Submit your paper : editorIJETjournal@gmail.com Paper Title : RECOGNIZING USER PORTRAIT FOR FRAUDULENT IDENTIFICATION ON SOCIAL NETWORKS USING BLOCKCHAIN AND WATERMARKING ALGORITHM ISSN : 2395-1303 Year of Publication : 2020 10.29126/23951303/IJET-V6I2P21 MLA Style: -Kailash Nath Mandal,Ramesh Reddy,,Changal Rayudu, Deepa R"RECOGNIZING USER PORTRAIT FOR FRAUDULENT IDENTIFICATION ON SOCIAL NETWORKS USING BLOCKCHAIN AND WATERMARKING ALGORITHM" Volume 6 - Issue 2(1-6) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: -Kailash Nath Mandal,Ramesh Reddy,,Changal Rayudu, Deepa R"RECOGNIZING USER PORTRAIT FOR FRAUDULENT IDENTIFICATION ON SOCIAL NETWORKS USING BLOCKCHAIN AND WATERMARKING ALGORITHM" Volume 6 - Issue 2(1-6) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract On-line Social Networks (OSNs) are increasingly influencing the way people communicate with each other and share personal, professional and political information. Well known sites such as Facebook, LinkedIn, Twitter, and Google+ have millions of users across the globe. With the wide popularity there are lot of security and privacy threats to the users of Online Social Networks (OSN) such as breach of privacy, viral marketing, structural attacks, malware attacks and Profile Cloning. Social Networks have permitted people have their own virtual identities which they use to interact with other online users. It is also completely possible and not uncommon for a user to have more than one online profile or even a completely different anonymous online identity. Sometimes it is needed to unmask the anonymity of certain profiles, or to identify two difference profiles as belonging to the same user. Entity Resolution (ER) is the task of matching two different online profiles potentially from social networks. Solving ER has an identification of fake profiles. Our solution compares profiles based similar attributes and user uploaded image streak using block chain and watermarking technology. The system was tasked with matching two profiles that were in a pool of extremely similar profiles. Reference [1] J. T. Hancock, L. Curry, S. Goorha, and M. Woodworth Automated linguistic analysis of deceptive and truthful synchronous computer- mediated communication-IEEE, 2005. [2] A. Karpathy and L. Fei-Fei. Deep visual-semantic alignments for generating image descriptions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3128–3137, 2015. [3] G. Kontaxis, I. Polakis, S. Ioannidis, and E. P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295–300. IEEE, 2011. [4] J. Donahue, L. Anne Hendricks, S. Guadarrama, M. Rohrbach, S. Venugopalan, K. Saenko, and T. Darrell. IEEE Conference on Computer Vision and Pattern Recognition, pages 2625–2634, 2015.. [5] R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, 2014. [6] S. Gould, R. Fulton, and D. Koller. Decomposing a scene into geometric and semantically consistent regions. In Computer Vision, 2009 IEEE 12th International Conference on, pages 1–8. IEEE, 2009. [7] S. Ji, W. Xu, M. Yang, and K. Yu, “3D convolutional neural networks for human action recognition,” in IEEE Trans. Pattern Anal. Mach. Intell., 2013. [8] Y. Wang and G. Mori, “Max-Margin Hidden Conditional Random Fields for Human Action Recognition,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 872-879, 2009. [9] O. Duchenne, I. Laptev, J. Sivic, F. Bach, and J. Ponce, “Automatic Annotation of Human Actions in Video,” Proc. 12th IEEE Int’l Conf. Computer Vision, pp. 1491-1498, 2009. [10] M. Ranzato, F. Huang, Y. Boureau, and Y. LeCun, “Unsupervised Learning of Invariant Feature Hierarchies with Applications to Object Recognition,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2007. Keywords |