APCAS: Autonomous Privacy Control and Authentication Sharing in Social Networks

被引:12
作者
Wen, Wenying [1 ,2 ]
Fan, Jiacong [1 ]
Zhang, Yushu [2 ,3 ]
Fang, Yuming [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330013, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
关键词
Autonomous privacy control; quick response (QR) code; secret image sharing; social networks; visual authentication; IMAGE; ENCRYPTION;
D O I
10.1109/TCSS.2022.3218883
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the increasing development of social networks has brought about many privacy-related issues. Because users (participants) have different privacy sharing behaviors when multiple parties participate. The way of privacy sharing depends on the wishes of publishers, and users usually cannot control privacy sharing independently. To address this issue, this article proposes an autonomous privacy control and authentication sharing (APCAS) scheme based on quick response (QR) codes in social networks. Using the error correction of QR codes with high-quality images can prevent photographs that are uploaded to the social network from being subjected to lossy operations, which meets the participants' needs of availability and privacy simultaneously. Combining the superiority of the polynomial-based secret image sharing and the visual secret image sharing can provide single-share certification for both dealer participation and dealer nonparticipation during certification. By comparing advanced image sharing algorithms, the proposed APCAS can restore the secret images one by one according to users' wishes and can thus effectively mitigate the problem of autonomous privacy control in online sharing. Compared with related methods in recent years in terms of peak signal-to-noise ratio (PSNR), authentication operation, and authentication complexity, the proposed APCAS algorithm provides lossless decryption, lower authentication computation complexity, and no pixel scalability.
引用
收藏
页码:3169 / 3180
页数:12
相关论文
共 48 条
[1]  
Beugnon S, 2019, IEEE IMAGE PROC, P679, DOI [10.1109/icip.2019.8803836, 10.1109/ICIP.2019.8803836]
[2]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[3]   Efficient Explicit Constructions of Multipartite Secret Sharing Schemes [J].
Chen, Qi ;
Tang, Chunming ;
Lin, Zhiqiang .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (01) :601-631
[4]   On the Relation of Random Grid and Deterministic Visual Cryptography [J].
De Prisco, Roberto ;
De Santis, Alfredo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) :653-665
[5]  
Fenghua Li, 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, P154, DOI 10.1109/INFOCOM.2019.8737466
[6]   What (or Who) Is Public? Privacy Settings and Social Media Content Sharing [J].
Fiesler, Casey ;
Dye, Michaelanne ;
Feuston, Jessica L. ;
Hiruncharoenvate, Chaya ;
Hutto, C. J. ;
Morrison, Shannon ;
Roshan, Parisa Khanipour ;
Pavalanathan, Umashanthi ;
Bruckman, Amy S. ;
De Choudhury, Munmun ;
Gilbert, Eric .
CSCW'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, 2017, :567-580
[7]   Effective reversible data hiding in encrypted image with adaptive encoding strategy [J].
Fu, Yujie ;
Kong, Ping ;
Yao, Heng ;
Tang, Zhenjun ;
Qin, Chuan .
INFORMATION SCIENCES, 2019, 494 :21-36
[8]  
Gadekallu T.R., 2021, arXiv
[9]   Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing [J].
Hua, Zhongyun ;
Wang, Yanxiang ;
Yi, Shuang ;
Zhou, Yicong ;
Jia, Xiaohua .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (08) :4968-4982
[10]   Face/Off: Preventing Privacy Leakage From Photos in Social Networks [J].
Ilia, Panagiotis ;
Polakis, Iasonas ;
Athanasopoulos, Elias ;
Maggi, Federico ;
Ioannidis, Sotiris .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :781-792