Social Network Content Management through Watermarking

  title={Social Network Content Management through Watermarking},
  author={Athanasios Zigomitros and Achilleas Papageorgiou and C. Patsakis},
  journal={2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications},
  • Athanasios Zigomitros, Achilleas Papageorgiou, C. Patsakis
  • Published 2012
  • Computer Science
  • 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
  • Due to the rise of social media, several new needs, problems and challenges have emerged in users' privacy and security policies. Two very serious problems that should be addressed are identity theft and unauthorized content sharing. In this work we propose a more secure scheme for privacy in social networks by the use of watermarking that manages to diminish these problems, at least inside current social media architectures, without the need for building them from scratch. 
    15 Citations

    Figures, Tables, and Topics from this paper

    Explore Further: Topics Discussed in This Paper

    Distributing privacy policies over multimedia content across multiple online social networks
    • 15
    • PDF
    Cyber Security Concerns in Social Networking Service
    • 1
    Realizing the Right to Be Forgotten in an SNS Environment
    • 1
    Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?
    • PDF
    Methods for Information Hiding in Open Social Networks
    • 1
    • PDF
    Image watermarking based on DWT coefficients modification for social networking services
    • 12


    Preserving Relation Privacy in Online Social Network Data
    • 46
    Survey of Trust Based Communications in Social Networks
    • 10
    Information revelation and privacy in online social networks
    • 2,273
    • PDF
    Examining privacy and disclosure in a social networking community
    • 104
    • PDF
    The First 50 Years of Electronic Watermarking
    • 394
    • PDF
    Information Hiding: Techniques for Steganography and Digital Watermarking
    • 1,151
    • PDF
    Digital Watermarking and Steganography
    • 1,644