The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A novel approach for privacy-preserving video sharing
Proceedings of the 14th ACM international conference on Information and knowledge management
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Image Completion Using Global Optimization
CVPR '06 Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Volume 1
Trail re-identification and unlinkability in distributed databases
Trail re-identification and unlinkability in distributed databases
Space-Time Completion of Video
IEEE Transactions on Pattern Analysis and Machine Intelligence
A multimedia access control language for virtual and ambient intelligence environments
Proceedings of the 2007 ACM workshop on Secure web services
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Numerical Recipes 3rd Edition: The Art of Scientific Computing
Numerical Recipes 3rd Edition: The Art of Scientific Computing
Efficient techniques for document sanitization
Proceedings of the 17th ACM conference on Information and knowledge management
Analyzing user modeling on twitter for personalized news recommendations
UMAP'11 Proceedings of the 19th international conference on User modeling, adaption, and personalization
Privacy measures for free text documents: bridging the gap between theory and practice
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Efficient name disambiguation for large-scale databases
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Preserving privacy on the searchable internet
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Region filling and object removal by exemplar-based image inpainting
IEEE Transactions on Image Processing
Video Inpainting Under Constrained Camera Motion
IEEE Transactions on Image Processing
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
IRILD: An Information Retrieval Based Method for Information Leak Detection
EC2ND '11 Proceedings of the 2011 Seventh European Conference on Computer Network Defense
Hi-index | 0.00 |
Outsourcing social multimedia documents is a growing practice among several companies in a way to shift their business globally. It is a cost-effective process where those companies tend to gain more profits disregarding eventual privacy risks. In fact, several case studies have showed that adversaries are capable of identifying individuals, whose identities need to be kept private, using the content of their multimedia documents. In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify the individual. We also provide a sanitizing MD*-algorithm to enforce de-linkability and present a set of experiments to demonstrate its efficiency.