{"id":"https://openalex.org/W2062018798","doi":"https://doi.org/10.1109/ic3.2013.6612231","title":"A new face to photo security of Facebook","display_name":"A new face to photo security of Facebook","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2062018798","doi":"https://doi.org/10.1109/ic3.2013.6612231","mag":"2062018798"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2013.6612231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612231","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101590080","display_name":"Rajat Sharma","orcid":"https://orcid.org/0000-0003-1344-1027"},"institutions":[{"id":"https://openalex.org/I166533956","display_name":"Institute of Management Technology","ror":"https://ror.org/05k0kb696","country_code":"IN","type":"education","lineage":["https://openalex.org/I166533956"]},{"id":"https://openalex.org/I4387154809","display_name":"ABES Engineering College","ror":"https://ror.org/04hp0cf98","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154809"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajat Sharma","raw_affiliation_strings":["ABES Engineering College, Ghaziabad, Uttar Pradesh, India","ABES Eng. Coll. Ghaziabad (U.P.), Ghaziabad, India"],"affiliations":[{"raw_affiliation_string":"ABES Engineering College, Ghaziabad, Uttar Pradesh, India","institution_ids":["https://openalex.org/I166533956","https://openalex.org/I4387154809"]},{"raw_affiliation_string":"ABES Eng. Coll. Ghaziabad (U.P.), Ghaziabad, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022735324","display_name":"Akshay Jain","orcid":"https://orcid.org/0000-0002-6986-2720"},"institutions":[{"id":"https://openalex.org/I4387154809","display_name":"ABES Engineering College","ror":"https://ror.org/04hp0cf98","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154809"]},{"id":"https://openalex.org/I166533956","display_name":"Institute of Management Technology","ror":"https://ror.org/05k0kb696","country_code":"IN","type":"education","lineage":["https://openalex.org/I166533956"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Akshay Jain","raw_affiliation_strings":["ABES Engineering College, Ghaziabad, Uttar Pradesh, India","ABES Eng. Coll. Ghaziabad (U.P.), Ghaziabad, India"],"affiliations":[{"raw_affiliation_string":"ABES Engineering College, Ghaziabad, Uttar Pradesh, India","institution_ids":["https://openalex.org/I166533956","https://openalex.org/I4387154809"]},{"raw_affiliation_string":"ABES Eng. Coll. Ghaziabad (U.P.), Ghaziabad, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087225276","display_name":"Rohit Rastogi","orcid":"https://orcid.org/0000-0002-6402-7638"},"institutions":[{"id":"https://openalex.org/I166533956","display_name":"Institute of Management Technology","ror":"https://ror.org/05k0kb696","country_code":"IN","type":"education","lineage":["https://openalex.org/I166533956"]},{"id":"https://openalex.org/I4387154809","display_name":"ABES Engineering College","ror":"https://ror.org/04hp0cf98","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154809"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rohit Rastogi","raw_affiliation_strings":["ABES Engineering College, Ghaziabad, Uttar Pradesh, India","ABES Eng. Coll. Ghaziabad (U.P.), Ghaziabad, India"],"affiliations":[{"raw_affiliation_string":"ABES Engineering College, Ghaziabad, Uttar Pradesh, India","institution_ids":["https://openalex.org/I166533956","https://openalex.org/I4387154809"]},{"raw_affiliation_string":"ABES Eng. Coll. Ghaziabad (U.P.), Ghaziabad, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101590080"],"corresponding_institution_ids":["https://openalex.org/I166533956","https://openalex.org/I4387154809"],"apc_list":null,"apc_paid":null,"fwci":2.9256,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.92497407,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"20","issue":null,"first_page":"415","last_page":"420"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9620000123977661,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12335","display_name":"Sexuality, Behavior, and Technology","score":0.9520999789237976,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.8137882947921753},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.7933235168457031},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6415956020355225},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.5847364664077759},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5328066349029541},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5003046989440918},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4989149570465088},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4841197431087494},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4417503774166107},{"id":"https://openalex.org/keywords/dignity","display_name":"Dignity","score":0.41972947120666504},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.25289997458457947},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.19965964555740356},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1500731110572815}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.8137882947921753},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.7933235168457031},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6415956020355225},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.5847364664077759},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5328066349029541},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5003046989440918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4989149570465088},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4841197431087494},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4417503774166107},{"id":"https://openalex.org/C2778745096","wikidata":"https://www.wikidata.org/wiki/Q274782","display_name":"Dignity","level":2,"score":0.41972947120666504},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.25289997458457947},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.19965964555740356},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1500731110572815},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2013.6612231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612231","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2093018575","https://openalex.org/W2150045067","https://openalex.org/W2154767394","https://openalex.org/W2231799954","https://openalex.org/W2287630137","https://openalex.org/W4238847454","https://openalex.org/W4285719527","https://openalex.org/W6696178474"],"related_works":["https://openalex.org/W4308771405","https://openalex.org/W2355873265","https://openalex.org/W2741331843","https://openalex.org/W2963669501","https://openalex.org/W3112369086","https://openalex.org/W3080197661","https://openalex.org/W4285330415","https://openalex.org/W3019357012","https://openalex.org/W4309855126","https://openalex.org/W3133620962"],"abstract_inverted_index":{"This":[0],"research":[1,298],"paper":[2,85],"focuses":[3],"on":[4,27,146,172,182,301,316,345],"the":[5,38,43,92,105,131,139,155,161,183,232,257,274,302,325],"sensitive":[6,88],"issue":[7,89,185],"of,":[8],"misuse":[9,291],"of":[10,56,58,64,94,133,150,157,160,186,207,211,322],"an":[11,22,69,109,127,239],"individual's":[12,23,70,240],"photo":[13,190,213],"via":[14],"internet,":[15],"where":[16,45,108,224,266],"it's":[17],"been":[18],"shown":[19,334],"that,":[20,335],"how":[21,126,336],"privacy":[24],"can":[25,30,129,243,281,290,308,338,348],"be":[26,31,244,282,309,339,349],"stake":[28],"and":[29,53,66,90,117,168,196,200,235,246,250,279,341,353],"a":[32,54,320],"threat":[33,113],"to":[34,68,74,103,114],"his/her":[35,192],"dignity":[36],"in":[37,170,256],"society.":[39],"Cybercrime":[40],"today":[41],"tops":[42],"chart,":[44],"social":[46,97,174],"networking":[47,98,175],"sites":[48],"often":[49],"become":[50],"soft":[51],"target":[52],"pitcher":[55],"source":[57],"ideas":[59],"for":[60,324],"committing":[61],"heinous":[62],"acts":[63],"disgrace":[65],"harm":[67],"privacy,":[71],"so":[72],"as":[73],"lure":[75],"out":[76],"some":[77,205],"profit,":[78],"hidden":[79],"behind":[80],"such":[81,286],"criminal":[82,251],"minds.":[83],"Our":[84,297],"highlights":[86],"this":[87,151,173,212],"with":[91,154,180,218],"example":[93],"Facebook":[95,162,195],"(largest":[96],"site),":[99],"we":[100,123,260,267,332],"will":[101,124],"try":[102],"share":[104],"different":[106],"scenarios":[107],"individual":[110],"may":[111],"face":[112],"his":[115],"vulnerability":[116,323],"through":[118],"our":[119,264,329],"original":[120],"proposed":[121,330],"work,":[122,299],"show":[125],"anti-copier":[128],"prevent":[130],"copying":[132,187,214],"one's":[134,188],"personal":[135,189,342],"data":[136,242,343],"by":[137,237,248,272,293],"all":[138,231],"possible":[140,233,295],"means":[141],"from":[142,194],"any":[143,294,312],"website":[144],"available":[145,315],"internet.":[147],"The":[148],"beginning":[149],"paper,":[152],"seeks":[153],"discussion":[156],"present":[158],"scenario":[159],"where,":[163],"whatever":[164],"is":[165,169,177,227],"presently":[166],"available,":[167],"use":[171],"site,":[176],"discussed":[178],"along":[179],"focussing":[181],"main":[184],"without":[191],"consent,":[193],"sharing":[197],"it":[198,292],"whenever":[199],"wherever":[201],"one":[202],"wants.":[203],"Then,":[204],"addition":[206],"resulting":[208],"outcomes,":[209],"because":[210],"lacuna,":[215],"are":[216,253],"elaborated":[217],"descriptive":[219],"images":[220],"at":[221],"every":[222],"instance":[223],"there":[225],"requirement":[226],"demanded.":[228],"Later":[229],"on,":[230],"ways":[234],"methods":[236],"which":[238,273],"private":[241],"used":[245],"misused":[247],"offenders":[249],"minds":[252],"highlighted.":[254],"Further,":[255],"final":[258],"phase,":[259],"have":[261,268,333],"put":[262],"forward":[263],"approach":[265],"suggested":[269],"several":[270],"hypotheses":[271],"database":[275],"like":[276],"images,":[277],"videos":[278],"text":[280],"made":[283,350],"more":[284,303,351],"secured":[285],"that":[287,307,318],"no":[288],"intruder":[289],"means.":[296],"focus":[300],"security":[304],"resolving":[305],"techniques":[306],"applied":[310],"over":[311],"community":[313],"site":[314],"internet":[317],"provides,":[319],"lot":[321],"same":[326],"concern.":[327],"By,":[328],"work":[331],"authenticity":[337],"retained":[340],"uploaded":[344],"these":[346],"sites,":[347],"confidential":[352],"personal.":[354]},"counts_by_year":[{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
