SlideShare a Scribd company logo
1 of 3
Download to read offline
38 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
Predicting Privacy Policy Automatically To
the User Uploaded Images on Content Sharing
Sites
Rashmi T.M1
| V. Chetan Kumar2
1PG Scholar, Department of Computer Science and Engineering, P.E.S. College of Engineering, Mandya,
Karnataka, India.
2Assistant Professor, Department of Computer Science and Engineering, P.E.S. College of Engineering,
Mandya, Karnataka, India.
Nowadays sharing of images is increasing through social networking sites but maintaining privacy is a
major problem. While sharing images users knowingly or unknowingly share their personal information. Due
to these incidents, there is a need of tool for setting privacy for their images. To address this need we propose
an adaptive privacy policy prediction (A3P) to set privacy for their images. We are considering the metadata
for predicting the privacy. Our Solution depends on image classification for image categories and predicting
privacy.
KEYWORDS: Online information services, web-based services.
Copyright © 2015 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
Images are the main key enablers for user to
connect in social networking sites. Sharing of
images takes place not only for known person or
group but also for social circles e.g., Google+, Face
book etc. However images may expose sensitive
information of user and they may lead to
unwanted risks and personal information
violations[2],[6].Due to persistent nature of social
media , it allows others to collect information of
owner of published content.[2],[5],[6]. This may
lead to expose of one’s personal information.
Therefore, in this paper we are implementing
adaptive privacy policy prediction(A3P) system
which provides risk free privacy settings
automatically by generating policies[1].
Existing System
 Most social networking sites allow user to enter
their privacy preferences but users struggle to
maintain these types of policies.
 Because user share lot of information on social
media putting privacy policies for each and
everything is difficult task and error-prone.
Disadvantage of Existing System
 Images may expose sensitive information of user
and they may lead to unwanted risks and personal
information violations
 Due to persistent nature of social media, it allows
others to collect information of owner of published
content.
 This may lead to expose of one’s personal
information.
Proposed System
We propose an Adaptive Privacy Policy Prediction
(A3P) system, which aims to provide users a hassle
free privacy settings experience by automatically
generating personalized policies.
Advantages of Proposed System
 The A3P-core focuses on analyzing each individual
user’s own image’s metadata.
 User can set policies automatically by generated
policies.
II. LITERATURE SURVEY
Some studies are carried out to set policies
automatically. Bonneau et al.[3] proposed the
concept of privacy suites which recommend to users
a suite of privacy settings that “expert” users or
ABSTRACT
39 International Journal for Modern Trends in Science and Technology
Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites
other trusted friends have already set, so that normal
users can either directly choose a setting or only
need to do minor modifications. Similarly,
Ravichandran et al.[7] studied how to predict a user’s
privacy preferences for location-based data based on
location and time of day. More recently, Klemperer et
al.[5] studied whether the keywords and captions
with which users tag their photos can be used to help
users more intuitively create and maintain
access-control policies.
III. SYSTEM ARCHITECTURE
3.1 A3P Framework
Privacy policies are privacy preferences
expressed by the user to protect their information
from unwanted disclosure. We define the privacy
policies as follows:
Definition: A privacy policy p of user u consists of the
following components:
 Subject (S):A set of users socially connected
to user U
 Data(D):A set of data items shared by u
 Action(A):A set of action granted by u to S on D
 Condition(C):A Boolean expression which must be
satisfied in order to perform the granted actions.
3.2 A3P Architecture
A3P stands for adaptive privacy policy prediction
system which helps users to derive the privacy
settings for their images. The A3P architecture
consists of the following blocks as shown in the
figure1:
1. Metadata based image classification
2. Adaptive policy prediction
3. Look-up privacy policies
4. Database.
A3P core classifies the images based on the
metadata and predict the policies depending on the
metadata. The look-up privacy policy looks if the
image or similar type of image already exists which
can be given with the similar privacy policies. If
similar type of image doesn’t exist then it looks for all
the policies and lets user choose the policies.
Fig 1: System architecture
3.3 A3P CORE
There are two major components in A3PCore:
1. Image classification
2. Adaptive policy prediction
3.3.1 Metadata-based image classification:
The Metadata-based image classification groups
images into sub-categories. The process consists of
following 3 steps:
Step 1: Extract keywords from the metadata
associated with an image. The metadata
considered are tags, caption and comments.
Identify all the nouns, verbs and adjectives in the
metadata and store them as metadata vectors.
where i, j and k are the total number of nouns,
verbs and adjectives respectively.
Step 2: Derive a representative hypernym ( h) from
each metadata vector. Retrieve the hypernym for
each in a metadata vector based on the Word net
classification and obtain a list of hypernym
where v: hypernym and f :frequency.
Step 3: Find a subcategory that an image belongs
to. At the beginning, the first image forms a
subcategory as itself and the representative
hypernyms of the image becomes the subcategory’s
representative hypernyms. We compute the
distance between representative hypernyms of a
new incoming image and each existing subcategory
[4].
3.3.2 Adaptive policy prediction
There are two major components in the Adaptive
policy prediction process.
1. Policy mining
2. Policy prediction
Policy mining is a process of mining policies for
similar categorized images and policy prediction
process for predicting the policy for user uploaded
images.
Policy mining: Privacy policies are privacy
preferences expressed by the user to protect their
information from unwanted disclosure. Policy
mining process deals with mining of policies by
applying various association rules and steps. This
hierarchical approach considers subject, action
and conditions. It includes following steps:
Step1: apply association rule mining on subject
component of the policies of the new image. Then
40 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
select the best rule by considering the two
measures like support and confidence.
Step 2 : similar to the first step apply association
rule mining on action component . Then select the
best rule.
Step 3: mine the condition component in each
policy set. The best rules are selected which gives
us a set of attributes which often appear in policies.
Policy prediction: the policy mining process may
give us many number of policies, but our system
needs to show the best one to the user thus, this
approach is to choose the best policy for the user
by obtaining the strictness level. The strictness
level describes how strict a policy is. The strictness
can be discovered by two metrics: major level and
coverage rate. The major level is determined with
the help of combinations of subject and action in
policy and coverage rate is determined using the
condition component statement.
IV. CONCLUSION
We have proposed an Adaptive privacy policy
prediction (A3P) system to automate the privacy
policy settings for user uploaded images. And it
provides hassle free policies for user information
on social networking site.
REFERENCES
[1] Anna cinziz squicciarini, member,IEEE, Dan
Lin,Smith Sundareswaran and Joshua
Wede,“Privacy policy inference of user-uploaded
images on content sharing sites”.IEEE
TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING,VOL 27,NO.1, JANUARY 2015
[2] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman,
and R. Nair, “Over-exposed?: Privacy patterns and
considerations in online and mobile photo sharing,”
in Proc. Conf. Human Factors Comput. Syst., 2007,
pp. 357–366.
[3] J. Bonneau, J. Anderson, and L. Church, “Privacy
suites: Shared privacy for social networks,” in Proc.
Symp. Usable Privacy Security, 2009.
[4] L. Geng and H. J. Hamilton, “Interestingness
measures for data mining: A survey,” ACM Comput.
Surv., vol. 38, no. 3, p. 9, 2006.
[5] P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B.
Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter,
“Tag, you can see it!: Using tags for access control in
photo sharing,” in Proc. ACM Annu. Conf. Human
Factors Comput. Syst., 2012, pp. 377–386.
[6] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and
A. Mislove, “Analyzing facebook privacy settings:
User expectations vs. reality,” in Proc.
ACMSIGCOMMConf. Internet Meas. Conf., 2011, pp.
61–70.
[7] R. Ravichandran, M. Benisch, P. Kelley, and N.
Sadeh, “Capturing social networking privacy
preferences,” in Proc. Symp. Usable Privacy Security,
2009.
[8] R. A. Wagner and M. J. Fischer, “The string-to-string
correction problem,” J. ACM, vol. 21, no. 1, pp.
168–173, 1974.

More Related Content

What's hot

Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...IJERA Editor
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)IOSR Journals
 
Social Event Detection using Multimodal Clustering and Integrating Supervisor...
Social Event Detection using Multimodal Clustering and Integrating Supervisor...Social Event Detection using Multimodal Clustering and Integrating Supervisor...
Social Event Detection using Multimodal Clustering and Integrating Supervisor...Symeon Papadopoulos
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Comparison of Articles on Content Based Image Retrieval
Comparison of Articles on Content Based Image RetrievalComparison of Articles on Content Based Image Retrieval
Comparison of Articles on Content Based Image RetrievalElshalom Essay
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systemsijsrd.com
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewKato Mivule
 

What's hot (7)

Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
 
Social Event Detection using Multimodal Clustering and Integrating Supervisor...
Social Event Detection using Multimodal Clustering and Integrating Supervisor...Social Event Detection using Multimodal Clustering and Integrating Supervisor...
Social Event Detection using Multimodal Clustering and Integrating Supervisor...
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Comparison of Articles on Content Based Image Retrieval
Comparison of Articles on Content Based Image RetrievalComparison of Articles on Content Based Image Retrieval
Comparison of Articles on Content Based Image Retrieval
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an Overview
 

Viewers also liked

Correlation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram SignalsCorrelation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram SignalsIJMTST Journal
 
ANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality ImprovementANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality ImprovementIJMTST Journal
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkIJMTST Journal
 
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...IJMTST Journal
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesIJMTST Journal
 
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of ClustersA New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of ClustersIJMTST Journal
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...IJMTST Journal
 
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction MotorAnalysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction MotorIJMTST Journal
 
Garden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using SensorsGarden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using SensorsIJMTST Journal
 
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...IJMTST Journal
 
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...IJMTST Journal
 
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell ApplicationsAn Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell ApplicationsIJMTST Journal
 
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite ImageryShadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite ImageryIJMTST Journal
 
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...IJMTST Journal
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...IJMTST Journal
 
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android ApplicationVehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android ApplicationIJMTST Journal
 
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...IJMTST Journal
 
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost ConverterGrid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost ConverterIJMTST Journal
 

Viewers also liked (19)

Correlation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram SignalsCorrelation Analysis of Electromyogram Signals
Correlation Analysis of Electromyogram Signals
 
ANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality ImprovementANFIS Based UPQC for Power Quality Improvement
ANFIS Based UPQC for Power Quality Improvement
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor Network
 
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
 
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of ClustersA New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
 
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction MotorAnalysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
 
Garden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using SensorsGarden Environmental Monitoring & Automatic Control System Using Sensors
Garden Environmental Monitoring & Automatic Control System Using Sensors
 
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
 
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
 
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell ApplicationsAn Isolated 3 Phase Multilevel Inverter for PV Cell Applications
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
 
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite ImageryShadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
 
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
 
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android ApplicationVehicle Monitoring and Tracking System based on ARM7 and Android Application
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
 
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
 
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost ConverterGrid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
 

Similar to Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites1crore projects
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadednexgentech15
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESnexgentechnology
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...Nexgen Technology
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
 
Optimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing WebsitesOptimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing Websitesijceronline
 
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...IJERA Editor
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESShakas Technologies
 
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesPrivacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesIRJET Journal
 
Novel Hybrid Approach to Visual Concept Detection Using Image Annotation
Novel Hybrid Approach to Visual Concept Detection Using Image AnnotationNovel Hybrid Approach to Visual Concept Detection Using Image Annotation
Novel Hybrid Approach to Visual Concept Detection Using Image AnnotationCSCJournals
 
Attribute Based Image Duplication Alert Message Using Big Data
Attribute Based Image Duplication Alert Message Using Big DataAttribute Based Image Duplication Alert Message Using Big Data
Attribute Based Image Duplication Alert Message Using Big DataIJERA Editor
 
Personalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed imagesPersonalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed imageseSAT Journals
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
 
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...Journal For Research
 
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET -  	  Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...IRJET -  	  Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...IRJET Journal
 
Image based search engine
Image based search engineImage based search engine
Image based search engineIRJET Journal
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 

Similar to Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites (20)

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
Optimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing WebsitesOptimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing Websites
 
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
 
C043109012
C043109012C043109012
C043109012
 
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesPrivacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
 
Novel Hybrid Approach to Visual Concept Detection Using Image Annotation
Novel Hybrid Approach to Visual Concept Detection Using Image AnnotationNovel Hybrid Approach to Visual Concept Detection Using Image Annotation
Novel Hybrid Approach to Visual Concept Detection Using Image Annotation
 
Attribute Based Image Duplication Alert Message Using Big Data
Attribute Based Image Duplication Alert Message Using Big DataAttribute Based Image Duplication Alert Message Using Big Data
Attribute Based Image Duplication Alert Message Using Big Data
 
Personalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed imagesPersonalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed images
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
 
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET -  	  Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...IRJET -  	  Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
 
Image based search engine
Image based search engineImage based search engine
Image based search engine
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites

  • 1. 38 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites Rashmi T.M1 | V. Chetan Kumar2 1PG Scholar, Department of Computer Science and Engineering, P.E.S. College of Engineering, Mandya, Karnataka, India. 2Assistant Professor, Department of Computer Science and Engineering, P.E.S. College of Engineering, Mandya, Karnataka, India. Nowadays sharing of images is increasing through social networking sites but maintaining privacy is a major problem. While sharing images users knowingly or unknowingly share their personal information. Due to these incidents, there is a need of tool for setting privacy for their images. To address this need we propose an adaptive privacy policy prediction (A3P) to set privacy for their images. We are considering the metadata for predicting the privacy. Our Solution depends on image classification for image categories and predicting privacy. KEYWORDS: Online information services, web-based services. Copyright © 2015 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION Images are the main key enablers for user to connect in social networking sites. Sharing of images takes place not only for known person or group but also for social circles e.g., Google+, Face book etc. However images may expose sensitive information of user and they may lead to unwanted risks and personal information violations[2],[6].Due to persistent nature of social media , it allows others to collect information of owner of published content.[2],[5],[6]. This may lead to expose of one’s personal information. Therefore, in this paper we are implementing adaptive privacy policy prediction(A3P) system which provides risk free privacy settings automatically by generating policies[1]. Existing System  Most social networking sites allow user to enter their privacy preferences but users struggle to maintain these types of policies.  Because user share lot of information on social media putting privacy policies for each and everything is difficult task and error-prone. Disadvantage of Existing System  Images may expose sensitive information of user and they may lead to unwanted risks and personal information violations  Due to persistent nature of social media, it allows others to collect information of owner of published content.  This may lead to expose of one’s personal information. Proposed System We propose an Adaptive Privacy Policy Prediction (A3P) system, which aims to provide users a hassle free privacy settings experience by automatically generating personalized policies. Advantages of Proposed System  The A3P-core focuses on analyzing each individual user’s own image’s metadata.  User can set policies automatically by generated policies. II. LITERATURE SURVEY Some studies are carried out to set policies automatically. Bonneau et al.[3] proposed the concept of privacy suites which recommend to users a suite of privacy settings that “expert” users or ABSTRACT
  • 2. 39 International Journal for Modern Trends in Science and Technology Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites other trusted friends have already set, so that normal users can either directly choose a setting or only need to do minor modifications. Similarly, Ravichandran et al.[7] studied how to predict a user’s privacy preferences for location-based data based on location and time of day. More recently, Klemperer et al.[5] studied whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. III. SYSTEM ARCHITECTURE 3.1 A3P Framework Privacy policies are privacy preferences expressed by the user to protect their information from unwanted disclosure. We define the privacy policies as follows: Definition: A privacy policy p of user u consists of the following components:  Subject (S):A set of users socially connected to user U  Data(D):A set of data items shared by u  Action(A):A set of action granted by u to S on D  Condition(C):A Boolean expression which must be satisfied in order to perform the granted actions. 3.2 A3P Architecture A3P stands for adaptive privacy policy prediction system which helps users to derive the privacy settings for their images. The A3P architecture consists of the following blocks as shown in the figure1: 1. Metadata based image classification 2. Adaptive policy prediction 3. Look-up privacy policies 4. Database. A3P core classifies the images based on the metadata and predict the policies depending on the metadata. The look-up privacy policy looks if the image or similar type of image already exists which can be given with the similar privacy policies. If similar type of image doesn’t exist then it looks for all the policies and lets user choose the policies. Fig 1: System architecture 3.3 A3P CORE There are two major components in A3PCore: 1. Image classification 2. Adaptive policy prediction 3.3.1 Metadata-based image classification: The Metadata-based image classification groups images into sub-categories. The process consists of following 3 steps: Step 1: Extract keywords from the metadata associated with an image. The metadata considered are tags, caption and comments. Identify all the nouns, verbs and adjectives in the metadata and store them as metadata vectors. where i, j and k are the total number of nouns, verbs and adjectives respectively. Step 2: Derive a representative hypernym ( h) from each metadata vector. Retrieve the hypernym for each in a metadata vector based on the Word net classification and obtain a list of hypernym where v: hypernym and f :frequency. Step 3: Find a subcategory that an image belongs to. At the beginning, the first image forms a subcategory as itself and the representative hypernyms of the image becomes the subcategory’s representative hypernyms. We compute the distance between representative hypernyms of a new incoming image and each existing subcategory [4]. 3.3.2 Adaptive policy prediction There are two major components in the Adaptive policy prediction process. 1. Policy mining 2. Policy prediction Policy mining is a process of mining policies for similar categorized images and policy prediction process for predicting the policy for user uploaded images. Policy mining: Privacy policies are privacy preferences expressed by the user to protect their information from unwanted disclosure. Policy mining process deals with mining of policies by applying various association rules and steps. This hierarchical approach considers subject, action and conditions. It includes following steps: Step1: apply association rule mining on subject component of the policies of the new image. Then
  • 3. 40 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST select the best rule by considering the two measures like support and confidence. Step 2 : similar to the first step apply association rule mining on action component . Then select the best rule. Step 3: mine the condition component in each policy set. The best rules are selected which gives us a set of attributes which often appear in policies. Policy prediction: the policy mining process may give us many number of policies, but our system needs to show the best one to the user thus, this approach is to choose the best policy for the user by obtaining the strictness level. The strictness level describes how strict a policy is. The strictness can be discovered by two metrics: major level and coverage rate. The major level is determined with the help of combinations of subject and action in policy and coverage rate is determined using the condition component statement. IV. CONCLUSION We have proposed an Adaptive privacy policy prediction (A3P) system to automate the privacy policy settings for user uploaded images. And it provides hassle free policies for user information on social networking site. REFERENCES [1] Anna cinziz squicciarini, member,IEEE, Dan Lin,Smith Sundareswaran and Joshua Wede,“Privacy policy inference of user-uploaded images on content sharing sites”.IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,VOL 27,NO.1, JANUARY 2015 [2] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, “Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 357–366. [3] J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security, 2009. [4] L. Geng and H. J. Hamilton, “Interestingness measures for data mining: A survey,” ACM Comput. Surv., vol. 38, no. 3, p. 9, 2006. [5] P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386. [6] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing facebook privacy settings: User expectations vs. reality,” in Proc. ACMSIGCOMMConf. Internet Meas. Conf., 2011, pp. 61–70. [7] R. Ravichandran, M. Benisch, P. Kelley, and N. Sadeh, “Capturing social networking privacy preferences,” in Proc. Symp. Usable Privacy Security, 2009. [8] R. A. Wagner and M. J. Fischer, “The string-to-string correction problem,” J. ACM, vol. 21, no. 1, pp. 168–173, 1974.