image sharing
Recently Published Documents


TOTAL DOCUMENTS

658
(FIVE YEARS 213)

H-INDEX

32
(FIVE YEARS 6)

Author(s):  
Marwa Fadhel Jassim ◽  
Wafaa mohammed Saeed Hamzah ◽  
Abeer Fadhil Shimal

Biometric technique includes of uniquely identifying person based on their physical or behavioural characteristics. It is mainly used for authentication. Storing the template in the database is not a safe approach, because it can be stolen or be tampered with. Due to its importance the template needs to be protected. To treat this safety issue, the suggested system employed a method for securely storing the iris template in the database which is a merging approach for secret image sharing and hiding to enhance security and protect the privacy by decomposing the template into two independent host (public) iris images. The original template can be reconstructed only when both host images are available. Either host image does not expose the identity of the original biometric image. The security and privacy in biometrics-based authentication system is augmented by storing the data in the form of shadows at separated places instead of whole data at one. The proposed biometric recognition system includes iris segmentation algorithms, feature extraction algorithms, a (2, 2) secret sharing and hiding. The experimental results are conducted on standard colour UBIRIS v1 data set. The results indicate that the biometric template protection methods are capable of offering a solution for vulnerability that threatens the biometric template.


2022 ◽  
pp. 316-336

If social media is about the social brag and the pose, academic social media has dedicated platforms that enable such shares: learning content sharing platforms (educational channels on social video sharing sites and social image sharing sites, learning object referatories, digital libraries, slideshow sharing sites), research sharing sites, publications and review metrics platforms, social learning sites (MOOCs, LMSes), and others. The academic social brag does not have to be negative or offending; it can be designed and harnessed to improve competition and performance among peer academics (in their social sharing), given the reliance on learner/user numbers to justify the original creation and sharing. This work explores academic social bragging across various academic social sharing platforms, dimensions for how these are judged (positively or negatively), and ways to turn academic social brags into something constructive for social-shared teaching and learning.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Haocheng Fu ◽  
Xianfeng Zhao ◽  
Xiaolei He

With the development of the Internet, social network platforms (SNPs) have become the most common channel for image sharing. As a result, transmitting stego images in the public channels gives steganographers the best opportunity to transmit secret messages with behavioral security preserved. However, the SNPs typically compress uploaded images and damage the weak signal of steganography. In this study, a robust JPEG steganographic scheme based on robustness measurement and cover block selection (CBSRS) is proposed. We first design a deep learning-based model to fit the blockwise change rate of coefficients after JPEG recompression. Then, a cover block selection strategy is proposed to improve the robustness by optimizing the joint distortion function of transmission costs and classic costs. Moreover, by embedding indicator of cover block selection in chrominance channels of JPEG images, a shareable cover construction scheme is designed to solve the problem of auxiliary information transmission. The experimental results show that our proposed framework improves robustness while maintaining statistical security. Comparing with state-of-the-art methods, the framework achieves better performance under given recompression channels.


2021 ◽  
Author(s):  
Yongtai Liu ◽  
Zhijun Yin ◽  
Zhiyu Wan ◽  
Chao Yan ◽  
Weiyi Xia ◽  
...  

BACKGROUND As direct-to-consumer genetic testing (DTC-GT) services have grown in popularity, the public has increasingly relied upon online forums to discuss and share their test results. Initially, users did so under a pseudonym, but more recently, they have included face images when discussing DTC-GT results. When these images truthfully represent a user, they reveal the identity of the corresponding individual. Various studies have shown that sharing images in social media tends to elicit more replies. However, users who do this clearly forgo their privacy. OBJECTIVE This study aimed to investigate the face image sharing behavior of DTC-GT users in an online environment and determine if there exists the association between face image sharing and the attention received from others. METHODS This study focused on r/23andme, a subreddit dedicated to discussing DTC-GT results and their implications. We applied natural language processing to infer the themes associated with posts that included a face image. We applied a regression analysis to learn the association between the attention that a post received, in terms of the number of comments and karma scores (defined as the number of upvotes minus the number of downvotes), and whether the post contains a face image. RESULTS We collected over 15,000 posts from the r/23andme subreddit published between 2012 and 2020. Face image posting began in late 2019 and grew rapidly, with over 800 individuals’ revealing their faces by early 2020. The topics in posts including a face were primarily about sharing or discussing ancestry composition, and sharing family reunion photos with relatives discovered via DTC-GT. On average, posts including a face received 60% (5/8) more comments than other posts, and these posts had karma scores 2.4 times higher than other posts. CONCLUSIONS DTC-GT consumers in the r/23andme subreddit are increasingly posting face images and testing reports on social platforms. The association between face image posting and a greater level of attention suggests that people are forgoing their privacy in exchange for attention from others. To mitigate the risk of face image posting, platforms, or at least subreddit organizers, should inform users about the consequence of such behavior for identity disclosure.


2021 ◽  
pp. 136787792110617
Author(s):  
Kyra Clarke

Teen film is a space where stories about young people’s engagement with technology are told and where relationships and communication are represented. How do girls engage with such stories? This article draws on material from two focus groups held with girls at high schools located in the North Island of Aotearoa New Zealand in November 2019 and places this in the context of other representations of image sharing and texting in teen films over the past 25 years. Participants were shown a scene from Netflix teen film Sierra Burgess Is a Loser (2018), in which Sierra receives a shirtless selfie from Jamey and contemplates how to respond, before finally replying with a picture of a seated elephant. The participants’ discussion illustrates some of the ways girls navigate technology use in their lives and relationships and the complex ways they negotiate popular culture representations of intimacy in teen film.


2021 ◽  
Vol 8 (2) ◽  
pp. 199-212
Author(s):  
Yu Song ◽  
Fan Tang ◽  
Weiming Dong ◽  
Changsheng Xu

AbstractThe development of social networking services (SNSs) revealed a surge in image sharing. The sharing mode of multi-page photo collage (MPC), which posts several image collages at a time, can often be observed on many social network platforms, which enables uploading images and arrangement in a logical order. This study focuses on the construction of MPC for an image collection and its formulation as an issue of joint optimization, which involves not only the arrangement in a single collage but also the arrangement among different collages. Novel balance-aware measurements, which merge graphic features and psychological achievements, are introduced. Non-dominated sorting genetic algorithm is adopted to optimize the MPC guided by the measurements. Experiments demonstrate that the proposed method can lead to diverse, visually pleasant, and logically clear MPC results, which are comparable to manually designed MPC results.


2021 ◽  
pp. 136754942110557
Author(s):  
Zeena Feldman

Through historical, economic and technological contextualisation and empirical data analysis, this article explores the cultural purchase the image-sharing app Instagram and the printed Michelin Guide have on contemporary food criticism. Both platforms contribute to popular understandings of ‘good food’. Yet, there are important functional and discursive distinctions in how culinary criticism is done in Instagram vis-à-vis Michelin. To that end, this article focuses on London’s restaurant scene and proposes the concept of the Instagram gaze as a means of understanding the representational repertoires and knowledge claims advanced by foodies on visual social media platforms. The Instagram gaze also facilitates insight into the relationship between Instagrammers’ culinary judgements and Michelin’ s.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Lina Zhang ◽  
Tong Wang ◽  
Xiangqin Zheng ◽  
Junhan Yang ◽  
Liping Lv

Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mistake of the uploaded data, the abnormal use of the application, and so on. Identifying the authenticity of the data submitted by the nodes is the top priority. We propose a scheme to verify the authenticity of multinode data. In this scheme, the authenticity of node data is checked through visual secret recovery and XOR operation together. The least significant bit (lsb) operation converts data from nodes into a bit, which improves the efficiency of data verification and reduces the risk of data leakage. This scheme achieves the purpose of verifying the data provided by the node, which avoids malicious attacks from illegal nodes. By analyzing the experiment result and comparing with other works, our scheme has the advantages of high verification efficiency, lightweight storage of nodes, and security verification.


Symmetry ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 2063
Author(s):  
Jiang-Yi Lin ◽  
Ji-Hwei Horng ◽  
Chin-Chen Chang

The (k, n)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces n shadow versions. While k (kn) or more shadows are gathered, the embedded secret data and the cover image can be retrieved without any error. This article proposes an optimal (2, 3) RSIS algorithm based on a crystal-lattice matrix. Sized by the assigned embedding capacity, a crystal-lattice model is first generated by simulating the crystal growth phenomenon with a greedy algorithm. A three-dimensional (3D) reference matrix based on translationally symmetric alignment of crystal-lattice models is constructed to guide production of the three secret image shadows. Any two of the three different shares can cooperate to restore the secret data and the cover image. When all three image shares are available, the third share can be applied to authenticate the obtained image shares. Experimental results prove that the proposed scheme can produce secret image shares with a better visual quality than other related works.


Sign in / Sign up

Export Citation Format

Share Document