Browse Prior Art Database

Method to alert possible unauthorized picture sharing on social media

IP.com Disclosure Number: IPCOM000243810D
Publication Date: 2015-Oct-17
Document File: 2 page(s) / 66K

Publishing Venue

The IP.com Prior Art Database

Abstract

This article explains mechanims to protect the misuse of invidual's images/pictures on social media.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 2

Method to alert possible unauthorized picture sharing on social media

Background: 'If we aren't sleeping or alone, we are social media', won't be an exaggeration anymore! how many will disagree? Social media has become such a vital part of our lives that, almost 'everything' is being done on this tricky platform called 'social media'. Started with the core notion of 'staying in touch', now it's touching every aspect of life, be it sharing (almost EVERYTHING), wishing, rewarding, recognizing, invitations, reminders, shopping, job searches and what not. Now we are at a juncture that, we need to have all the precautions, security & insurance from various threats looming around this. Be it illegal/unethical/misleading/unauthorized posts and other such activities.

Problem: One of such grave threats is someone (with malignant intentions) posting your image (original but private/confidential or morphed) on social media (Facebook, LinkedIn, Twitter etc..). This is absolutely unauthorized, illegal and unacceptable crime as the damage can be directed to a person's character to a reputation of a large organization/personality can lead to mental/emotional trauma, death(s) and other losses including financial. Target victims can be anyone, targeted especially at women, celebrities and other popular personalities. This problem is significantly different from unauthorized tagging, where, the victim at least come to know (after a certain time-lapse of course) to take some action before the damage is too deep. In this specific problem, it may be too late or at times, the victim may never come to know till it's spread the entire world.

This primarily works based on the existing facial recognition techniques of social media sites/applications.

When someone uploading a picture (to public or private group), using the facial patterns a search is conducted within the user's network for identifying any contact with such facial patterns.

Upon finding a m...