Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models

Jonathan Lepsoy, Suah Kim, Dessalegn Atnafu, Hyoung Joong Kim

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    Privacy and intellectual rights management is becoming an important topic. The existing social network services (SNS) have many limitations in meeting consumers' expectations of their privacy and intellectual rights management. Metadata management in SNS is heterogeneous and susceptible to personal identification and copyright information misuses. There are cases where consumers are not informed in how their metadata is shared and used, while the copyrights of images are removed without the owner's consent. In this paper, we propose two metadata protection models called hierarchical and group-based model. The models are analyzed and evaluated with respect to the interest of user and services.

    Original languageEnglish
    Title of host publication2015 5th International Conference on Information and Communication Technology and Accessibility, ICTA 2015
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9781467387491
    DOIs
    Publication statusPublished - 2016 Mar 7
    Event5th International Conference on Information and Communication Technology and Accessibility, ICTA 2015 - Marrakech, Morocco
    Duration: 2015 Dec 212015 Dec 23

    Publication series

    Name2015 5th International Conference on Information and Communication Technology and Accessibility, ICTA 2015

    Other

    Other5th International Conference on Information and Communication Technology and Accessibility, ICTA 2015
    Country/TerritoryMorocco
    CityMarrakech
    Period15/12/2115/12/23

    Bibliographical note

    Publisher Copyright:
    © 2015 IEEE.

    ASJC Scopus subject areas

    • Information Systems
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models'. Together they form a unique fingerprint.

    Cite this