Secrecy Regulation and Obstruction of Photo Theft on Social Platform
I. Mary Linda1, C. Anuradha2, S. Pothumani3
1Mary Linda, Department of CSE, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
2C. Anuradha, Department of CSE, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
3S. Pothumani, Department of CSE, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
Manuscript received on 05 November 2019 | Revised Manuscript received on 13 December 2019 | Manuscript Published on 31 December 2019 | PP: 64-69 | Volume-9 Issue-2S4 December 2019 | Retrieval Number: B10771292S419/2019©BEIESP | DOI: 10.35940/ijitee.B1077.1292S419
Open Access | Editorial and Publishing Policies | Cite | Zenodo | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Nowadays, People are well-connected to one another in Social Networks. Usage of Internet and involvement in Online Social Platforms are increasing day by day. People sharing their personal information in these platforms. Even, they started Uploading their Photo in the Internet and it became very common among the Internet users. Without understanding the risk, user involved in sharing their personal details. Some fraudulent users uploading another user’s photo without their knowledge. They are getting photos of others in many ways such as by taking photos using their mobile cameras, collecting images from Social networks, stealing images from the theft mobile. They are posting the photos in the Social media applications which are stored enduringly in the database. This results in the misuse of photo and involved in many criminal activities. To overcome this security problem, a competent face recognition system is needed which identify the user in the photo. To handle this, a set of users, friends list and their private photographs. This system accomplished as an evidence of approach in social network on Facebook application.
Keywords: Photo Theft, Internet Platform, Collaborative Approach, Securing Image.
Scope of the Article: Social Networks