Identification of user accounts by image comparison: the pHash-based approach
Journal: Scientific and Technical Journal of Information Technologies, Mechanics and Optics (Vol.21, No. 4)Publication Date: 2021-08-24
Authors : Oliseenko V.D. Abramov M.V. Tulupyev A.L.;
Page : 562-570
Keywords : online social networks; user identification; image processing; pHash; data science; social engineering attacks;
Abstract
The study presents a new approach to the identification of various online social networks' users that allows for matching of accounts belonging to the same person. To achieve this goal, images extracted from digital footprints of users are used. The proposed new approach compares not only the main images of a user's profile, but also all the elements of the graphic content published in a user's account. The described approach requires a pairwise comparison of the images published by users in two accounts from different online social networks on the “all-to-all” principle to assess the probability that these accounts belong to the same user. The comparison of the labeled graphical content elements is performed using the well-known perceptual hash method called pHash. A computational experiment was conducted to evaluate the results obtained by using the proposed approach, the f1-score achieved 0.886 for three matched images. It is shown that the results of the pHash image comparison can be used for account identification as a standalone approach as well as to complement other identification approaches. The proposed algorithm can be used to supplement the existing methods for comparative analysis of accounts. Automation of the proposed approach provides a tool for aggregation and makes it possible to obtain more information about users, assessing the depth of their personality features. The results can be applied to forming a digital twin of the user for further description of his (or her) traits in the tasks of protection against social engineering attacks, targeted advertising, assessment of creditworthiness, and other studies related to online social networks and social sciences
Other Latest Articles
- Risk assessment methodology for information systems, based on the user behavior and IT-security incidents analysis
- The speech synthesis detection algorithm based on cepstral coefficients and convolutional neural network
- Bayesian losses for homoscedastic aleatoric uncertainty modeling in pollen image detection
- An automata-based programming engine
- Determination of dangerous driving behavior based on the use of information from wearable electronic devices
Last modified: 2021-08-24 16:57:31