Abstract
Aim: To explore information leakage tracking algorithms in online social networks and
solve the problem of information leakage in the current online social network, a deterministic leaker
tracking algorithm based on digital fingerprints is proposed.
Background: The basic working principle of the algorithm is that the platform uses plug-ins to embed
unique user-identifying information before users try to obtain digital media such as images and
videos shared by others on the platform.
Objective: Because the scale of users in social networks is extremely large and dynamic, while ensuring
the uniqueness of digital fingerprints, it is also necessary to ensure the coding efficiency and
scalability of digital fingerprint code words.
Methods: Simulation experiments show that 10 experiments are performed on 10,000–100,000
nodes, the Hamming distance threshold is set to 3, and the length of the hash code and the binary
random sequence code are both 64 bits.
Results: The proposed digital fingerprint fast detection scheme exhibits better performance than
conventional linear search.
Conclusion: An index table based on hash code and user ID is established and combined with
community structure to improve the detection efficiency of digital fingerprints.
Keywords:
Leaker tracking, digital fingerprint, trust model, neighbor hash, social network, OSN
[1]
Y. Feng, S. Zhao, and G. Yu, "Research on moving target tracking algorithm based on computer vision in complex scene", Rev. Fac. Ing., vol. 32, no. 16, pp. 784-790, 2017.
[2]
Y. Zhao, "Research on extracting bpm feature values in music beat tracking algorithm", Rev. Fac. Ing., vol. 32, no. 5, pp. 209-216, 2017.
[3]
P.C. Lin, and P.Y. Lin, "Unintentional and involuntary personal information leakage on facebook from user interactions", Trans. Internet Inf. Syst., vol. 10, no. 7, pp. 3301-3318, 2016.
[7]
Zhou and Tian, "Research on community detection of online social network members based on the sparse subspace clustering approach", Future Internet, vol. 11, no. 12, p. 254, 2019.
[10]
A. Mohammadi, and H. Hamidi, "Analyzing tools and algorithms for privacy protection and data security in social networks", Int. J. Eng. Trans. B: Appl., vol. 31, no. 8, pp. 1267-1273, 2018.
[15]
C. Zhang, "Research on data forwarding method based on TCC-aware in mobile social networks", J. Liaoning Tech. Univ., vol. 36, no. 4, pp. 437-444, 2017.
[17]
G. Veselov, A. Tselykh, A. Sharma, and R. Huang, "Applications of artificial intelligence in evolution of smart cities and societies", Informatica, vol. 45, no. 5, p. 603, 2021.
[18]
Y. Li and A. Sharma, "Regional network education information collection platform for smart classrooms based on big data technology", Informatica, vol. 45, no. 5, 2021.
[23]
A.K. Ghoshal, N. Das, and S. Das, "Influence of community structure on misinformation containment in online social networks", Knowl. Base. Syst.. vol. 213, no. 1, pp. 106693, 2020.