A Survey of Algorithms Used for the Prevention of Fake Profiles in Social Networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A great many dynamic clients all around the globe are utilizing on the web informal community, for example, Facebook, Twitter, Tumbler and LinkedIn. These shortcomings make it easy to abuse client's data and do personality cloning assault to frame counterfeit profile. In this proposed framework, information concealing systems to shroud some data in profile pictures with a specific end goal to identify botnets and counterfeit profiles. This venture introduces an order and examination of discovery instruments of clone attacks on online interpersonal organization, in light of trait similitude, companion arrange closeness, and profile investigation for a period interim and record of Internet Protocol groupings. In this task we have proposed discrete wavelet change calculation for information covering up. In this manner this would keep the clone assaults and giving complete client information protection saving. Likewise when clients transfer the profile pictures they can be watermarked and refreshed. For the watermarking method Java static watermark can be used. Any phony clients refreshing a similar profile picture can be distinguished and their separate IP would be followed and blocked. Likewise for secure picture transmission, we utilized Discrete Wavelet Transform (DWT) for information concealing/steganography and Discrete Cosine Transform (DCT) for picture pressure.

     

     


  • Keywords


    Fake profile, clone attacks, DWT, DCT, watermarking.

  • References


      [1] Mauro Conti, Radha Poovendran, Marco Secchiero "FakeBook: Detecting Fake Profiles in On-line Social Networks" IEEE 2012

      [2] Chunyan Zhang, JingBing Li "An encrypted medical ,mage retrieval algorithm based on DWT-DCT ) frequency domain" IEEE 2017

      [3] Aditi Gupta and Rishabh Kaushal "Towards Detecting Fake User Accounts in Facebook"

      [4] Deepti Dave, Nishchol Mishra and Sanjeev Sharma "Detection Techniques of Clone Attack on Online Social Networks: Survey and Analysis", Elsevier

      [5] Jiri Fridrich SUNY Binghamton and Mission Research Corporation , "A HYBRID WATERMARK FOR TAMPER DETECTION IN DIGITAL IMAGES", Fifth International Symposium on Signal Processing and its Applications, ISSPA ‘99, Brisbane, Australia, 22-25 August, 1999 Organised by the Signal Processing Research Centre, QUT, Brisbane, Australia

      [6] Yiwei Wang,, John F. Doherty, and Robert E. Van Dyck "A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images", IEEE 2002

      [7] Rubal Grewal, Jasleen Kaur, "A Survey on Proficient Techniques to Mitigate Clone Attack in Wireless Sensor Networks" IEEE 2015

      [8] Abdullah Bamatraf , Rosziati Ibrahim "Digital Watermarking Algorithm Using LSB" 2010 International Conference on Computer Applications and Industrial Electronics (ICCAIE 2010), December 5-7, 2010, Kuala Lumpur, Malaysia, IEEE 2010

      [9] Georges A. Kamhoua1, Niki Pissinou1, S.S. Iyengar1, Jonathan Beltran "Preventing Colluding Identity Clone Attacks in Online Social Networks" , IEEE 2017

      [10] Ehsan Ahmadizadeha, Erfan Aghasianb,1,Hossein Pour Taheric, Roohollah Fallah Nejadd "An Automated Model to Detect Fake Profiles and botnets in Online Social Networks Using Steganography Technique.", IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. IV (Jan–Feb.2015),PP65-71

      [11] S.V.Manikanthan and V.Rama“Optimal Performance of Key Predistribution Protocol In Wireless Sensor Networks” International Innovative Research Journal of Engineering and Technology ,ISSN NO: 2456-1983,Vol-2,Issue –Special –March 2017.

      [12] T. Padmapriya and V. Saminadan, “Priority based fair resource allocation and Admission Control Technique for Multi-user Multi-class downlink Traffic in LTE-Advanced Networks”, International Journal of Advanced Research, vol.5, no.1, pp.1633-1641, January 2017.


 

View

Download

Article ID: 12070
 
DOI: 10.14419/ijet.v7i2.24.12070




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.