoidable powerful weapon to exhibit peoples views and ideas. We believe that the proposed strategy is a key service for social networks in that in today social networks users have little control on the posts displayed on their walls. For example, Facebook allows users to filter the contents in their walls (i.e., friends, friends of friends, or defined groups of friends)[2].Filtering is based on descriptions of administrator. Filtering is considered as removing of data from incoming content or finding data in that content.

In this paper we propose an Adaptive Privacy Policy Prediction (A3P) system which endeavor to provide user highly secured privacy settings. The role of images content and metadata. In general, similar images often incur similar privacy preferences , especially when people appear in the image. For example, one may upload several photos of his kids and specify that only the specified friends are allowed to see these photos.

II. RELATED WORK

Our work is related to privacy setting configuration in social networks and privacy analysis of online content sharing in social network.

  1. Policy Prediction

    The Policy Prediction algorithm is used to share the contents and images for friends, family members and co- workers through the social network. For example Facebook. In our proposed system we select friends from the friend list,

    A3P

    that they only can view our shared contents and the uploaded images.

    Policy mining

  2. Filtered Wall

    policy

    alert

    USER

    OSN WALL

    Policy prediction

    Content Based Filtering in online social network by exploiting ML techniques[2,3,6] The aim of the system is to experimentally appraise an automated system called Filtered Wall. It is able to filter unwanted messages from user wall

    Followear request

    Selecting friend

    which is achieved by using Flexible rule based system. The idea of proposed system is filtering the unwanted post from

    ADMIN

    the home page in OSN wall.

  3. Followers

    and ide

    jggfh

    DATA BASE

    A user can follow any other user, and the user being followed need not follow back. In face book the user can follow any others without their permission. Here we provide the follower request to follow others.

  4. Notification

In facebook anyone can view our profile without our knowledge. In the proposed system if any violation is found, automatically it will send the notification to the concern account holder.

III PROPOSED SYSTEM

In our proposed system we provide additional security to the social network. For example, While uploading a photo privacy settings provided by Adaptive Privacy Policy Prediction System(A3P).In that all our friends can view all the uploaded photo but we can have many friends in the friend list. In our proposal we can select the number of friends who can view or access the detail can be selected from friend list. If unknown users view our profile means automatically the notification will send to the concerned account proprietor. In this paper we propose an A3P system which aims to provide users hassle free privacy settings experience by automatically generating personalized policies.The role of images content and metadata. In general, similar images often incur similar privacy preferences , especially when people appear in the image . For example, one may upload several photos of his/her kids and specify that only the specified friends are allowed to see these photos.

In our architecture user and admin plays a major role. Admin monitors N number of users and their policies, an also it monitors Online Social Network Wall and database of social network. Database is a collection of data. It is used to store large amount of data and retrieval of data which is shared in the social network. A3P has a collection of policy. These policies are created and controlled by the administrator.

image policy

Notification

Block person

News feed filtering

Social data

Our policies are inspired by popular content sharing sites (eg, Facebook), although the actual implementation depends on the specific content-management site structure and implementation. When a user uploads an image, the image will be first sent to the A3P. The A3P classifies the policy mining and policy prediction, determines whether there is a need to invoke the A3P-social. In most cases, the A3P predicts policies for the users directly based on their historical behaviour.

  1. Policy Mining

    Hierarchical mining approach for policy mining is proposed. Our approach leverages association rule mining techniques to discover popular patterns in policies. Policy mining is carried out within the same category of the new image because images in the same category are more likely under the similar level of privacy protection. The basic idea of the hierarchical mining is to follow a natural order in which a user defines a policy. Given an image, a user usually first decides who can access the image, then thinks about what specific access rights should be given, and finally refine the access conditions such as setting the expiration date. Correspondingly, the hierarchical mining first look for popular subjects defined by the user, then look for popular actions in the policies containing the popular subjects, and finally for popular conditions in the policies containing both popular subjects and conditions.

  2. Policy Prediction

The policy mining phase may generate several candidate policies while the goal of our system is to return the most promising one to the user. Thus, we present an approach to choose the best candidate policy that follows the users privacy tendency. It stores the users policy performs the action according to it.

User Id

Password

User

Name

A

B

C

D

E

9345678997

reetu

Jack

yes

No

No

Yes

Yes

Rose@

gmail.com

Tree234

Rosy

No

No

No

Yes

Yes

8676578764

567strgv

Sam

Yes

Yes

Yes

No

Yes

7865437890

Rain2345

Jhon

No

No

Yes

Yes

Yes

kala@ gmail.com

1234567b

Kalai

No

Yes

Yes

Yes

Yes

Before Block

connection

A B

connection connection

User Id: Mobile number or Mail id. A: Selecting Friend

B: Follower Request C: News Feed Filtering D: Block Person

E: Notification

If the user accecpt the policy which are presented in the facebook settings, the administrator will send the YES decree to the database else if it is not found then the administrator will send the NO command to the database which are used for providing high security.

Selecting Friend: Used for selecting the friend from the friend list. Only these selected friends can view our shared contents and images. It will not be viewed by the unselected friends as it is filtered by the administrator.

Follower Request: User can send the follower request to anyone. Only if the request is accepted by that person, The user can follow him/her. Most content sharing websites allow users to enter their privacy preferences. Unfortunately, recent studies have shown that users struggle to set up and maintain such privacy settings . One of the main reasons provided is that given the amount of shared information this process can be tedious and error-prone. Therefore, many have acknowledged the need of policy recommendation systems which can assist users to easily and properly configure privacy settings.

User 1

User 2

Policy prediction

Content based filtering

Send Notification

Content based filtering

Send Notification

NewsFeed Filtering: In this system admin filters unwanted content in OSN wall, which is achieved by key word filtering technique. In this technique admin has a collection of keys , if that key matches with the user OSN wall that particular contents or post filtered by admin knowledge.

User 1

Policy prediction

User 2

Data Base

User interface Admin Block Person:

In before block: A,B&C are friends to each other. If anyone from the three friends share the images or the contents it can be viewed by the other two friends.

C

In after block: If A blocks B, then the details of A will not be viewed by B, but A & C are friends, so the details of A can be viewed by C, but in our system through c also B cannot view the details of A.

After Block

B

A blocked B

A

connection C share A post (Blocked)

C

Notification: Our proposed system has a notification feature, which is controlled by admin. If the violation occurs in any policy the notification send or indicate to the concern account holder.

Advantage:

The A3P-core focuses on analyzing each individual users own images and metadata, while the A3P-Social offers a community perspective of privacy setting recommendations for a users potential privacy improvement. The rule layer adopted for filtering unwanted posts has been introduced. When a user tries to access the image without permission, the owner receives an alerting message if it is blocked by OSN wall. If the violation is found, the notification will send to the user.

CONCLUSION

Our proposed an Adaptive Privacy Policy Prediction (A3P) system that helps users automate the privacy policy settings for their uploaded images. The A3P system pro- vides a comprehensive framework to infer privacy preferences based on the information available for a given user. We also effectively tackled the issue of cold-start, leveraging social context information. Our experimental study proves that our A3P is a practical tool that offers significant improvements over current approaches to privacy. In this paper, we have presented Filtered Wall. The flexibility of the system in terms of filtering options is enhanced through the management of Black Lists. System proposed in this paper represents just the core set of functionalities needed to provide a sophisticated tool for OSN message filtering with temporary blocking of user and

also send notification, E-Mail to that who has posted unwanted message on wall. This might enhance services provided by OSN. Black List and Filtering Rule specification are made easier by development of GUI and a set of related tools. Along with it, our proposed system provides a better accuracy for classification of message as compare to previous implemented methods.

REFERENCES

  1. Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and Joshua Wede, Privacy Policy Inference of User- Uploaded Images on Content Sharing Sites IEEE Transactions on knowledge and data engineering, vol. 27, NO. 1, January 2015 193

  2. M. Vanetti, E. Binaghi, B. Carminati, M. Carullo and E. Ferrari Content-based Filtering in On-line Social Networks University of Insubria 21100 Varese, Italy.

  3. Dhruv Vashisth, Sivagami G Filtering Undesired Messages from Online Social Networks: A Content Based Filtering Approach Dhruv Vashistha et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 2046-2049.

  4. Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon What is Twitter, a Social Network or a News Media? KAIST 335 Gwahangno, Yuseong-gu, Daejeon, Korea.

  5. Prajakta Yerawar, Pankaj Agarkar An advanced approach to avoid unwanted messages and blocking of person from OSN use International Research Journal of Engineering and Technology (IRJET) Volume:

  6. Preeti.C, Sara Anjum Unwanted Message Filtration from OSN User's Wall and Blocking of Unwanted Person Using Trust Value International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-5, Issue-1) 02 Issue: 03 | June-2015.

  7. M. Rabbath, P. Sandhaus, and S. Boll, Analysing facebook featuresto support event detection for photo-based facebook applications, in Proc. 2nd ACM Int. Conf. Multimedia Retrieval, 2012, pp. 11:111:8.

  8. S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova, Privacy-aware image classification and search, in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp. 3544.

  9. S. Jones and E. ONeill, Contextual dynamics of group-based sharing decisions, in Proc. Conf. Human Factors Comput. Syst.,2011, pp. 17771786.

AUTHORS DETAIL:

Ms. R.RAMYA pursuing her BE CSE in V.S.B. Engineering College under Anna University. She had participated in several workshop and symposium and presented papers.

MS. S.SUPRIYA pursuing her BE CSE in V.S.B. Engineering College under Anna University. She had participated in several workshop and symposium and presented papers.

MS. S.VINITHA pursuing her BE CSE in V.S.B. Engineering College under Anna University. She had participated in several workshop and symposium and presented papers.

Mr.A.P.V.Raghavendra is pursuing Ph.D. from the Manonmanium Sundaranar University, Tirunelveli, India from 2013 onwards and Completed M.Tech(CSE) degree from Bharath University, Chennai, India in 2009. He is a Member in ISTE New Delhi, India, IAENG, Hong Kong. Now He is currently working as an Assistant Professor in Computer Science and Engineering in V.S.B Engineering College, Karur, Tamil Nadu, and India. His research interests include Data Mining, Data Bases, Artificial Intelligence,.,He had published 2 Annexture II Scopus indexed and 18 international publications.

.

Leave a Reply