SlideShare a Scribd company logo
1 of 9
Privacy Policy Inference of User-Uploaded Images on
Content Sharing Sites
ABSTRACT:
With the increasing volume of images users share through social sites, maintaining
privacy has become a major problem, as demonstrated by a recent wave of
publicized incidents where users inadvertently shared personal information. In
light of these incidents, the need of tools to help users control access to their shared
content is apparent. Toward addressing this need, we propose an Adaptive Privacy
Policy Prediction (A3P) system to help users compose privacy settings for their
images. We examine the role of social context, image content, and metadata as
possible indicators of usersā€™ privacy preferences. We propose a two-level
framework which according to the userā€™s available history on the site, determines
the best available privacy policy for the userā€™s images being uploaded. Our
solution relies on an image classification framework for image categories which
may be associated with similar policies, and on a policy prediction algorithm to
automatically generate a policy for each newly uploaded image, also according to
usersā€™ social features. Over time, the generated policies will follow the evolution of
usersā€™ privacy attitude. We provide the results of our extensive evaluation over
5,000 policies, which demonstrate the effectiveness of our system, with prediction
accuracies over 90 percent.
EXISTING SYSTEM:
ļ¶ Most content sharing websites allow users to enter their privacy preferences.
Unfortunately, recent studies have shown that users struggle to set up and
maintain such privacy settings.
ļ¶ One of the main reasons provided is that given the amount of shared
information this process can be tedious and error-prone. Therefore, many
have acknowledged the need of policy recommendation systems which can
assist users to easily and properly configure privacy settings.
DISADVANTAGES OF EXISTING SYSTEM:
ļ¶ Sharing images within online content sharing sites,therefore,may quickly
leadto unwanted disclosure and privacy violations.
ļ¶ Further, the persistent nature of online media makes it possible for other
users to collect rich aggregated information about the owner of the published
content and the subjects in the published content.
ļ¶ The aggregated information can result in unexpected exposure of oneā€™s
social environment and lead to abuse of oneā€™s personal information.
PROPOSED SYSTEM:
ļ¶ In this paper, we propose an Adaptive Privacy Policy Prediction (A3P)
system which aims to provide users a hassle free privacy settings experience
by automatically generating personalized policies. The A3P system handles
user uploaded images, and factors in the following criteria that influence
oneā€™s privacy settings of images:
o The impact of social environment and personal characteristics. Social
context of users, such as their profile information and relationships
with others may provide useful information regarding usersā€™ privacy
preferences. For example, users interested in photography may like to
share their photos with other amateur photographers.
o The role of imageā€™s content and metadata. In general, similar images
often incur similar privacy preferences, especially when people appear
in the images. For example, one may upload several photos of his kids
and specify that only his family members are allowed to see these
photos.
ADVANTAGES OF PROPOSED SYSTEM:
The A3P-core focuses on analyzing each individual userā€™s own images and
metadata, while the A3P-Social offers a community perspective of privacy setting
recommendations for a userā€™s potential privacy improvement. We design the
interaction flows between the two building blocks to balance the benefits from
meeting personal characteristics and obtaining community advice.
MODULES:
ļ¶ System Construction Module
ļ¶ Content-Based Classification
ļ¶ Metadata-Based Classification
ļ¶ Adaptive Policy Prediction
MODULES DESCSRIPTION:
System ConstructionModule
The A3P system consists of two main components: A3P-core and A3P-social. The
overall data flow is the following. When a user uploads an image, the image will
be first sent to the A3P-core. The A3P-core classifies the image and determines
whether there is a need to invoke the A3P-social. In most cases, the A3P-core
predicts policies for the users directly based on their historical behavior. If one of
the following two cases is verified true, A3P-core will invoke A3Psocial: (i) The
user does not have enough data for the type of the uploaded image to conduct
policy prediction; (ii) The A3P-core detects the recent major changes among the
userā€™s community about their privacy practices along with userā€™s increase of social
networking activities (addition of new friends, new posts ononeā€™s profile etc).
Content-BasedClassification
To obtain groups of images that may be associated with similar privacy
preferences, we propose a hierarchical image classification which classifies images
first based on their contents and then refine each category into subcategories based
on their metadata. Images that do not have metadata will be grouped only by
content. Such a hierarchical classification gives a higher priority to image content
and minimizes the influence of missing tags. Note that it is possible that some
images are included in multiple categories as long as they contain the typical
content features or metadata of those categories.
Our approach to content-based classification is based on an efficient and yet
accurate image similarity approach. Specifically, our classification algorithm
compares image signatures defined based on quantified and sanitized version of
Haar wavelet transformation. For each image, the wavelet transform encodes
frequency and spatial information related to image color, size, invariant transform,
shape, texture, symmetry, etc. Then, a small number of coefficients are selected to
form the signature of the image. The content similarity among images is then
determined by the distance among their image signatures.
Metadata-BasedClassification
The metadata-based classification groups images into subcategories under
aforementioned baseline categories. The process consists of three main steps. The
first step is to extract keywords from the metadata associated with an image. The
metadata considered in our work are tags, captions, and comments. The second
step is to derive a representative hypernym (denoted as h) from each metadata
vector. The third step is to find a subcategory that an image belongs to. This is an
incremental procedure. At the beginning, the first image forms a subcategory as
itself and the representative hypernyms of the image becomes the subcategoryā€™s
representative hypernyms.
Adaptive Policy Prediction
The policy prediction algorithm provides a predicted policy of a newly uploaded
image to the user for his/her reference. More importantly, the predicted policy will
reflect the possible changes of a userā€™s privacy concerns. The prediction process
consists of three main phases: (i) policy normalization; (ii) policy mining; and (iii)
policy prediction.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
ļƒ˜ System : Pentium IV 2.4 GHz.
ļƒ˜ Hard Disk : 40 GB.
ļƒ˜ Floppy Drive : 1.44 Mb.
ļƒ˜ Monitor : 15 VGA Colour.
ļƒ˜ Mouse : Logitech.
ļƒ˜ Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
ļƒ˜ Operating system : Windows XP/7.
ļƒ˜ Coding Language : ASP.NET,C#.NET
ļƒ˜ Tool : Visual Studio 2008
ļƒ˜ Database : SQL Server 2005
REFERENCE:
Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and
Joshua Wede, ā€œPrivacy Policy Inference of User-Uploaded Images on Content
Sharing Sitesā€, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, VOL. 27, NO. 1, JANUARY 2015.
IEEE Projects 2015 | Privacy policy inference of user uploaded images on content sharing sites

More Related Content

What's hot

Tag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationTag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationeSAT Publishing House
Ā 
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKINGTAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKINGNexgen Technology
Ā 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESShakas Technologies
Ā 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)IOSR Journals
Ā 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
Ā 
Preventing private information inference attacks on social networks
Preventing private information inference attacks on social networksPreventing private information inference attacks on social networks
Preventing private information inference attacks on social networksJPINFOTECH JAYAPRAKASH
Ā 
oneslider_template_ACS [532226]
oneslider_template_ACS [532226]oneslider_template_ACS [532226]
oneslider_template_ACS [532226]Anastasia Nimets
Ā 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadedShakas Technologies
Ā 
FIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemFIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemIJTET Journal
Ā 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networkseditorjournal
Ā 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
Ā 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ā 
Computing Social Score of Web Artifacts - IRE Major Project Spring 2015
Computing Social Score of Web Artifacts - IRE Major Project Spring 2015Computing Social Score of Web Artifacts - IRE Major Project Spring 2015
Computing Social Score of Web Artifacts - IRE Major Project Spring 2015Amar Budhiraja
Ā 
Recommendation systems
Recommendation systemsRecommendation systems
Recommendation systemsSaurabhWani6
Ā 
Negotiated Studies - A semantic social network based expert recommender system
Negotiated Studies - A semantic social network based expert recommender systemNegotiated Studies - A semantic social network based expert recommender system
Negotiated Studies - A semantic social network based expert recommender systemPremsankar Chakkingal
Ā 
Social Media Mining - Chapter 8 (Influence and Homophily)
Social Media Mining - Chapter 8 (Influence and Homophily)Social Media Mining - Chapter 8 (Influence and Homophily)
Social Media Mining - Chapter 8 (Influence and Homophily)SocialMediaMining
Ā 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...IJMTST Journal
Ā 

What's hot (17)

Tag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationTag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotation
Ā 
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKINGTAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
Ā 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Ā 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Ā 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
Ā 
Preventing private information inference attacks on social networks
Preventing private information inference attacks on social networksPreventing private information inference attacks on social networks
Preventing private information inference attacks on social networks
Ā 
oneslider_template_ACS [532226]
oneslider_template_ACS [532226]oneslider_template_ACS [532226]
oneslider_template_ACS [532226]
Ā 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
Ā 
FIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemFIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation System
Ā 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
Ā 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Ā 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
Ā 
Computing Social Score of Web Artifacts - IRE Major Project Spring 2015
Computing Social Score of Web Artifacts - IRE Major Project Spring 2015Computing Social Score of Web Artifacts - IRE Major Project Spring 2015
Computing Social Score of Web Artifacts - IRE Major Project Spring 2015
Ā 
Recommendation systems
Recommendation systemsRecommendation systems
Recommendation systems
Ā 
Negotiated Studies - A semantic social network based expert recommender system
Negotiated Studies - A semantic social network based expert recommender systemNegotiated Studies - A semantic social network based expert recommender system
Negotiated Studies - A semantic social network based expert recommender system
Ā 
Social Media Mining - Chapter 8 (Influence and Homophily)
Social Media Mining - Chapter 8 (Influence and Homophily)Social Media Mining - Chapter 8 (Influence and Homophily)
Social Media Mining - Chapter 8 (Influence and Homophily)
Ā 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Ā 

Similar to IEEE Projects 2015 | Privacy policy inference of user uploaded images on content sharing sites

Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadednexgentech15
Ā 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESnexgentechnology
Ā 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...Nexgen Technology
Ā 
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...IJERA Editor
Ā 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites1crore projects
Ā 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...IJMTST Journal
Ā 
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingAdaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingIOSR Journals
Ā 
Social Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image SearchSocial Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image SearchIRJET Journal
Ā 
Optimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing WebsitesOptimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing Websitesijceronline
Ā 
Image Tagging With Social Assistance
Image Tagging With Social AssistanceImage Tagging With Social Assistance
Image Tagging With Social Assistanceijtsrd
Ā 
Ko3419161921
Ko3419161921Ko3419161921
Ko3419161921IJERA Editor
Ā 
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...IJERA Editor
Ā 
C043109012
C043109012C043109012
C043109012ijceronline
Ā 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
Ā 
IRJET- Hybrid Recommendation System for Movies
IRJET-  	  Hybrid Recommendation System for MoviesIRJET-  	  Hybrid Recommendation System for Movies
IRJET- Hybrid Recommendation System for MoviesIRJET Journal
Ā 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED
Ā 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataJPINFOTECH JAYAPRAKASH
Ā 

Similar to IEEE Projects 2015 | Privacy policy inference of user uploaded images on content sharing sites (20)

Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
Ā 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Ā 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
Ā 
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Ā 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Ā 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Ā 
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingAdaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social Networking
Ā 
Social Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image SearchSocial Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image Search
Ā 
Optimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing WebsitesOptimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing Websites
Ā 
Image Tagging With Social Assistance
Image Tagging With Social AssistanceImage Tagging With Social Assistance
Image Tagging With Social Assistance
Ā 
Ko3419161921
Ko3419161921Ko3419161921
Ko3419161921
Ā 
Ijetr042330
Ijetr042330Ijetr042330
Ijetr042330
Ā 
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Ā 
C043109012
C043109012C043109012
C043109012
Ā 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
Ā 
Bn35364376
Bn35364376Bn35364376
Bn35364376
Ā 
T0 numtq0njc=
T0 numtq0njc=T0 numtq0njc=
T0 numtq0njc=
Ā 
IRJET- Hybrid Recommendation System for Movies
IRJET-  	  Hybrid Recommendation System for MoviesIRJET-  	  Hybrid Recommendation System for Movies
IRJET- Hybrid Recommendation System for Movies
Ā 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09
Ā 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse data
Ā 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
Ā 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
Ā 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
Ā 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
Ā 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
Ā 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
Ā 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
Ā 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
Ā 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
Ā 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
Ā 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
Ā 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Ā 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
Ā 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Ā 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
Ā 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
Ā 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
Ā 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
Ā 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
Ā 
CĆ³digo Creativo y Arte de Software | Unidad 1
CĆ³digo Creativo y Arte de Software | Unidad 1CĆ³digo Creativo y Arte de Software | Unidad 1
CĆ³digo Creativo y Arte de Software | Unidad 1
Ā 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
Ā 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
Ā 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Ā 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
Ā 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Ā 

IEEE Projects 2015 | Privacy policy inference of user uploaded images on content sharing sites

  • 1. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
  • 2. ABSTRACT: With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content, and metadata as possible indicators of usersā€™ privacy preferences. We propose a two-level framework which according to the userā€™s available history on the site, determines the best available privacy policy for the userā€™s images being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to usersā€™ social features. Over time, the generated policies will follow the evolution of usersā€™ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent. EXISTING SYSTEM: ļ¶ Most content sharing websites allow users to enter their privacy preferences. Unfortunately, recent studies have shown that users struggle to set up and maintain such privacy settings.
  • 3. ļ¶ One of the main reasons provided is that given the amount of shared information this process can be tedious and error-prone. Therefore, many have acknowledged the need of policy recommendation systems which can assist users to easily and properly configure privacy settings. DISADVANTAGES OF EXISTING SYSTEM: ļ¶ Sharing images within online content sharing sites,therefore,may quickly leadto unwanted disclosure and privacy violations. ļ¶ Further, the persistent nature of online media makes it possible for other users to collect rich aggregated information about the owner of the published content and the subjects in the published content. ļ¶ The aggregated information can result in unexpected exposure of oneā€™s social environment and lead to abuse of oneā€™s personal information. PROPOSED SYSTEM: ļ¶ In this paper, we propose an Adaptive Privacy Policy Prediction (A3P) system which aims to provide users a hassle free privacy settings experience by automatically generating personalized policies. The A3P system handles user uploaded images, and factors in the following criteria that influence oneā€™s privacy settings of images: o The impact of social environment and personal characteristics. Social context of users, such as their profile information and relationships with others may provide useful information regarding usersā€™ privacy
  • 4. preferences. For example, users interested in photography may like to share their photos with other amateur photographers. o The role of imageā€™s content and metadata. In general, similar images often incur similar privacy preferences, especially when people appear in the images. For example, one may upload several photos of his kids and specify that only his family members are allowed to see these photos. ADVANTAGES OF PROPOSED SYSTEM: The A3P-core focuses on analyzing each individual userā€™s own images and metadata, while the A3P-Social offers a community perspective of privacy setting recommendations for a userā€™s potential privacy improvement. We design the interaction flows between the two building blocks to balance the benefits from meeting personal characteristics and obtaining community advice. MODULES: ļ¶ System Construction Module ļ¶ Content-Based Classification ļ¶ Metadata-Based Classification ļ¶ Adaptive Policy Prediction MODULES DESCSRIPTION:
  • 5. System ConstructionModule The A3P system consists of two main components: A3P-core and A3P-social. The overall data flow is the following. When a user uploads an image, the image will be first sent to the A3P-core. The A3P-core classifies the image and determines whether there is a need to invoke the A3P-social. In most cases, the A3P-core predicts policies for the users directly based on their historical behavior. If one of the following two cases is verified true, A3P-core will invoke A3Psocial: (i) The user does not have enough data for the type of the uploaded image to conduct policy prediction; (ii) The A3P-core detects the recent major changes among the userā€™s community about their privacy practices along with userā€™s increase of social networking activities (addition of new friends, new posts ononeā€™s profile etc). Content-BasedClassification To obtain groups of images that may be associated with similar privacy preferences, we propose a hierarchical image classification which classifies images first based on their contents and then refine each category into subcategories based on their metadata. Images that do not have metadata will be grouped only by content. Such a hierarchical classification gives a higher priority to image content and minimizes the influence of missing tags. Note that it is possible that some images are included in multiple categories as long as they contain the typical content features or metadata of those categories. Our approach to content-based classification is based on an efficient and yet accurate image similarity approach. Specifically, our classification algorithm compares image signatures defined based on quantified and sanitized version of
  • 6. Haar wavelet transformation. For each image, the wavelet transform encodes frequency and spatial information related to image color, size, invariant transform, shape, texture, symmetry, etc. Then, a small number of coefficients are selected to form the signature of the image. The content similarity among images is then determined by the distance among their image signatures. Metadata-BasedClassification The metadata-based classification groups images into subcategories under aforementioned baseline categories. The process consists of three main steps. The first step is to extract keywords from the metadata associated with an image. The metadata considered in our work are tags, captions, and comments. The second step is to derive a representative hypernym (denoted as h) from each metadata vector. The third step is to find a subcategory that an image belongs to. This is an incremental procedure. At the beginning, the first image forms a subcategory as itself and the representative hypernyms of the image becomes the subcategoryā€™s representative hypernyms. Adaptive Policy Prediction The policy prediction algorithm provides a predicted policy of a newly uploaded image to the user for his/her reference. More importantly, the predicted policy will reflect the possible changes of a userā€™s privacy concerns. The prediction process consists of three main phases: (i) policy normalization; (ii) policy mining; and (iii) policy prediction.
  • 8. ļƒ˜ System : Pentium IV 2.4 GHz. ļƒ˜ Hard Disk : 40 GB. ļƒ˜ Floppy Drive : 1.44 Mb. ļƒ˜ Monitor : 15 VGA Colour. ļƒ˜ Mouse : Logitech. ļƒ˜ Ram : 512 Mb. SOFTWARE REQUIREMENTS: ļƒ˜ Operating system : Windows XP/7. ļƒ˜ Coding Language : ASP.NET,C#.NET ļƒ˜ Tool : Visual Studio 2008 ļƒ˜ Database : SQL Server 2005 REFERENCE: Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and Joshua Wede, ā€œPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sitesā€, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015.