ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Identification of user accounts by image comparison: the pHash-based approach

Journal: Scientific and Technical Journal of Information Technologies, Mechanics and Optics (Vol.21, No. 4)

Publication Date:

Authors : ;

Page : 562-570

Keywords : online social networks; user identification; image processing; pHash; data science; social engineering attacks;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The study presents a new approach to the identification of various online social networks' users that allows for matching of accounts belonging to the same person. To achieve this goal, images extracted from digital footprints of users are used. The proposed new approach compares not only the main images of a user's profile, but also all the elements of the graphic content published in a user's account. The described approach requires a pairwise comparison of the images published by users in two accounts from different online social networks on the “all-to-all” principle to assess the probability that these accounts belong to the same user. The comparison of the labeled graphical content elements is performed using the well-known perceptual hash method called pHash. A computational experiment was conducted to evaluate the results obtained by using the proposed approach, the f1-score achieved 0.886 for three matched images. It is shown that the results of the pHash image comparison can be used for account identification as a standalone approach as well as to complement other identification approaches. The proposed algorithm can be used to supplement the existing methods for comparative analysis of accounts. Automation of the proposed approach provides a tool for aggregation and makes it possible to obtain more information about users, assessing the depth of their personality features. The results can be applied to forming a digital twin of the user for further description of his (or her) traits in the tasks of protection against social engineering attacks, targeted advertising, assessment of creditworthiness, and other studies related to online social networks and social sciences

Last modified: 2021-08-24 16:57:31