International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-4  ( Apr, 2024 )
Past issues
  1. Volume-12,Issue-3  ( Mar, 2024 )
  2. Volume-12,Issue-2  ( Feb, 2024 )
  3. Volume-12,Issue-1  ( Jan, 2024 )
  4. Volume-11,Issue-12  ( Dec, 2023 )
  5. Volume-11,Issue-11  ( Nov, 2023 )
  6. Volume-11,Issue-10  ( Oct, 2023 )
  7. Volume-11,Issue-9  ( Sep, 2023 )
  8. Volume-11,Issue-8  ( Aug, 2023 )
  9. Volume-11,Issue-7  ( Jul, 2023 )
  10. Volume-11,Issue-6  ( Jun, 2023 )

Statistics report
Jul. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 136
Paper Published : 1596
No. of Authors : 4179
  Journal Paper

Paper Title :
Characterizing Suspicious Images in Social Media Using EXIF Metadata

Author :Sanket Ingale, Mayank Mehta

Article Citation :Sanket Ingale ,Mayank Mehta , (2013 ) " Characterizing Suspicious Images in Social Media Using EXIF Metadata " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 01-06, Volume-1,Issue-4

Abstract : Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users.Media sharing applications on internet contain a huge amount of pictures that need to be organized to facilitate browsing and retrieval. Images sent via online lately are becoming one of the main sources of attack to the client machine. Images are vulnerable to malicious embedded hidden data, most often because of the image contents are made attractive and code is hidden behind with executable. When those images are opened in some image viewer, they are vulnerable to execute the piece of code embedded in images, leaves behind the virus/worm on the machine. In the proposed system of image metadata extraction, there is provision of discarding the malicious images. This characterization is based upon the detailed skin tone analysis performed to affirm the presence of vulgar content in the images. We will try to show result experimentally that the proposed system performs well and fast in detecting vulgar images. The images should be reviewed whether they are malicious before they are opened so that the client can be prevented from being infected from malware.

Type : Research paper

Published : Volume-1,Issue-4


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 35
| Published on 2014-01-18
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World