{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:38:59Z","timestamp":1762781939480},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319263618"},{"type":"electronic","value":"9783319263625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_20","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T14:10:45Z","timestamp":1445868645000},"page":"427-447","source":"Crossref","is-referenced-by-count":10,"title":["Privacy Risk Assessment on Online Photos"],"prefix":"10.1007","author":[{"given":"Haitao","family":"Xu","sequence":"first","affiliation":[]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Angelos","family":"Stavrou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"20_CR1","unstructured":"Number of photos uploaded to Flickr. \n                      https:\/\/www.flickr.com\/photos\/franckmichel\/6855169886\/"},{"key":"20_CR2","unstructured":"ExifTool library. \n                      http:\/\/www.sno.phy.queensu.ca\/~phil\/exiftool\/"},{"key":"20_CR3","unstructured":"Site stolencamerafinder: Find your camera. \n                      http:\/\/www.stolencamerafinder.com\/"},{"key":"20_CR4","unstructured":"Alexa top sites by category. \n                      http:\/\/www.alexa.com\/topsites\/category\/Top"},{"key":"20_CR5","unstructured":"McAfee\u2019s location is leaked with photo metadata. \n                      http:\/\/www.wired.co.uk\/news\/archive\/2012-12\/04\/vice-give-away-mcafee-location"},{"key":"20_CR6","unstructured":"Facebook: \n                      https:\/\/www.facebook.com\/"},{"key":"20_CR7","unstructured":"Twitter: \n                      https:\/\/twitter.com\/"},{"key":"20_CR8","unstructured":"Google+: \n                      https:\/\/plus.google.com\/"},{"key":"20_CR9","unstructured":"500px: \n                      https:\/\/500px.com\/"},{"key":"20_CR10","unstructured":"Flickr file size limits. \n                      https:\/\/www.flickr.com\/help\/photos\/"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Clark, J.W., Snyder, P., McCoy, D., Kanich, C.: I saw images I didn\u2019t even know I had: understanding user perceptions of cloud storage privacy. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) (2015)","DOI":"10.1145\/2702123.2702535"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., Nair, R.: Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) (2007)","DOI":"10.1145\/1240624.1240683"},{"key":"20_CR13","unstructured":"Besmer, A., Lipford, H.R.: Poster: privacy perceptions of photo sharing in facebook. In: Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS) (2008)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-41320-9_9","volume-title":"Financial Cryptography and Data Security","author":"B Henne","year":"2013","unstructured":"Henne, B., Smith, M.: Awareness about photos on the web and how privacy-privacy-tradeoffs could help. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 131\u2013148. Springer, Heidelberg (2013)"},{"key":"20_CR15","unstructured":"Friedland, G., Sommer, R.: Cybercasing the joint: on the privacy implications of geo-tagging. In: Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec) (2010)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Mahmood, S., Desmedt, Y.: Poster: preliminary analysis of Google+\u2019s privacy. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS) (2011)","DOI":"10.1145\/2046707.2093499"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Pesce, J.P., Casas, D.L., Rauber, G., Almeida, V.: Privacy attacks in social media using photo tagging networks: a case study with Facebook. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM) (2012)","DOI":"10.1145\/2185354.2185358"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web (WWW) (2010)","DOI":"10.1145\/1772690.1772727"},{"key":"20_CR19","unstructured":"Ra, M., Govindan, R., Ortega, A.: P3: toward privacy-preserving photo sharing. In: Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2013)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., Ioannidis, S.: Face\/Off: preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS) (2015)","DOI":"10.1145\/2810103.2813603"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Henne, B., Szongott, C., Smith, M.: SnapMe if you can: privacy threats of other peoples\u2019 geo-tagged media and what we can do about it. In: Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2013)","DOI":"10.1145\/2462096.2462113"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Besmer, A., Lipford, H.R.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the 28th SIGCHI Conference on Human Factors in Computing Systems (CHI) (2010)","DOI":"10.1145\/1753326.1753560"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Zerr, S., Siersdorfer, S., Hare, J., Demidova, E.: Privacy-aware image classification and search. In: Proceedings of the 35th International ACM Conference on Research and Development in Information Retrieval (SIGIR) (2012)","DOI":"10.1145\/2348283.2348292"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T09:26:07Z","timestamp":1559294767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}