iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-031-27818-1_14
Practical Analyses of How Common Social Media Platforms and Photo Storage Services Handle Uploaded Images | SpringerLink
Skip to main content

Practical Analyses of How Common Social Media Platforms and Photo Storage Services Handle Uploaded Images

  • Conference paper
  • First Online:
MultiMedia Modeling (MMM 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13834))

Included in the following conference series:

Abstract

The research done in this study has delved deeply into the changes made to digital images that are uploaded to three of the major social media platforms and image storage services in today’s society: Facebook, Flickr, and Google Photos. In addition to providing up-to-date data on an ever-changing landscape of different social media networks’ digital fingerprints, a deep analysis of the social networks’ filename conventions has resulted in two new approaches in (i) estimating the true upload date of Flickr photos, regardless of whether the dates have been changed by the user or not, and regardless of whether the image is available to the public or has been deleted from the platform; (ii) revealing the photo ID of a photo uploaded to Facebook based solely on the file name of the photo.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Acker, A.: Data craft: the manipulation of social media metadata. Data Soc. Res Institute 13 (2018)

    Google Scholar 

  2. Beaver, D., Kumar, S., Li, H.C., Sobel, J., Vajgel, P.: Finding a needle in haystack: Facebook’s photo storage. In: 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010) (2010)

    Google Scholar 

  3. Ben-Yair, S.: Updating google photos’ storage policy to build for the future (2020). https://blog.google/products/photos/storage-changes/

  4. Bharati, A., et al.: Beyond pixels: image provenance analysis leveraging metadata. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1692–1702. IEEE (2019)

    Google Scholar 

  5. Broz, M.: Number of photos (2022): Statistics, facts, & predictions (2022). https://photutorial.com/photos-statistics/

  6. Dang-Nguyen, D.T., Pasquini, C., Conotter, V., Boato, G.: Raise: a raw images dataset for digital image forensics. In: Proceedings of the 6th ACM Multimedia Systems Conference, pp. 219–224 (2015)

    Google Scholar 

  7. Ferreira, W.D., Ferreira, C.B., da Cruz Júnior, G., Soares, F.: A review of digital image forensics. Comput. Electr. Eng. 85, 106685 (2020)

    Article  Google Scholar 

  8. Giudice, O., Paratore, A., Moltisanti, M., Battiato, S.: A classification engine for image ballistics of social data. In: Battiato, S., Gallo, G., Schettini, R., Stanco, F. (eds.) ICIAP 2017. LNCS, vol. 10485, pp. 625–636. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68548-9_57

    Chapter  Google Scholar 

  9. Harvey, P.: Exiftool by phil harvey (2013)

    Google Scholar 

  10. Kee, E., Johnson, M.K., Farid, H.: Digital image authentication from jpeg headers. IEEE Trans. Inf. Forensics Secur. 6(3), 1066–1075 (2011)

    Article  Google Scholar 

  11. Marra, F., Poggi, G., Sansone, C., Verdoliva, L.: Blind PRNU-based image clustering for source identification. IEEE Trans. Inf. Forensics Secur. 12(9), 2197–2211 (2017)

    Article  Google Scholar 

  12. Mehta, V., Gupta, P., Subramanian, R., Dhall, A.: Fakebuster: a deepfakes detection tool for video conferencing scenarios. In: 26th International Conference on Intelligent User Interfaces-Companion, pp. 61–63 (2021)

    Google Scholar 

  13. Moltisanti, M., Paratore, A., Battiato, S., Saravo, L.: Image manipulation on facebook for forensics evidence. In: Murino, V., Puppo, E. (eds.) ICIAP 2015. LNCS, vol. 9280, pp. 506–517. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23234-8_47

    Chapter  Google Scholar 

  14. Mullan, P., Riess, C., Freiling, F.: Forensic source identification using jpeg image headers: the case of smartphones. Digit. Investig. 28, S68–S76 (2019)

    Article  Google Scholar 

  15. Pasquini, C., Amerini, I., Boato, G.: Media forensics on social media platforms: a survey. EURASIP J. Inf. Secur. 2021(1), 1–19 (2021). https://doi.org/10.1186/s13635-021-00117-2

    Article  Google Scholar 

  16. Redi, J.A., Taktak, W., Dugelay, J.L.: Digital image forensics: a booklet for beginners. Multim. Tools Appl. 51(1), 133–162 (2011)

    Article  Google Scholar 

  17. Riggs, C., Douglas, T., Gagneja, K.: Image mapping through metadata. In: 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1–8. IEEE (2018)

    Google Scholar 

  18. Sandoval Orozco, A., Arenas González, D., Rosales Corripio, J., García Villalba, L.J., Hernandez-Castro, J.C.: Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing 96(9), 829–841 (2014)

    Article  MATH  Google Scholar 

  19. Siddiqui, N., Anjum, A., Saleem, M., Islam, S.: Social media origin based image tracing using deep CNN. In: 2019 Fifth International Conference on Image Information Processing (ICIIP), pp. 97–101. IEEE (2019)

    Google Scholar 

  20. Sjøen, V.V.: Ibsntools - image ballistics in social networks

    Google Scholar 

  21. Tran, C.H., et al.: Dedigi: a privacy-by-design platform for image forensics. In: Proceedings of the 3rd ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, pp. 58–62 (2022)

    Google Scholar 

  22. Vo, N.H., Phan, K.D., Tran, A.-D., Dang-Nguyen, D.-T.: Adversarial attacks on Deepfake detectors: a practical analysis. In: Þór Jónsson, B., Gurrin, C., Tran, M.-T., Dang-Nguyen, D.-T., Hu, A.M.-C., Huynh Thi Thanh, B., Huet, B. (eds.) MMM 2022. LNCS, vol. 13142, pp. 318–330. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-98355-0_27

    Chapter  Google Scholar 

Download references

Acknowledgement

The results of this study are based on the consulting agreement between the Intelligent Information Systems (I2S) research group, University of Bergen, Norway and University of Science, VNU-HCM, Vietnam. The research was funded by European Horizon 2020 grant number 825469.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Duc-Tien Dang-Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dang-Nguyen, DT., Sjøen, V.V., Le, DH., Dao, TP., Tran, AD., Tran, MT. (2023). Practical Analyses of How Common Social Media Platforms and Photo Storage Services Handle Uploaded Images. In: Dang-Nguyen, DT., et al. MultiMedia Modeling. MMM 2023. Lecture Notes in Computer Science, vol 13834. Springer, Cham. https://doi.org/10.1007/978-3-031-27818-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-27818-1_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-27817-4

  • Online ISBN: 978-3-031-27818-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics