SlideShare a Scribd company logo
1 of 66
WELCOME
TO
“GITAMS BUSINESS AND IT
SCHOOL”
Near Jaya Raj Gardens, KADAPA
A PROJECT REPORT ON
“Photo sharing in Online Social Networks with
User Privacy Control”
CONTENTS
 Abstract
 Introduction
 Software Requirement Analysis and Specification
 System Design
 Testing
 Implementation
 Conclusions
ABSTRACT
 In Online Social Networks (OSNs) Photo sharing popularizes.
But, it leaks the user’s security when they are post, comment
and tag a photo. In order to solve this issue in this application,
proposing a mechanism to activate each individual photo
posting activity and provide the decision making control on
the posting photo. For this system, I require an efficient facial
recognition (FR) system. However, more FR system is trained
the privacy setting may limit the number of the photos
publicly available. For this purpose my mechanism provides
to utilize user’s private photos to design a personalized FR
system. Specifically trained to differentiate possible photo co-
owners without leaking their security. Need to develop a
distributed consensus-based method to reduce the comparison
difficulties and protect the private training set.
INTRODUCTION
PURPOSE
 This application purpose is to provide a mechanism to
enable each individual in a photo be aware of the posting
activity and participate in the decision making on the
photo posting.
SCOPE
The scope of the application achieves efficiency
and privacy at the same time. The idea is to let
each user only deal with his/her private photo set
as the local train data and use it to learn out the
local training result. After this, local training results
are exchanged among users to form a global
knowledge.
EXISTING SYSTEM
Mavridis et al. study the statistics of photo sharing
on social networks and propose a three realms
model: “a social realm, in which identities are
entities, and friendship a relation; second, a visual
sensory realm, of which faces are entities, and co-
occurrence in images a relation; and third, a
physical realm, in which bodies belong, with
physical proximity being a relation.”
DISADVANTAGES
1. Currently there is no restriction with sharing of co-
photos, on the contrary, social network service
providers like Face book.
2. on most current OSNs, users have no control over
the information appearing outside their profile
page.
PROPOSED SYSTEM
We propose a privacy-preserving distributed
collaborative training system as our FR engine. In our
system, we ask each of our users to establish a private
photo set of their own. We use these private photos to
build personal FR engines based on the specific social
context and promise that during FR training, only the
discriminating rules are revealed but nothing else.
we propose a novel consensus based approach to
achieve efficiency and privacy at the same time.
ADVANTAGES
1. It uses private photos in a privacy-preserving
manner and social contexts to derive a
personal FR engine for any particular user.
2. It propose a consensus-based method to
achieve privacy and efficiency.
SOFTWARE REQUIREMENT ANALYSIS AND
SPECIFICATION
SYSTEM ARCHITECTURE
PRODUCT FUNCTIONS
 Photo privacy
 Social network
 Friend list
 Collaborative Learning
Photo privacy
 Users care about privacy is unlikely to put photos online.
 we ask each of our users to establish a private photo set of
their own.
Social network
 A social network service is an online platform which people
use to build social relationship with other people who share
similar personal or career interests.
 We designed a privacy-preserving FR system to identify
individuals in a co-photo.
Friend list
 According to our protocol, A person friends communicate only
with his/her friend. And they have no idea of what they are
computing for.
Collaborative Learning
 Propose to use multiple personal FR engines to work
collaboratively to improve the recognition ratio.
HARDWARE REQUIREMENTS
 System : Intel Dual Core
 Hard Disk : 120 GB.
 RAM : 1GB.
SOFTWARE REQUIREMENTS
 Operating system : Windows 7.
 Coding Language : JAVA/J2EE
 Front End : JSP,HTML
 Web server : tomcat7.x
 Database : MYSQL
NON-FUNCTIONAL REQUIREMENTS
 Reliability:-The packages will pick-up current transactions
online. Regarding the old transactions, user will enter them in
to the system.
 Security:-The web server and database server should be
protected from hacking, virus etc.
 Portability:-The application will be developed using standard
open source software (Except Oracle) like Java, tomcat web
server, Internet Explorer Browser etc. these software will
work both on Windows and Linux OS. Hence portability
problems will not arise.
 Performance:-System is highly functional and good in
performance. The system must use the minimal set of
variables and minimal usage of the control structures will
dynamically increase the performance of the system.
SOFTWARE DEVELOPMENT LIFE CYCLE
SYSTEM DESIGN
ER-DIAGRAM
Column name Data type(Size) Constraint
Id Int(11) Primary key
Username Varchar(45) NOT NULL
Password Varchar(45) NOT NULL
DATA TABLES
TABLE NAME :- ADMIN
Column name Data type(Size) Constraint
cid Int(11) Primar key
Username Varchar(45) NOT NULL
Imageid Int(11) NOT NULL
Date Varchar(45) NOT NULL
Comment Varchar(500) NOT NULL
TABLE NAME :- COMMENTS
Column name Data type Constraint
Id Int(11) Primary key
Title Varchar(45) NOT NULL
Post to Varchar(45) NOT NULL
Description Text NOT NULL
Location Varchar(45) NOT NULL
Privacy Varchar (45) NOT NULL
Images longblob NOT NULL
Binary image Long text NOT NULL
Count Int(11) NOT NULL
Image title Varchar(45) NOT NULL
uname Varchar(45) NOT NULL
Date Varchar(45) NOT NULL
TABLE NAME :- IMAGES
Column name Data type Constraint
Id Int(11) Primary key
username Varchar(45) NOT NULL
Password Varchar(45) NOT NULL
Email Varchar(45) NOT NULL
Mobile Int(11) NOT NULL
Address Varchar(45) NOT NULL
Dob Varchar(45) NOT NULL
Gender Varchar(45) NOT NULL
Location Varchar(45) NOT NULL
Image Lonblob NOT NULL
TABLE NAME :- USER
UML DIAGRAMS
USE CASE DIAGRAM FOR OVERALL SYSTEM
Add posts
Search posts based on keyword
Search history
View user profile
User
List all images with comments
View image ranks
Search posts
View user profile
Search posts based on content
Search friend
admin
CLASS DIAGRAM FOR OVERALL SYSTEM
SEQUENCE DIAGRAM FOR ADD POSTS
: User
: User
: system
: system : Serv
er
: Serv
er : Databse
: Databse
1: login()
2: Prompt for user details()
3: Enter details()
4: Process details()
5: compare details()
6: Result()
7: Display user profile()
8: Select add post()
9: Add post()
10: Encrypt and add post
11: Update database
12: Sav
e post details()
13: Display()
14: v
iew post()
15: logout()
SEQUENCE DIAGRAM TO LIST OF IMAGES WITH
COMMENTS
13: v
iew all images with comments()
: User
: User : System
: System : Server
: Server : Database
: Database
1: login()
2: Prompt for user details()
3: Enter details
4: Process details
5: Compare details()
6: Result()
7: Display user details()
8: Select activ
ity log in user profile()
9: Select categeory as all images with comments()
10: Search()
11: Fetch details()
12: Display()
14: logout()
SEQUENCE DIAGRAM FOR SEARCH FRIEND
: User
: User
: System
: System : Server
: Server : Database
: Database
1: login()
2: prompt for user details()
3: enter details()
4: process details()
5: compare details()
6: Result()
7: display user profile()
8: select search box in user profile()
9: type name in the box()
10: search()
11: fetch details()
12: display()
13: check profile()
14: logout()
SEQUENCE DIAGRAM FOR VIEW USER PROFILE
13: v
iew user profile
: User
: User
: System
: System : Serv
er
: Serv
er : Database
: Database
1: login()
2: prompt for user details()
3: enter details()
4: process details()
5: compare details()
6: result()
7: display usr profile()
8: check user profile()
9: check()
10: fetch details()
11: send details()
12: display()
14: logout()
ACTIVITY DIAGRAM FOR ADD POSTS
Login
Prov
ide userid
& password
Inv
alid userid &
password
Select add post
on user profile
Encrypt & add
post
View post
Prompt for
user details
Giv
e
permission
Prov
ide acess
to user profile
Update
database
Check user
details
Post is added
Failure
Sucess
Database
System
User
ACTIVITY DIAGRAM TO LIST OF IMAGES WITH COMMENTS
Login
Prov
ide userid
& password
Inv
alid userid &
password
Prompt to v
iew
profile page
Select activ
ity log
in user profile page
Select categeory as all
images with comments
All images with
comments is displayed
Prompt for
user details
Giv
e
permission
Prov
ide access
to user profile
Display user
profile
Search
Check user
details
Fetch details
Send details
Inv
alid v
alid
Database
System
Admin
ACTIVITY DIAGRAM FOR SEARCH FRIEND
Login
Prov
ide userid
& password
Inv
alid userid &
password
Select search
box in user profile
Type name in
the search box
Inv
alid user
Check profile
Prompt for
user details
Giv
e
permission
Prov
ide acess
to user profile
Search
Giv
e result
Check user
details
Fetch details
Failure
Sucess
Inv
alid
Valid
Database
System
User
ACTIVITY DIAGRAM FOR VIEW USER PROFILE
Login
Prov
ide userid
& password
Inv
alid userid &
password
Check user
profile
View user
profile
Prompt for
user details
Giv
e
permission
Prov
ide acess
to user profile
Prompt to check
user details
Receiv
e
Check user
details
Fetch details
Send details
Inv
alid
v
alid
Database
System
Admin
DEPLOYMENT DIAGRAM
TESTING
 Testing is a process, which reveals errors in the program.
It is the major quality measure during software
development. During software development, during
testing, the program is executed with a set of test cases
and the output of the program for the test cases is
evaluated to determine if the program is performing as it.
expected to perform.
TESTING METHODOLOGIES
 Types:
 White box testing
 Black box testing
 Levels of testing:
 Unit Testing
 Integration Testing
 System Testing
 Acceptance Testing
TEST CASES
TEST CASES FOR ADMIN
Test cases Input Expected Result Actual Result Status
Login Give the valid user
name and password
Admin home page
should be opened
Admin home Page
has been opened
Pass
Login Give Username
without Password
User page should
not be opened
User name and
password is invalid
Pass
List of Users Select List of Users
Display User
Profile Details
List of users is
displayed
successfully
Pass
List all images with
comments
Select list all
images with
comments
Display list all
images with
comments
List all images with
comments is
displayed
successfully
Pass
View search history Select view search
history
Display search
history
Search history is
displayed
successfully
Pass
Search post Select search post
And give details
Display list of posts List of posts is
displayed
successfully
Pass
View image ranks Select view image
ranks
Display image ranks Images with ranks
displayed
successfully
Pass
TEST CASES
TEST CASES FOR USER
TEST CASES INPUT EXPECTED
RESULT
ACTUAL RESULT STATUS
Registration Enter all fields
properly
User gets registered Registration
is successful
Pass
Registration If user miss any
mandatory field
User not registered Registration is
un successful
Pass
Login Give valid Username
and password
User page should be
opened
User page has been
opened
Pass
Login Give Username
without Password
User page should not
be opened
User name and
password is invalid
Fail
Add post Select add post and
give details
Display post Post is added Success
Fully
Pass
View All Requests Select View all
Requests
Display User Profiles List of friends are
displayed
successfully
Pass
Search Posts based on
Keyword
Give Keyword Display List of Posts Posts Based on
Keyword is
Displayed
Successfully
Pass
Search Posts Based
on Content
Give Contents
Keyword
Display List of Posts Posts Based on
Content is Displayed
Successfully
Pass
Search History Select Search History Display User Search
History
User Search History
is displayed
Successfully
Pass
IMPLEMENTATION
 Implementation is the process of assuring the
information system which is operational and then
allowing user take its operation for its operations for use
and evaluation.
HOME PAGE
ADMIN LOGIN PAGE
ADMIN MAIN PAGE
LIST OF USERS
LIST OF IMAGES WITH COMMENTS
VIEW SEARCH HISTORY
VIEW IMAGE RANKS
SEARCH POST
USER REGISTRATION FORM
AFTER SUCCESSFULLY USER INFORMATION ADDED
WHICH CAN BE AUTHORIZED BY THE ADMIN
USER LOGIN
USER MAIN PAGE
USER PROFILE
ADD POST
SEARCH POSTS BASED ON KEYWORD
SEARCH POSTS BASED ON KEYWORD WITH
SAMPLE CONTENT
SEARCH POSTS BASED ON CONTENT
SEARCH POSTS BASED ON CONTENT WITH
SAMPLE CONTENT
SEARCH FRIEND
SEARCH FRIEND WITH SAMPLE NAME
SEARCH HISTORY
VIEW ALL REQUESTS
FIND STRANGER
CONCLUSIONS
 Photo sharing is one of the most popular features in online social
networks such as Facebook. Unfortunately, careless photo
posting may reveal privacy of individuals in a posted photo. To
curb the privacy leakage, I propose to enable individuals
potentially in a photo to give the permissions. The proposed
system is featured with low computation cost and confidentiality
of the training set. Theoretical analysis and experiments were
conducted to show effectiveness and efficiency of the proposed
scheme, before posting a co-photo. I expect that my proposed
scheme be very useful in protecting user’s privacy in
photo/image sharing over online social networks.
Project

More Related Content

Similar to Project

Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Kiran K.V.S.
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
IRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data VisualizationIRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data VisualizationIRJET Journal
 
System analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systemsSystem analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systemsijma
 
Online eaxmination
Online eaxminationOnline eaxmination
Online eaxminationAditi_17
 
Adaptive provisioning of human expertise in Service Oriented Systems ppt
Adaptive provisioning of human expertise in Service Oriented Systems pptAdaptive provisioning of human expertise in Service Oriented Systems ppt
Adaptive provisioning of human expertise in Service Oriented Systems pptSurya2306
 
Online voting system
Online voting systemOnline voting system
Online voting systemSaurabh Kheni
 
EMPLOYEE WELFARE ASSOCIATION NTPC
EMPLOYEE WELFARE ASSOCIATION NTPCEMPLOYEE WELFARE ASSOCIATION NTPC
EMPLOYEE WELFARE ASSOCIATION NTPCchandamca
 
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...reshma reshu
 
My website Pro Photography (profotografo.com)
My website Pro Photography (profotografo.com) My website Pro Photography (profotografo.com)
My website Pro Photography (profotografo.com) Vikas KC
 
Discovering Human Characteristic using Face Analysis
Discovering Human Characteristic using Face AnalysisDiscovering Human Characteristic using Face Analysis
Discovering Human Characteristic using Face AnalysisCIB Egypt
 
RajeshBalu_Resume
RajeshBalu_ResumeRajeshBalu_Resume
RajeshBalu_ResumeRajesh Balu
 
IRJET- Question-Answer Text Mining using Machine Learning
IRJET-  	  Question-Answer Text Mining using Machine LearningIRJET-  	  Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine LearningIRJET Journal
 
IRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine LearningIRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine LearningIRJET Journal
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...IRJET Journal
 
E voting(online voting system)
E voting(online voting system)E voting(online voting system)
E voting(online voting system)Saurabh Kheni
 
Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerRonitShrivastava057
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Jennifer Lopez
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...JPINFOTECH JAYAPRAKASH
 

Similar to Project (20)

Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
W3 analyzer.ppt
W3 analyzer.pptW3 analyzer.ppt
W3 analyzer.ppt
 
IRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data VisualizationIRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data Visualization
 
System analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systemsSystem analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systems
 
Online eaxmination
Online eaxminationOnline eaxmination
Online eaxmination
 
Adaptive provisioning of human expertise in Service Oriented Systems ppt
Adaptive provisioning of human expertise in Service Oriented Systems pptAdaptive provisioning of human expertise in Service Oriented Systems ppt
Adaptive provisioning of human expertise in Service Oriented Systems ppt
 
Online voting system
Online voting systemOnline voting system
Online voting system
 
EMPLOYEE WELFARE ASSOCIATION NTPC
EMPLOYEE WELFARE ASSOCIATION NTPCEMPLOYEE WELFARE ASSOCIATION NTPC
EMPLOYEE WELFARE ASSOCIATION NTPC
 
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
 
My website Pro Photography (profotografo.com)
My website Pro Photography (profotografo.com) My website Pro Photography (profotografo.com)
My website Pro Photography (profotografo.com)
 
Discovering Human Characteristic using Face Analysis
Discovering Human Characteristic using Face AnalysisDiscovering Human Characteristic using Face Analysis
Discovering Human Characteristic using Face Analysis
 
RajeshBalu_Resume
RajeshBalu_ResumeRajeshBalu_Resume
RajeshBalu_Resume
 
IRJET- Question-Answer Text Mining using Machine Learning
IRJET-  	  Question-Answer Text Mining using Machine LearningIRJET-  	  Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine Learning
 
IRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine LearningIRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine Learning
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
 
E voting(online voting system)
E voting(online voting system)E voting(online voting system)
E voting(online voting system)
 
Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure Visualizer
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 

Recently uploaded

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Recently uploaded (20)

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 

Project

  • 1. WELCOME TO “GITAMS BUSINESS AND IT SCHOOL” Near Jaya Raj Gardens, KADAPA
  • 2. A PROJECT REPORT ON “Photo sharing in Online Social Networks with User Privacy Control”
  • 3. CONTENTS  Abstract  Introduction  Software Requirement Analysis and Specification  System Design  Testing  Implementation  Conclusions
  • 4. ABSTRACT  In Online Social Networks (OSNs) Photo sharing popularizes. But, it leaks the user’s security when they are post, comment and tag a photo. In order to solve this issue in this application, proposing a mechanism to activate each individual photo posting activity and provide the decision making control on the posting photo. For this system, I require an efficient facial recognition (FR) system. However, more FR system is trained the privacy setting may limit the number of the photos publicly available. For this purpose my mechanism provides to utilize user’s private photos to design a personalized FR system. Specifically trained to differentiate possible photo co- owners without leaking their security. Need to develop a distributed consensus-based method to reduce the comparison difficulties and protect the private training set.
  • 6. PURPOSE  This application purpose is to provide a mechanism to enable each individual in a photo be aware of the posting activity and participate in the decision making on the photo posting.
  • 7. SCOPE The scope of the application achieves efficiency and privacy at the same time. The idea is to let each user only deal with his/her private photo set as the local train data and use it to learn out the local training result. After this, local training results are exchanged among users to form a global knowledge.
  • 8. EXISTING SYSTEM Mavridis et al. study the statistics of photo sharing on social networks and propose a three realms model: “a social realm, in which identities are entities, and friendship a relation; second, a visual sensory realm, of which faces are entities, and co- occurrence in images a relation; and third, a physical realm, in which bodies belong, with physical proximity being a relation.”
  • 9. DISADVANTAGES 1. Currently there is no restriction with sharing of co- photos, on the contrary, social network service providers like Face book. 2. on most current OSNs, users have no control over the information appearing outside their profile page.
  • 10. PROPOSED SYSTEM We propose a privacy-preserving distributed collaborative training system as our FR engine. In our system, we ask each of our users to establish a private photo set of their own. We use these private photos to build personal FR engines based on the specific social context and promise that during FR training, only the discriminating rules are revealed but nothing else. we propose a novel consensus based approach to achieve efficiency and privacy at the same time.
  • 11. ADVANTAGES 1. It uses private photos in a privacy-preserving manner and social contexts to derive a personal FR engine for any particular user. 2. It propose a consensus-based method to achieve privacy and efficiency.
  • 12. SOFTWARE REQUIREMENT ANALYSIS AND SPECIFICATION
  • 14. PRODUCT FUNCTIONS  Photo privacy  Social network  Friend list  Collaborative Learning
  • 15. Photo privacy  Users care about privacy is unlikely to put photos online.  we ask each of our users to establish a private photo set of their own. Social network  A social network service is an online platform which people use to build social relationship with other people who share similar personal or career interests.  We designed a privacy-preserving FR system to identify individuals in a co-photo. Friend list  According to our protocol, A person friends communicate only with his/her friend. And they have no idea of what they are computing for. Collaborative Learning  Propose to use multiple personal FR engines to work collaboratively to improve the recognition ratio.
  • 16. HARDWARE REQUIREMENTS  System : Intel Dual Core  Hard Disk : 120 GB.  RAM : 1GB. SOFTWARE REQUIREMENTS  Operating system : Windows 7.  Coding Language : JAVA/J2EE  Front End : JSP,HTML  Web server : tomcat7.x  Database : MYSQL
  • 17. NON-FUNCTIONAL REQUIREMENTS  Reliability:-The packages will pick-up current transactions online. Regarding the old transactions, user will enter them in to the system.  Security:-The web server and database server should be protected from hacking, virus etc.  Portability:-The application will be developed using standard open source software (Except Oracle) like Java, tomcat web server, Internet Explorer Browser etc. these software will work both on Windows and Linux OS. Hence portability problems will not arise.  Performance:-System is highly functional and good in performance. The system must use the minimal set of variables and minimal usage of the control structures will dynamically increase the performance of the system.
  • 21. Column name Data type(Size) Constraint Id Int(11) Primary key Username Varchar(45) NOT NULL Password Varchar(45) NOT NULL DATA TABLES TABLE NAME :- ADMIN
  • 22. Column name Data type(Size) Constraint cid Int(11) Primar key Username Varchar(45) NOT NULL Imageid Int(11) NOT NULL Date Varchar(45) NOT NULL Comment Varchar(500) NOT NULL TABLE NAME :- COMMENTS
  • 23. Column name Data type Constraint Id Int(11) Primary key Title Varchar(45) NOT NULL Post to Varchar(45) NOT NULL Description Text NOT NULL Location Varchar(45) NOT NULL Privacy Varchar (45) NOT NULL Images longblob NOT NULL Binary image Long text NOT NULL Count Int(11) NOT NULL Image title Varchar(45) NOT NULL uname Varchar(45) NOT NULL Date Varchar(45) NOT NULL TABLE NAME :- IMAGES
  • 24. Column name Data type Constraint Id Int(11) Primary key username Varchar(45) NOT NULL Password Varchar(45) NOT NULL Email Varchar(45) NOT NULL Mobile Int(11) NOT NULL Address Varchar(45) NOT NULL Dob Varchar(45) NOT NULL Gender Varchar(45) NOT NULL Location Varchar(45) NOT NULL Image Lonblob NOT NULL TABLE NAME :- USER
  • 26. USE CASE DIAGRAM FOR OVERALL SYSTEM Add posts Search posts based on keyword Search history View user profile User List all images with comments View image ranks Search posts View user profile Search posts based on content Search friend admin
  • 27. CLASS DIAGRAM FOR OVERALL SYSTEM
  • 28. SEQUENCE DIAGRAM FOR ADD POSTS : User : User : system : system : Serv er : Serv er : Databse : Databse 1: login() 2: Prompt for user details() 3: Enter details() 4: Process details() 5: compare details() 6: Result() 7: Display user profile() 8: Select add post() 9: Add post() 10: Encrypt and add post 11: Update database 12: Sav e post details() 13: Display() 14: v iew post() 15: logout()
  • 29. SEQUENCE DIAGRAM TO LIST OF IMAGES WITH COMMENTS 13: v iew all images with comments() : User : User : System : System : Server : Server : Database : Database 1: login() 2: Prompt for user details() 3: Enter details 4: Process details 5: Compare details() 6: Result() 7: Display user details() 8: Select activ ity log in user profile() 9: Select categeory as all images with comments() 10: Search() 11: Fetch details() 12: Display() 14: logout()
  • 30. SEQUENCE DIAGRAM FOR SEARCH FRIEND : User : User : System : System : Server : Server : Database : Database 1: login() 2: prompt for user details() 3: enter details() 4: process details() 5: compare details() 6: Result() 7: display user profile() 8: select search box in user profile() 9: type name in the box() 10: search() 11: fetch details() 12: display() 13: check profile() 14: logout()
  • 31. SEQUENCE DIAGRAM FOR VIEW USER PROFILE 13: v iew user profile : User : User : System : System : Serv er : Serv er : Database : Database 1: login() 2: prompt for user details() 3: enter details() 4: process details() 5: compare details() 6: result() 7: display usr profile() 8: check user profile() 9: check() 10: fetch details() 11: send details() 12: display() 14: logout()
  • 32. ACTIVITY DIAGRAM FOR ADD POSTS Login Prov ide userid & password Inv alid userid & password Select add post on user profile Encrypt & add post View post Prompt for user details Giv e permission Prov ide acess to user profile Update database Check user details Post is added Failure Sucess Database System User
  • 33. ACTIVITY DIAGRAM TO LIST OF IMAGES WITH COMMENTS Login Prov ide userid & password Inv alid userid & password Prompt to v iew profile page Select activ ity log in user profile page Select categeory as all images with comments All images with comments is displayed Prompt for user details Giv e permission Prov ide access to user profile Display user profile Search Check user details Fetch details Send details Inv alid v alid Database System Admin
  • 34. ACTIVITY DIAGRAM FOR SEARCH FRIEND Login Prov ide userid & password Inv alid userid & password Select search box in user profile Type name in the search box Inv alid user Check profile Prompt for user details Giv e permission Prov ide acess to user profile Search Giv e result Check user details Fetch details Failure Sucess Inv alid Valid Database System User
  • 35. ACTIVITY DIAGRAM FOR VIEW USER PROFILE Login Prov ide userid & password Inv alid userid & password Check user profile View user profile Prompt for user details Giv e permission Prov ide acess to user profile Prompt to check user details Receiv e Check user details Fetch details Send details Inv alid v alid Database System Admin
  • 37. TESTING  Testing is a process, which reveals errors in the program. It is the major quality measure during software development. During software development, during testing, the program is executed with a set of test cases and the output of the program for the test cases is evaluated to determine if the program is performing as it. expected to perform.
  • 38. TESTING METHODOLOGIES  Types:  White box testing  Black box testing  Levels of testing:  Unit Testing  Integration Testing  System Testing  Acceptance Testing
  • 39. TEST CASES TEST CASES FOR ADMIN Test cases Input Expected Result Actual Result Status Login Give the valid user name and password Admin home page should be opened Admin home Page has been opened Pass Login Give Username without Password User page should not be opened User name and password is invalid Pass List of Users Select List of Users Display User Profile Details List of users is displayed successfully Pass List all images with comments Select list all images with comments Display list all images with comments List all images with comments is displayed successfully Pass View search history Select view search history Display search history Search history is displayed successfully Pass Search post Select search post And give details Display list of posts List of posts is displayed successfully Pass View image ranks Select view image ranks Display image ranks Images with ranks displayed successfully Pass
  • 40. TEST CASES TEST CASES FOR USER TEST CASES INPUT EXPECTED RESULT ACTUAL RESULT STATUS Registration Enter all fields properly User gets registered Registration is successful Pass Registration If user miss any mandatory field User not registered Registration is un successful Pass Login Give valid Username and password User page should be opened User page has been opened Pass Login Give Username without Password User page should not be opened User name and password is invalid Fail Add post Select add post and give details Display post Post is added Success Fully Pass View All Requests Select View all Requests Display User Profiles List of friends are displayed successfully Pass Search Posts based on Keyword Give Keyword Display List of Posts Posts Based on Keyword is Displayed Successfully Pass Search Posts Based on Content Give Contents Keyword Display List of Posts Posts Based on Content is Displayed Successfully Pass Search History Select Search History Display User Search History User Search History is displayed Successfully Pass
  • 41. IMPLEMENTATION  Implementation is the process of assuring the information system which is operational and then allowing user take its operation for its operations for use and evaluation.
  • 46. LIST OF IMAGES WITH COMMENTS
  • 51. AFTER SUCCESSFULLY USER INFORMATION ADDED WHICH CAN BE AUTHORIZED BY THE ADMIN
  • 56. SEARCH POSTS BASED ON KEYWORD
  • 57. SEARCH POSTS BASED ON KEYWORD WITH SAMPLE CONTENT
  • 58. SEARCH POSTS BASED ON CONTENT
  • 59. SEARCH POSTS BASED ON CONTENT WITH SAMPLE CONTENT
  • 61. SEARCH FRIEND WITH SAMPLE NAME
  • 65. CONCLUSIONS  Photo sharing is one of the most popular features in online social networks such as Facebook. Unfortunately, careless photo posting may reveal privacy of individuals in a posted photo. To curb the privacy leakage, I propose to enable individuals potentially in a photo to give the permissions. The proposed system is featured with low computation cost and confidentiality of the training set. Theoretical analysis and experiments were conducted to show effectiveness and efficiency of the proposed scheme, before posting a co-photo. I expect that my proposed scheme be very useful in protecting user’s privacy in photo/image sharing over online social networks.