{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:02:00Z","timestamp":1760058120214,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>In the digital age, sharing moments through photos has become a daily habit. However, every face captured in these photos is vulnerable to unauthorized identification and potential misuse through AI-powered synthetic content generation. Previously, we introduced SnapSafe, a secure system for enabling selective image privacy focusing on facial regions for single-party scenarios. Recognizing that group photos with multiple subjects are a more common scenario, we extend SnapSafe to support multi-user facial privacy protection with dynamic access control designed for online photo platforms. Our approach introduces key splitting for access control, an owner-centric permission system for granting and revoking access to facial regions, and a request-based mechanism allowing subjects to initiate access permissions. These features ensure that facial regions remain protected while maintaining the visibility of non-facial content for general viewing. To ensure reproducibility and isolation, we implemented our solution using Docker containers. Our experimental assessment covered diverse scenarios, categorized as \u201cSingle\u201d, \u201cSmall\u201d, \u201cMedium\u201d, and \u201cLarge\u201d, based on the number of faces in the photos. The results demonstrate the system\u2019s effectiveness across all test scenarios, consistently performing face encryption operations in under 350 ms and achieving average face decryption times below 286 ms across various group sizes. The key-splitting operations maintained a 100% success rate across all group configurations, while revocation operations were executed efficiently with server processing times remaining under 16 ms. These results validate the system\u2019s capability in managing facial privacy while maintaining practical usability in online photo sharing contexts.<\/jats:p>","DOI":"10.3390\/fi17030124","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T10:04:51Z","timestamp":1741687491000},"page":"124","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3899-750X","authenticated-orcid":false,"given":"Andri","family":"Santoso","sequence":"first","affiliation":[{"name":"Graduate School of Environmental, Life, Natural Science and Technology, Okayama University, Okayama 700-8530, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1046-0804","authenticated-orcid":false,"given":"Samsul","family":"Huda","sequence":"additional","affiliation":[{"name":"Green Innovation Center, Okayama University, Okayama 700-8530, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6482-6122","authenticated-orcid":false,"given":"Yuta","family":"Kodera","sequence":"additional","affiliation":[{"name":"Graduate School of Environmental, Life, Natural Science and Technology, Okayama University, Okayama 700-8530, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6247-0719","authenticated-orcid":false,"given":"Yasuyuki","family":"Nogami","sequence":"additional","affiliation":[{"name":"Graduate School of Environmental, Life, Natural Science and Technology, Okayama University, Okayama 700-8530, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TPC.2022.3184428","article-title":"Motivating Factors to Self-Disclosure on Social Media: A Systematic Mapping","volume":"65","author":"Zani","year":"2022","journal-title":"IEEE Trans. Prof. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Wen, Y., Liu, B., Song, L., Cao, J., and Xie, R. (2024). Facial Recognition Technology and the Privacy Risks. Face De-Identification: Safeguarding Identities in the Digital Era, Springer Nature.","DOI":"10.1007\/978-3-031-58222-6"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Yan, W.Q. (2019). Biometrics for Surveillance. Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics, Springer International Publishing.","DOI":"10.1007\/978-3-030-10713-0"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MTS.2017.2728736","article-title":"Biometric Surveillance and the Right to Privacy [Commentary]","volume":"36","author":"Willoughby","year":"2017","journal-title":"IEEE Technol. Soc. Mag."},{"key":"ref_5","unstructured":"Chandler, S. (2025, January 21). Social Media Proves Itself to Be the Perfect Tool for Stalkers. Online Article, Forbes. Available online: https:\/\/www.forbes.com\/sites\/simonchandler\/2019\/10\/11\/social-media-proves-itself-to-be-the-perfect-tool-for-stalkers\/."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"4217","DOI":"10.1109\/TPAMI.2020.2970919","article-title":"A Style-Based Generator Architecture for Generative Adversarial Networks","volume":"43","author":"Karras","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Chen, R., Chen, X., Ni, B., and Ge, Y. (2020, January 12\u201316). SimSwap: An Efficient Framework For High Fidelity Face Swapping. Proceedings of the 28th ACM International Conference on Multimedia, New York, NY, USA. MM \u201920.","DOI":"10.1145\/3394171.3413630"},{"key":"ref_8","unstructured":"Xu, S., Chen, G., Guo, Y.X., Yang, J., Li, C., Zang, Z., Zhang, Y., Tong, X., and Guo, B. (2024). VASA-1: Lifelike Audio-Driven Talking Faces Generated in Real Time. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., and Niessner, M. (November, January 27). FaceForensics++: Learning to Detect Manipulated Facial Images. Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., R\u00f6ssler, A., Thies, J., Nie\u00dfner, M., and Verdoliva, L. (2021, January 10\u201317). ID-Reveal: Identity-aware DeepFake Video Detection. Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), Montreal, QC, Canada.","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Zhang, R., Owens, A., and Efros, A.A. (2020, January 19). CNN-Generated Images Are Surprisingly Easy to Spot\u2026 for Now. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1108\/10662241111158290","article-title":"Reviewing person\u2019s value of privacy of online social networking","volume":"21","author":"Hugl","year":"2011","journal-title":"Internet Res."},{"key":"ref_13","first-page":"1","article-title":"Privacy Intelligence: A Survey on Image Privacy in Online Social Networks","volume":"55","author":"Liu","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MIC.2014.107","article-title":"Privacy Concerns for Photo Sharing in Online Social Networks","volume":"19","author":"Liang","year":"2015","journal-title":"IEEE Internet Comput."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Tajik, K., Gunasekaran, A., Dutta, R., Ellis, B., Bobba, R.B., Rosulek, M., Wright, C.V., and Chi Feng, W. (2019, January 24\u201327). Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. Proceedings of the Network and Distributed System Security (NDSS) Symposium 2019, San Diego, CA, USA.","DOI":"10.14722\/ndss.2019.23432"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Amon, M.J., Hasan, R., Hugenberg, K., Bertenthal, B.I., and Kapadia, A. (2020, January 18\u201321). Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings. Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP40000.2020.00006"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Santoso, A., Huda, S., Nguyen, T.T., Kodera, Y., and Nogami, Y. (2024, January 2\u20135). SnapSafe: Enabling Selective Image Privacy Through YOLO and AES-Protected Facial Encryption with QR Code. Proceedings of the 2024 International Technical Conference on Circuits\/Systems, Computers, and Communications (ITC-CSCC), Okinawa, Japan.","DOI":"10.1109\/ITC-CSCC62988.2024.10628222"},{"key":"ref_18","unstructured":"Jocher, G., Chaurasia, A., and Qiu, J. (2024, December 17). Ultralytics YOLOv8. Available online: https:\/\/docs.ultralytics.com\/models\/yolov8."},{"key":"ref_19","unstructured":"(2025, February 24). Copyright Registration of Photographs (Circular 42), Available online: https:\/\/www.copyright.gov\/circs\/circ42.pdf."},{"key":"ref_20","unstructured":"European Parliament and Council (2025, February 24). Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation). Available online: https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"You, X., Zhao, X., Wang, Y., and Sun, W. (2024). Generation of Face Privacy-Protected Images Based on the Diffusion Model. Entropy, 26.","DOI":"10.3390\/e26060479"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"13164","DOI":"10.1109\/TCSVT.2024.3449290","article-title":"Diff-Privacy: Diffusion-Based Face Privacy Protection","volume":"34","author":"He","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Suwa\u0142a, A., W\u00f3jcik, B., Proszewska, M., Tabor, J., Spurek, P., and \u015amieja, M. (2024, January 3\u20138). Face Identity-Aware Disentanglement in StyleGAN. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), Waikoloa, HI, USA.","DOI":"10.1109\/WACV57701.2024.00514"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1883","DOI":"10.1038\/s41591-022-01966-1","article-title":"A digital mask to safeguard patient privacy","volume":"28","author":"Yang","year":"2022","journal-title":"Nat. Med."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/TDSC.2015.2443795","article-title":"My Privacy My Decision: Control of Photo Sharing on Online Social Networks","volume":"14","author":"Xu","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"75556","DOI":"10.1109\/ACCESS.2019.2921029","article-title":"Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media","volume":"7","author":"Tang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","unstructured":"Jocher, G., Chaurasia, A., Stoken, A., Borovec, J., Kwon, Y., Michael, K., Fang, J. (2024, December 17). YOLOv5 SOTA Realtime Instance Segmentation, v7.0, Zenodo. Available online: https:\/\/doi.org\/10.5281\/zenodo.7347926."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Geng, S., Li, J., Zhang, X., and Wang, Y. (2023). An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding. Entropy, 25.","DOI":"10.3390\/e25081178"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Mfungo, D.E., and Fu, X. (2023). Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps. Entropy, 25.","DOI":"10.3390\/e25111478"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zeng, J., Yan, W., and Ding, Q. (2024). RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System. Entropy, 26.","DOI":"10.3390\/e26100855"},{"key":"ref_31","unstructured":"HashiCorp (2024, December 14). Vault v1.18.x Documentation. Available online: https:\/\/developer.hashicorp.com\/vault\/docs\/v1.18.x."},{"key":"ref_32","unstructured":"HashiCorp (2024, December 14). Auto-auth Method: Application Roles (AppRole). Available online: https:\/\/developer.hashicorp.com\/vault\/docs\/v1.18.x\/agent-and-proxy\/autoauth\/methods\/approle."},{"key":"ref_33","unstructured":"Docker (2024, November 24). Docker Engine Release Notes: Version 27. Available online: https:\/\/docs.docker.com\/engine\/release-notes\/27\/."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Yang, S., Luo, P., Loy, C.C., and Tang, X. (2016, January 27\u201330). WIDER FACE: A Face Detection Benchmark. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.596"},{"key":"ref_35","unstructured":"Ultralytics (2024, November 15). YOLOv8m Pre-Trained Model. Available online: https:\/\/github.com\/ultralytics\/assets\/releases\/download\/v8.2.0\/yolov8m.pt."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Fleet, D., Pajdla, T., Schiele, B., and Tuytelaars, T. (2014, January 6\u201312). Microsoft COCO: Common Objects in Context. Proceedings of the Computer Vision\u2014ECCV 2014, Zurich, Switzerland.","DOI":"10.1007\/978-3-319-10605-2"},{"key":"ref_37","unstructured":"Ultralytics (2024, December 17). YOLOv8 Performance Metrics. Available online: https:\/\/docs.ultralytics.com\/models\/yolov8\/#performance-metrics."},{"key":"ref_38","unstructured":"Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., Killeen, T., Lin, Z., Gimelshein, N., and Antiga, L. (2019). PyTorch: An Imperative Style, High-Performance Deep Learning Library. arXiv."},{"key":"ref_39","unstructured":"(2025, February 21). Stability AI. Stable Diffusion 3.5 Medium. Available online: https:\/\/huggingface.co\/stabilityai\/stable-diffusion-3.5-medium."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/3\/124\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:50:46Z","timestamp":1760028646000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/3\/124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,11]]},"references-count":39,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["fi17030124"],"URL":"https:\/\/doi.org\/10.3390\/fi17030124","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2025,3,11]]}}}