{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:12:59Z","timestamp":1651795979915},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"abstract":"<jats:p>Despite research work achieving progress in preserving the privacy of user profiles and visual surveillance, correcting problems in social media have not taken a great step. The reason is the lack of effective modelling, computational algorithms, and resultant evaluations in quantitative research. In this article, the authors take social media into consideration and link users together under the umbrella of social networks so as to exploit a way that the potential problems related to media privacy could be solved. The author's contributions are to propose tensor product-based progressive scrambling approaches for privacy preservation of social media and apply our approaches to the given social media which may encapsulate privacy before being viewed so as to achieve the goal of privacy preservation in anonymity, diverse and closeness. These approaches fully preserve the media information of the scrambled image and make sure it is able to be restored. The results show the proposed privacy persevering approaches are effective and have outstanding performance in media privacy preservation.<\/jats:p>","DOI":"10.4018\/ijdcf.2018040104","type":"journal-article","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T15:22:43Z","timestamp":1519831363000},"page":"56-73","source":"Crossref","is-referenced-by-count":0,"title":["Progressive Scrambling for Social Media"],"prefix":"10.4018","volume":"10","author":[{"given":"Wei Qi","family":"Yan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Auckland University of Technology, Auckland, New Zealand"}]},{"given":"Xiaotian","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Jinan University, Guangzhou, China, and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences Beijing, China"}]}],"member":"2432","container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=201536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T23:55:06Z","timestamp":1651794906000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2018040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":0,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2018040104","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}