SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 11, Volume 3 (November 2016) www.ijirae.com
_________________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -1
PRIVACY PRESERVATION IN SOCIAL MEDIA BY
IMAGE PROCESSING
Ajay Kumar Teotia, Rajkumar Dukare, Kajal Vende, Poonam Patil, Mrs. Sindhu M.R
Abstract-Photo sharing is a captivating feature which popularizes Online Gregarious Networks (OSNs). Lamentably, it may
leak users’ privacy if they are sanctioned to post, comment, and tag a photo liberatingly. In this paper, we endeavor to address
this issue and study the scenario when a utilizer shares a photo containing individuals other than him/her (termed co-photo for
short). To obviate possible privacy leakage of a photo, we design a mechanism to enable each individual in a photo be
cognizant of the posting activity and participate in the decision making on the photo posting. For this purport, we require an
efficient facial apperception (FR) system that can apperceive everyone in the photo. However, more authoritatively mandating
privacy setting may limit the number of the photos publicly available to train the FR system. To deal with this dilemma, our
mechanism endeavors to utilize users’ private photos to design a personalized FR system concretely trained to differentiate
possible photo co-owners without leaking their privacy. We additionally develop a distributed consensus predicated method to
reduce the computational intricacy and for fend the private training set. We show that our system is superior to other possible
approaches in terms of apperception ratio and efficiency. Our mechanism is implemented as a proof of concept Android
application on Facebook’s platform.
Keywords: Photo Privacy, Social networks, secure multi-party computation, collaborative learning.
I. INTRODUCTION
Gregarious sites have become consequential part of our daily life. Online gregarious networks (OSNs) such as face book, Google
and sound of birds are inherently designed to make able people to part personal and public information and make convivial
connections with friends, coworkers, persons having like position, family, and even with strangers. To keep safe (out of peril)
utilizer facts, way in control has become a chief thing point of OSNs. However it becomes sempiternal record once some
photo/image is posted/uploaded. Tardy consequences can be hazardous; people may utilize it for different unexpected purposes.
For example a posted may reveal the mafia relationship of any celebrity.
A utilizer profile conventionally includes information with deference to the users work history day of inchoation, sex, residence,
fascinates, edification, and, peregrinate information and be in touch information. Moreover, users upload the picture and tag other
people albeit they are willing or not inclined to be a component of uploaded image/content. When other people are tagged the
situation becomes more perplexed. The utilizer uploading the image is planarity incognizant of the consequences that arise for the
person which is involved in tagging or image. Currently nobody can stop such ineluctable situation.
We require having a control over such actions to minimize the perils of photos being tagged or uploaded. In lieu of imposing
restrictions over such incidents or incrementing security, sites like FB and Instagram are inspiriting people to get into such things
more. Most of the times utilizer is reluctant to get tagged or being exposed without his sanction. Is it breach if we share picture
without taking a sanction from all the people involved in picture? To answer this we require explicating the privacy and security
issues over the convivial sites. Whenever a photograph is shared it includes everybody’s security, which can be put on risk if the
congruous sanctions are not sought. We require enforcing maximum level of privacy and security of the content being uploaded on
gregarious sites.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 11, Volume 3 (November 2016) www.ijirae.com
_________________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -2
So while utilizing the online convivial networks one can feel desired level of confidence and security. He/she can confidently
make utilization of gregarious sites without worrying or photos being shared in insecure and unauthorized way. Desired level of
privacy and security is a first consequential thing for a utilizer utilizing online convivial sites. With deference to current
architecture and implementations of gregarious sites, either utilizer will alone because highly imposed security constraints else
will be impacted by several security threats because of low security mechanisms. Few authors studied about the security
challenges because of lack of joint or collaborative control over the images being shared across the online convivial sites. To
minimize this or to planarity eschew this they have suggested gregarious sites like Facebook, Instagram to make utilization of
multi-party privacy model to increment privacy.
There should be mutual acceptable policy to grant access for a photo when multiple utilizers are involved. For security utilizer
might need to engender a group where they can grant access for their uploaded images. Exposure policy can be defined as the
group of users where an image can be accessed when particular utilizer is involved and the privacy policy can be verbalized as the
group of users/friends who can have a direct access of the uploaded images. These two policies are utilized to define the overall
audience or group of users/friends who can be given access to uploaded image. But a fore establishing this there should be a
felicitous process of defining these groups. For this the facial apperceptions are utilized. Most of the times the people found in the
co-photo are proximate friends. So face apperceptions engines are trained for identifying the friends in convivial circle. FR
engines with more precision rates require sizably voluminous number of test data/samples concrete to a person but most of the
times it is not possible.
Users who care about the privacy and security mostly restrict themselves from uploading the photos but if these people are
provided with felicitous privacy preserving techniques then they can post photos without any reluctance. We are designing a
privacy enhancing system of photo sharing which makes utilization of collaborative training system. We are enabling the users of
gregarious site to have own personal FR engine predicated on convivial cognations which will make utilization of images stored in
their personal system. It will avail to build a gregarious relationship tree, which can be utilized for policies for sharing of data. We
make utilization of cryptographic techniques are well to build such training data. We require proposing a secure approach to gain
efficiency and privacy both. The utilizer is trained first from his local training set, betokens set of photos in her gallery. Exposure
policies are defined to have access on photo. And then by ecumenical cognizance of relationships the photo sharing can be
initiated. Determinately data will be distributed to the right people who have access. Efficiency and privacy can be achieved by
simultaneously comparing the current and precedent experiments.
1. The users in a shared photo are automatically detected without being tagged by somebody.
2. We propose a secure sharing of private photos by making utilization of convivial context to have personal FR Engines.
3. We can achieve privacy, security and efficiency.
II. BACKGROUND AND RELATED WORK
1) A Paper on “On the Pergrinate to Consequential Internet Systems” AUTHORS: M B. Carminati, E. Ferrari, and A. Perego.
The degree of edibility of workflow management systems heavily influences the way business processes are executed. Constraint-
predicated representations are deliberated to be more flexible than traditional models because of their semantics: everything that
does not contravene constraints is permissible. Though constraint-predicated representations are elastic, changes to process
descriptions might be desired to comply with evolving business domains and exceptional situations. Elasticity can be enlarged by
run-time support for dynamic changes. Transferring instances to an incipient model and ad-hoc changes. Transmuting the process
definition for one instance. Proposed a general framework for a constraint based process modeling language and its
implementation. Approach fortifies both ad-hoc as well as dynamic changes.
2) A Paper on “Face apperception for ameliorated face annotation in personal photo accumulations shared on online convivial
networks”. AUTHORS: M. Bellare, C. Namprempre, and G. Neven
Utilizing face annotation for efficacious management of personal photos online, Proposed a novel collaborative face apperception
framework enlightening the correctness of face annotation by efficaciously making utilization of many Apperception engines
available in an OSN. In particular collaborative FR framework consists of two major components, cull FR engines and merge
multiple FR results. The cull of FR engines aims at determining a set of customized FR engine which are congruous for kenning
query for facial images belonging to a particular utilizer. For this purport they exploit both convivial network group context in
convivial sites and gregarious context in phone galleries.Adscititiously to capitalize on the availability of multiple FR results
retrieved from the culled FR engines they devise two efficacious solutions for integration Face.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 11, Volume 3 (November 2016) www.ijirae.com
_________________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -3
Apperception results adopting antediluvian techniques for merging many classifier results Experiments were conducted utilizing
around 547 thousand personal photos amassed from a subsisting convivial site networks. Results prove this method gives more
precision matched to conventional Face Apperception approaches that only make utilization of a single FR engine. Further
demonstrated that their collaborative FR framework has a low computational cost and comes with a decentralized design.
3) A Paper on “The FERET database and evaluation procedure for face-apperception algorithms”. AUTHORS: K. Choi, H. Byun,
and K.-A. Toh.
This database is an immensely colossal database of facial images, divided into expansion and repossessed components. The
development part is made available to researchers, and the repossessed portion is for testing face apperception algorithms. The
FERET assessment process was designed to: (1) sanction a comparison between different algorithms, (2) identify the most
consequential procedures, (3) examine the state of the art in apperception, (4) identify future guidelines of research, and (5)
amendment of state of the art in FR.
4) A Paper on “Proceedings of the 6th international conference on Multiple Classifier Systems” AUTHORS: K.-B. Duan and S. S.
Keerthi.
Cooperative multi agent systems MAS are ones in which several agents endeavor through their interaction to jointly solve tasks
Because of communications among the agents multi agent quandary involution can elevate with increase agents or their behavioral
preponderating Provided a broad survey of the cooperative multi agent learning literature Past surveys of this area have largely
concentrated on issues to particular subareas e g robotics In this survey they endeavor to draw from multi agent learning work in a
spectrum of areas including RL evolving computation game theory agent modeling and robotics They found it leads to a division
of the work into two categories Applying a single learner to discover joint solutions to multi agent quandaries which is called as
team learning or utilizing multiple parallel learners one per agent concurrent learning They conclude with a presentation of multi
agent learning quandary domains and resources.
5) A Paper on “Moving Beyond Untagging: Photo Privacy in Tagged World” AUTHORS: Andrew Besmer& Heather Richter
Lipford.
Department of Software and Information Systems. Photo tagging is a popular feature of many convivial networks. Examined
privacy concerns and mechanisms for tagged images. Utilizing a focus group, explored the desiderata and concerns of users,
resulting in a design considerations amassments for tagged photo privacy and security. Designed a privacy enhancing mechanism
predicated on their findings, and tested it utilizing a commixed methods approach. Results identify the convivial tensions that
tagging engenders, and the desiderata of privacy implements to address photo privacy management issues.
III. EXISTINGSYSTEM
Fig.1 Exiting System Architecture
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 11, Volume 3 (November 2016) www.ijirae.com
_________________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -4
Subsisting system consists of following three paramount components:
a. Privacy Policy and Exposure Policy
b. FR System
c. FR with gregarious contexts
Privacy and Exposure policy can be defined as follows.
Set of users who can access the photos is called Privacy Policy. And set of users who can have access to a photo when particular
utilizer is involved. Algorithm of Secure set intersection is utilized to find access policy S, betokens all the utilizes who can have
access to a shared photo. After policy establishment photo can be shared with identified list of users. FR with Convivial Context
expounded as following. Fig 1. Exiting System Architecture In Mavericks study the insights of photograph sharing on informal
communities. He proposed domains as below:
They have expounded about how the different domains are interrelated. There subsist a close relationship and impact between all
these domains. Data given for one domain, can be habituated to get decent estimations in other domain. FR System, Every utilizer
has a photo gallery in his phone, which can be utilized as a training data.FR system detects the faces and features of all images
stored in the gallery and stores as feature vector which is private training set. With this each utilizer will have personal own FR
engine to detect his one-hop neighbors. The personal FR can be constructed as a multi-class relegation system, where each class is
corresponding to one utilizer. It can be built by binary classifiers merging.
Disadvantages of Subsisting System
1 Lots of manual work
2 Affected by noise
IV. PROBLEM STATEMENT
To enable sharing of pictures or images in secure manner so that privacy is maintained and there will less possibility of loss of
information.
V. PROPOSED SYSTEM AND IMPLEMENTATION
Fig. 2 Proposed System
We will propose to empower people conceivably in a photograph to give notifications a fore any photo is posted online. It will
distinguish or detect the faces to people getting affected by other person who is posting the photo online. The proposed framework
is highlighted with low calculation expense and relegation of the preparation set.
DOMAIN NAME ENTITIES RELATIONSHIPS
Social domain Characters Connection
Visual Tangible domain Faces Co-events in photos
Physical Domain Bodies Closeness
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 11, Volume 3 (November 2016) www.ijirae.com
_________________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -5
Hypothetical investigation and analyses were directed to show adequacy and proficiency. This method of photo sharing is more
trustworthy and efficacious in maintaining the security and privacy over online convivial networks. Application that is
implemented was on Nexus 7 tablets, used Android Jelly Bean API, and FB SDK. They have utilized OpenCV library for FR.
They have designed a GUI framework for this application. They have provided start stop buttons in GUI. Once utilizer
authenticates greetings along with profile picture will be exhibited. In the Set up the system will engender decision tree. For this
purport private training set of utilizer is utilized designates his photo gallery. Whenever this process of detecting the faces is going
on utilizer needs to cull the close friends. From the FB survey it is identified every users has average of 150 friends and among 35
are proximate friends. Each of utilizer needs to have this Application installed. In the establishment mode classifiers are culled and
process for endangerment of group where we can share the photo commences, predicated on privacy and exposure policy.
Currently in online convivial applications we can’t customize friends list. But here we can implement that. When a photo is posted
as clicking on “Post” a notification and image will be sent to all the users who are co-owners of that photo. Co-owners have the
right to accept or reject that invitation. Once that is done owner of photo can apportion photo, if he get the repudiation he can’t
post the photo. We will be utilizing JSP and servlets for designing a convivial site like framework. And would be utilizing MySql
to store images and other profile information. Image processing algorithms will be habituated to identify/detect the faces. We will
be utilizing the profile images as reference. We will be
FOLLOWING TECHNOLOGIES TO DEVELOP THE APPLICATION:
1. Operating system : Windows XP/7
2. Coding Language : Java
3. IDE: Eclipse
4. Database: MYSQL
ADVANTAGES OF PROPOSED SYSTEM
1. Sharing of photo efficient
2. Security of sharing photo is incremented
3. Less possibility of loss of information
4. Prohibited to download images from social media
VI. CONCLUSION
Photograph sharing is a standout among the most prevalent elements in online informal organizations for example Facebook
Lamentably imprudent photograph posting may unearth security of people. To control the security spillage we proposed to
sanction people possibly in a photograph to provide alerts a fore anybody is posting a photo where utilizer in involved. We
orchestrated a security safeguarding FR framework to identify people in a co photograph. The proposed framework is highlighted
with low calculation expense. We designed an orchestration be exceptionally subsidiary in ascertaining clients' bulwark in
photograph/picture over online sites. Moreover neighborhood Facebook Apperception preparing will deplete battery rapidly.
Proposed Future work is Automatic Tagging- Whenever we are posting a photo we will get a notification of automatically tagging
friends, we can option to tag the photo or reject it.
ACKNOWLEDGMENT
We would like to acknowledge our vigorous thanks to Mrs. Sindhu M.R for giving her valuable suggestions we also express
our special thanks to our friends for supporting us in our research work.
REFERENCES
[1].I Altman Privacy regulation Culturally universal or culturally specific Journal of Social Issues 33 3 66 84 1977
[2].A Besmer and H Richter Lipford Moving beyond un tagging photo privacy in a tagged world CHI '10 pages 1563 1572 New
York NY USA 2010 ACM
[3].S Boyd N Parikh E Chu B Peleato and J Eckstein Distributed optimization and statistical learning via the alternating direction
method of multipliers Found Trends Mach Learn 3 1 1 122 Jan 2011
[4].J Y Choi W De Neve K Plataniotis and Y M Rao, Improved face annotation and Collaborative face recognition Multimedia
IEEE Transactions on 13 1 14 28 2011
[5].Kaihe Xu, Student Member, IEEE, YuanxiongGuo, Member, IEEE, LinkeGuo, Member, IEEE,Yuguang Fang, Fellow, IEEE,
Xiaolin Li, Member, IEEE, My Privacy My Decision: Control of Photo Sharing on Online Social Networks.
10.1109/TDSC.2015.2443795, IEEE Transactions on Dependable and Secure Computing.

More Related Content

What's hot

Geotagging Awareness & Safety
Geotagging Awareness & SafetyGeotagging Awareness & Safety
Geotagging Awareness & SafetyTom Hulsey
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterMichael Pranikoff
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 
16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim16658576_Inst-Poli-Prim
16658576_Inst-Poli-PrimMandy9542078
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 

What's hot (6)

Geotags and opsec
Geotags and opsecGeotags and opsec
Geotags and opsec
 
Geotagging Awareness & Safety
Geotagging Awareness & SafetyGeotagging Awareness & Safety
Geotagging Awareness & Safety
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and Water
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 

Viewers also liked

Final Exam Answers 2015 version
Final Exam Answers 2015 versionFinal Exam Answers 2015 version
Final Exam Answers 2015 versionbellocelene
 
το γεφύρι της Άρτας, λογοτεχνία γ' γυμνασίου Slide
το γεφύρι της Άρτας, λογοτεχνία γ'  γυμνασίου Slideτο γεφύρι της Άρτας, λογοτεχνία γ'  γυμνασίου Slide
το γεφύρι της Άρτας, λογοτεχνία γ' γυμνασίου Slidegina zaza
 
GI bleeding & Intestinal Obstruction
GI bleeding & Intestinal ObstructionGI bleeding & Intestinal Obstruction
GI bleeding & Intestinal Obstructionmeducationdotnet
 
Careers in chemistry
Careers in chemistryCareers in chemistry
Careers in chemistryentranzz123
 
Economia Globalizacion
Economia GlobalizacionEconomia Globalizacion
Economia Globalizacionalitzelmaya
 
Economía y otras ciencias
Economía y otras cienciasEconomía y otras ciencias
Economía y otras cienciashigueraurora
 
Λυσία Υπέρ Μαντιθέου, 1 – 3, ερωτήσεις ΚΕΕ
Λυσία Υπέρ Μαντιθέου, 1 – 3, ερωτήσεις ΚΕΕΛυσία Υπέρ Μαντιθέου, 1 – 3, ερωτήσεις ΚΕΕ
Λυσία Υπέρ Μαντιθέου, 1 – 3, ερωτήσεις ΚΕΕgina zaza
 
The Brain and Some Further Considerations
The Brain and Some Further ConsiderationsThe Brain and Some Further Considerations
The Brain and Some Further Considerationsmeducationdotnet
 
ΛΑΤΙΝΙΚΑ-ΚΕΙΜΕΝΟ 7-ΑΣΚΗΣΕΙΣ
ΛΑΤΙΝΙΚΑ-ΚΕΙΜΕΝΟ 7-ΑΣΚΗΣΕΙΣΛΑΤΙΝΙΚΑ-ΚΕΙΜΕΝΟ 7-ΑΣΚΗΣΕΙΣ
ΛΑΤΙΝΙΚΑ-ΚΕΙΜΕΝΟ 7-ΑΣΚΗΣΕΙΣGeorgia Sofi
 
Η διανομή των εθνικών κτημάτων
Η διανομή των εθνικών κτημάτωνΗ διανομή των εθνικών κτημάτων
Η διανομή των εθνικών κτημάτωνΣΟΦΙΑ ΦΕΛΛΑΧΙΔΟΥ
 
Assessing the Carbon Footprint of the University of Portsmouth's Residential ...
Assessing the Carbon Footprint of the University of Portsmouth's Residential ...Assessing the Carbon Footprint of the University of Portsmouth's Residential ...
Assessing the Carbon Footprint of the University of Portsmouth's Residential ...Leanne Craddock
 
Es Tiempo Unihealth 2014 Presentation
Es Tiempo Unihealth 2014 PresentationEs Tiempo Unihealth 2014 Presentation
Es Tiempo Unihealth 2014 Presentationbaezcond
 
Florida lawmakers pass $78 billion state budget | Reuters
Florida lawmakers pass $78 billion state budget
| ReutersFlorida lawmakers pass $78 billion state budget
| Reuters
Florida lawmakers pass $78 billion state budget | Reutersearsplittingfur8
 
Modern networking for php developers - Dutch PHP conference 2015
Modern networking for php developers - Dutch PHP conference 2015Modern networking for php developers - Dutch PHP conference 2015
Modern networking for php developers - Dutch PHP conference 2015SynchroM
 
Prezentacja z zajęć artystycznych
Prezentacja z zajęć artystycznych Prezentacja z zajęć artystycznych
Prezentacja z zajęć artystycznych orthieri
 
Infracciones de tránsito comunes en México: ¿Cuánto tienes qué pagar?
Infracciones de tránsito comunes en México: ¿Cuánto tienes qué pagar?Infracciones de tránsito comunes en México: ¿Cuánto tienes qué pagar?
Infracciones de tránsito comunes en México: ¿Cuánto tienes qué pagar?Compara Guru
 

Viewers also liked (20)

Final Exam Answers 2015 version
Final Exam Answers 2015 versionFinal Exam Answers 2015 version
Final Exam Answers 2015 version
 
το γεφύρι της Άρτας, λογοτεχνία γ' γυμνασίου Slide
το γεφύρι της Άρτας, λογοτεχνία γ'  γυμνασίου Slideτο γεφύρι της Άρτας, λογοτεχνία γ'  γυμνασίου Slide
το γεφύρι της Άρτας, λογοτεχνία γ' γυμνασίου Slide
 
No Title
No TitleNo Title
No Title
 
GI bleeding & Intestinal Obstruction
GI bleeding & Intestinal ObstructionGI bleeding & Intestinal Obstruction
GI bleeding & Intestinal Obstruction
 
Careers in chemistry
Careers in chemistryCareers in chemistry
Careers in chemistry
 
Economia Globalizacion
Economia GlobalizacionEconomia Globalizacion
Economia Globalizacion
 
Economía y otras ciencias
Economía y otras cienciasEconomía y otras ciencias
Economía y otras ciencias
 
Infective Endocarditis
Infective EndocarditisInfective Endocarditis
Infective Endocarditis
 
Λυσία Υπέρ Μαντιθέου, 1 – 3, ερωτήσεις ΚΕΕ
Λυσία Υπέρ Μαντιθέου, 1 – 3, ερωτήσεις ΚΕΕΛυσία Υπέρ Μαντιθέου, 1 – 3, ερωτήσεις ΚΕΕ
Λυσία Υπέρ Μαντιθέου, 1 – 3, ερωτήσεις ΚΕΕ
 
The Brain and Some Further Considerations
The Brain and Some Further ConsiderationsThe Brain and Some Further Considerations
The Brain and Some Further Considerations
 
ΛΑΤΙΝΙΚΑ-ΚΕΙΜΕΝΟ 7-ΑΣΚΗΣΕΙΣ
ΛΑΤΙΝΙΚΑ-ΚΕΙΜΕΝΟ 7-ΑΣΚΗΣΕΙΣΛΑΤΙΝΙΚΑ-ΚΕΙΜΕΝΟ 7-ΑΣΚΗΣΕΙΣ
ΛΑΤΙΝΙΚΑ-ΚΕΙΜΕΝΟ 7-ΑΣΚΗΣΕΙΣ
 
Η διανομή των εθνικών κτημάτων
Η διανομή των εθνικών κτημάτωνΗ διανομή των εθνικών κτημάτων
Η διανομή των εθνικών κτημάτων
 
Assessing the Carbon Footprint of the University of Portsmouth's Residential ...
Assessing the Carbon Footprint of the University of Portsmouth's Residential ...Assessing the Carbon Footprint of the University of Portsmouth's Residential ...
Assessing the Carbon Footprint of the University of Portsmouth's Residential ...
 
Es Tiempo Unihealth 2014 Presentation
Es Tiempo Unihealth 2014 PresentationEs Tiempo Unihealth 2014 Presentation
Es Tiempo Unihealth 2014 Presentation
 
Bies CV 2017
Bies CV 2017Bies CV 2017
Bies CV 2017
 
Florida lawmakers pass $78 billion state budget | Reuters
Florida lawmakers pass $78 billion state budget
| ReutersFlorida lawmakers pass $78 billion state budget
| Reuters
Florida lawmakers pass $78 billion state budget | Reuters
 
Modern networking for php developers - Dutch PHP conference 2015
Modern networking for php developers - Dutch PHP conference 2015Modern networking for php developers - Dutch PHP conference 2015
Modern networking for php developers - Dutch PHP conference 2015
 
Prezentacja z zajęć artystycznych
Prezentacja z zajęć artystycznych Prezentacja z zajęć artystycznych
Prezentacja z zajęć artystycznych
 
App For Time Management
App For Time ManagementApp For Time Management
App For Time Management
 
Infracciones de tránsito comunes en México: ¿Cuánto tienes qué pagar?
Infracciones de tránsito comunes en México: ¿Cuánto tienes qué pagar?Infracciones de tránsito comunes en México: ¿Cuánto tienes qué pagar?
Infracciones de tránsito comunes en México: ¿Cuánto tienes qué pagar?
 

Similar to PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING

Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images oniaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images onIaetsd Iaetsd
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
 
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesPrivacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesIRJET Journal
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites1crore projects
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites1crore projects
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET Journal
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHijmpict
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingIOSR Journals
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET Journal
 

Similar to PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING (20)

Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images oniaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesPrivacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Facebook business
Facebook businessFacebook business
Facebook business
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
 
Ijciet 08 02_003
Ijciet 08 02_003Ijciet 08 02_003
Ijciet 08 02_003
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments Detection
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 11, Volume 3 (November 2016) www.ijirae.com _________________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -1 PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING Ajay Kumar Teotia, Rajkumar Dukare, Kajal Vende, Poonam Patil, Mrs. Sindhu M.R Abstract-Photo sharing is a captivating feature which popularizes Online Gregarious Networks (OSNs). Lamentably, it may leak users’ privacy if they are sanctioned to post, comment, and tag a photo liberatingly. In this paper, we endeavor to address this issue and study the scenario when a utilizer shares a photo containing individuals other than him/her (termed co-photo for short). To obviate possible privacy leakage of a photo, we design a mechanism to enable each individual in a photo be cognizant of the posting activity and participate in the decision making on the photo posting. For this purport, we require an efficient facial apperception (FR) system that can apperceive everyone in the photo. However, more authoritatively mandating privacy setting may limit the number of the photos publicly available to train the FR system. To deal with this dilemma, our mechanism endeavors to utilize users’ private photos to design a personalized FR system concretely trained to differentiate possible photo co-owners without leaking their privacy. We additionally develop a distributed consensus predicated method to reduce the computational intricacy and for fend the private training set. We show that our system is superior to other possible approaches in terms of apperception ratio and efficiency. Our mechanism is implemented as a proof of concept Android application on Facebook’s platform. Keywords: Photo Privacy, Social networks, secure multi-party computation, collaborative learning. I. INTRODUCTION Gregarious sites have become consequential part of our daily life. Online gregarious networks (OSNs) such as face book, Google and sound of birds are inherently designed to make able people to part personal and public information and make convivial connections with friends, coworkers, persons having like position, family, and even with strangers. To keep safe (out of peril) utilizer facts, way in control has become a chief thing point of OSNs. However it becomes sempiternal record once some photo/image is posted/uploaded. Tardy consequences can be hazardous; people may utilize it for different unexpected purposes. For example a posted may reveal the mafia relationship of any celebrity. A utilizer profile conventionally includes information with deference to the users work history day of inchoation, sex, residence, fascinates, edification, and, peregrinate information and be in touch information. Moreover, users upload the picture and tag other people albeit they are willing or not inclined to be a component of uploaded image/content. When other people are tagged the situation becomes more perplexed. The utilizer uploading the image is planarity incognizant of the consequences that arise for the person which is involved in tagging or image. Currently nobody can stop such ineluctable situation. We require having a control over such actions to minimize the perils of photos being tagged or uploaded. In lieu of imposing restrictions over such incidents or incrementing security, sites like FB and Instagram are inspiriting people to get into such things more. Most of the times utilizer is reluctant to get tagged or being exposed without his sanction. Is it breach if we share picture without taking a sanction from all the people involved in picture? To answer this we require explicating the privacy and security issues over the convivial sites. Whenever a photograph is shared it includes everybody’s security, which can be put on risk if the congruous sanctions are not sought. We require enforcing maximum level of privacy and security of the content being uploaded on gregarious sites.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 11, Volume 3 (November 2016) www.ijirae.com _________________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -2 So while utilizing the online convivial networks one can feel desired level of confidence and security. He/she can confidently make utilization of gregarious sites without worrying or photos being shared in insecure and unauthorized way. Desired level of privacy and security is a first consequential thing for a utilizer utilizing online convivial sites. With deference to current architecture and implementations of gregarious sites, either utilizer will alone because highly imposed security constraints else will be impacted by several security threats because of low security mechanisms. Few authors studied about the security challenges because of lack of joint or collaborative control over the images being shared across the online convivial sites. To minimize this or to planarity eschew this they have suggested gregarious sites like Facebook, Instagram to make utilization of multi-party privacy model to increment privacy. There should be mutual acceptable policy to grant access for a photo when multiple utilizers are involved. For security utilizer might need to engender a group where they can grant access for their uploaded images. Exposure policy can be defined as the group of users where an image can be accessed when particular utilizer is involved and the privacy policy can be verbalized as the group of users/friends who can have a direct access of the uploaded images. These two policies are utilized to define the overall audience or group of users/friends who can be given access to uploaded image. But a fore establishing this there should be a felicitous process of defining these groups. For this the facial apperceptions are utilized. Most of the times the people found in the co-photo are proximate friends. So face apperceptions engines are trained for identifying the friends in convivial circle. FR engines with more precision rates require sizably voluminous number of test data/samples concrete to a person but most of the times it is not possible. Users who care about the privacy and security mostly restrict themselves from uploading the photos but if these people are provided with felicitous privacy preserving techniques then they can post photos without any reluctance. We are designing a privacy enhancing system of photo sharing which makes utilization of collaborative training system. We are enabling the users of gregarious site to have own personal FR engine predicated on convivial cognations which will make utilization of images stored in their personal system. It will avail to build a gregarious relationship tree, which can be utilized for policies for sharing of data. We make utilization of cryptographic techniques are well to build such training data. We require proposing a secure approach to gain efficiency and privacy both. The utilizer is trained first from his local training set, betokens set of photos in her gallery. Exposure policies are defined to have access on photo. And then by ecumenical cognizance of relationships the photo sharing can be initiated. Determinately data will be distributed to the right people who have access. Efficiency and privacy can be achieved by simultaneously comparing the current and precedent experiments. 1. The users in a shared photo are automatically detected without being tagged by somebody. 2. We propose a secure sharing of private photos by making utilization of convivial context to have personal FR Engines. 3. We can achieve privacy, security and efficiency. II. BACKGROUND AND RELATED WORK 1) A Paper on “On the Pergrinate to Consequential Internet Systems” AUTHORS: M B. Carminati, E. Ferrari, and A. Perego. The degree of edibility of workflow management systems heavily influences the way business processes are executed. Constraint- predicated representations are deliberated to be more flexible than traditional models because of their semantics: everything that does not contravene constraints is permissible. Though constraint-predicated representations are elastic, changes to process descriptions might be desired to comply with evolving business domains and exceptional situations. Elasticity can be enlarged by run-time support for dynamic changes. Transferring instances to an incipient model and ad-hoc changes. Transmuting the process definition for one instance. Proposed a general framework for a constraint based process modeling language and its implementation. Approach fortifies both ad-hoc as well as dynamic changes. 2) A Paper on “Face apperception for ameliorated face annotation in personal photo accumulations shared on online convivial networks”. AUTHORS: M. Bellare, C. Namprempre, and G. Neven Utilizing face annotation for efficacious management of personal photos online, Proposed a novel collaborative face apperception framework enlightening the correctness of face annotation by efficaciously making utilization of many Apperception engines available in an OSN. In particular collaborative FR framework consists of two major components, cull FR engines and merge multiple FR results. The cull of FR engines aims at determining a set of customized FR engine which are congruous for kenning query for facial images belonging to a particular utilizer. For this purport they exploit both convivial network group context in convivial sites and gregarious context in phone galleries.Adscititiously to capitalize on the availability of multiple FR results retrieved from the culled FR engines they devise two efficacious solutions for integration Face.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 11, Volume 3 (November 2016) www.ijirae.com _________________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -3 Apperception results adopting antediluvian techniques for merging many classifier results Experiments were conducted utilizing around 547 thousand personal photos amassed from a subsisting convivial site networks. Results prove this method gives more precision matched to conventional Face Apperception approaches that only make utilization of a single FR engine. Further demonstrated that their collaborative FR framework has a low computational cost and comes with a decentralized design. 3) A Paper on “The FERET database and evaluation procedure for face-apperception algorithms”. AUTHORS: K. Choi, H. Byun, and K.-A. Toh. This database is an immensely colossal database of facial images, divided into expansion and repossessed components. The development part is made available to researchers, and the repossessed portion is for testing face apperception algorithms. The FERET assessment process was designed to: (1) sanction a comparison between different algorithms, (2) identify the most consequential procedures, (3) examine the state of the art in apperception, (4) identify future guidelines of research, and (5) amendment of state of the art in FR. 4) A Paper on “Proceedings of the 6th international conference on Multiple Classifier Systems” AUTHORS: K.-B. Duan and S. S. Keerthi. Cooperative multi agent systems MAS are ones in which several agents endeavor through their interaction to jointly solve tasks Because of communications among the agents multi agent quandary involution can elevate with increase agents or their behavioral preponderating Provided a broad survey of the cooperative multi agent learning literature Past surveys of this area have largely concentrated on issues to particular subareas e g robotics In this survey they endeavor to draw from multi agent learning work in a spectrum of areas including RL evolving computation game theory agent modeling and robotics They found it leads to a division of the work into two categories Applying a single learner to discover joint solutions to multi agent quandaries which is called as team learning or utilizing multiple parallel learners one per agent concurrent learning They conclude with a presentation of multi agent learning quandary domains and resources. 5) A Paper on “Moving Beyond Untagging: Photo Privacy in Tagged World” AUTHORS: Andrew Besmer& Heather Richter Lipford. Department of Software and Information Systems. Photo tagging is a popular feature of many convivial networks. Examined privacy concerns and mechanisms for tagged images. Utilizing a focus group, explored the desiderata and concerns of users, resulting in a design considerations amassments for tagged photo privacy and security. Designed a privacy enhancing mechanism predicated on their findings, and tested it utilizing a commixed methods approach. Results identify the convivial tensions that tagging engenders, and the desiderata of privacy implements to address photo privacy management issues. III. EXISTINGSYSTEM Fig.1 Exiting System Architecture
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 11, Volume 3 (November 2016) www.ijirae.com _________________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -4 Subsisting system consists of following three paramount components: a. Privacy Policy and Exposure Policy b. FR System c. FR with gregarious contexts Privacy and Exposure policy can be defined as follows. Set of users who can access the photos is called Privacy Policy. And set of users who can have access to a photo when particular utilizer is involved. Algorithm of Secure set intersection is utilized to find access policy S, betokens all the utilizes who can have access to a shared photo. After policy establishment photo can be shared with identified list of users. FR with Convivial Context expounded as following. Fig 1. Exiting System Architecture In Mavericks study the insights of photograph sharing on informal communities. He proposed domains as below: They have expounded about how the different domains are interrelated. There subsist a close relationship and impact between all these domains. Data given for one domain, can be habituated to get decent estimations in other domain. FR System, Every utilizer has a photo gallery in his phone, which can be utilized as a training data.FR system detects the faces and features of all images stored in the gallery and stores as feature vector which is private training set. With this each utilizer will have personal own FR engine to detect his one-hop neighbors. The personal FR can be constructed as a multi-class relegation system, where each class is corresponding to one utilizer. It can be built by binary classifiers merging. Disadvantages of Subsisting System 1 Lots of manual work 2 Affected by noise IV. PROBLEM STATEMENT To enable sharing of pictures or images in secure manner so that privacy is maintained and there will less possibility of loss of information. V. PROPOSED SYSTEM AND IMPLEMENTATION Fig. 2 Proposed System We will propose to empower people conceivably in a photograph to give notifications a fore any photo is posted online. It will distinguish or detect the faces to people getting affected by other person who is posting the photo online. The proposed framework is highlighted with low calculation expense and relegation of the preparation set. DOMAIN NAME ENTITIES RELATIONSHIPS Social domain Characters Connection Visual Tangible domain Faces Co-events in photos Physical Domain Bodies Closeness
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 11, Volume 3 (November 2016) www.ijirae.com _________________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -5 Hypothetical investigation and analyses were directed to show adequacy and proficiency. This method of photo sharing is more trustworthy and efficacious in maintaining the security and privacy over online convivial networks. Application that is implemented was on Nexus 7 tablets, used Android Jelly Bean API, and FB SDK. They have utilized OpenCV library for FR. They have designed a GUI framework for this application. They have provided start stop buttons in GUI. Once utilizer authenticates greetings along with profile picture will be exhibited. In the Set up the system will engender decision tree. For this purport private training set of utilizer is utilized designates his photo gallery. Whenever this process of detecting the faces is going on utilizer needs to cull the close friends. From the FB survey it is identified every users has average of 150 friends and among 35 are proximate friends. Each of utilizer needs to have this Application installed. In the establishment mode classifiers are culled and process for endangerment of group where we can share the photo commences, predicated on privacy and exposure policy. Currently in online convivial applications we can’t customize friends list. But here we can implement that. When a photo is posted as clicking on “Post” a notification and image will be sent to all the users who are co-owners of that photo. Co-owners have the right to accept or reject that invitation. Once that is done owner of photo can apportion photo, if he get the repudiation he can’t post the photo. We will be utilizing JSP and servlets for designing a convivial site like framework. And would be utilizing MySql to store images and other profile information. Image processing algorithms will be habituated to identify/detect the faces. We will be utilizing the profile images as reference. We will be FOLLOWING TECHNOLOGIES TO DEVELOP THE APPLICATION: 1. Operating system : Windows XP/7 2. Coding Language : Java 3. IDE: Eclipse 4. Database: MYSQL ADVANTAGES OF PROPOSED SYSTEM 1. Sharing of photo efficient 2. Security of sharing photo is incremented 3. Less possibility of loss of information 4. Prohibited to download images from social media VI. CONCLUSION Photograph sharing is a standout among the most prevalent elements in online informal organizations for example Facebook Lamentably imprudent photograph posting may unearth security of people. To control the security spillage we proposed to sanction people possibly in a photograph to provide alerts a fore anybody is posting a photo where utilizer in involved. We orchestrated a security safeguarding FR framework to identify people in a co photograph. The proposed framework is highlighted with low calculation expense. We designed an orchestration be exceptionally subsidiary in ascertaining clients' bulwark in photograph/picture over online sites. Moreover neighborhood Facebook Apperception preparing will deplete battery rapidly. Proposed Future work is Automatic Tagging- Whenever we are posting a photo we will get a notification of automatically tagging friends, we can option to tag the photo or reject it. ACKNOWLEDGMENT We would like to acknowledge our vigorous thanks to Mrs. Sindhu M.R for giving her valuable suggestions we also express our special thanks to our friends for supporting us in our research work. REFERENCES [1].I Altman Privacy regulation Culturally universal or culturally specific Journal of Social Issues 33 3 66 84 1977 [2].A Besmer and H Richter Lipford Moving beyond un tagging photo privacy in a tagged world CHI '10 pages 1563 1572 New York NY USA 2010 ACM [3].S Boyd N Parikh E Chu B Peleato and J Eckstein Distributed optimization and statistical learning via the alternating direction method of multipliers Found Trends Mach Learn 3 1 1 122 Jan 2011 [4].J Y Choi W De Neve K Plataniotis and Y M Rao, Improved face annotation and Collaborative face recognition Multimedia IEEE Transactions on 13 1 14 28 2011 [5].Kaihe Xu, Student Member, IEEE, YuanxiongGuo, Member, IEEE, LinkeGuo, Member, IEEE,Yuguang Fang, Fellow, IEEE, Xiaolin Li, Member, IEEE, My Privacy My Decision: Control of Photo Sharing on Online Social Networks. 10.1109/TDSC.2015.2443795, IEEE Transactions on Dependable and Secure Computing.