4. ABSTRACT
In Online Social Networks (OSNs) Photo sharing popularizes.
But, it leaks the user’s security when they are post, comment
and tag a photo. In order to solve this issue in this application,
proposing a mechanism to activate each individual photo
posting activity and provide the decision making control on
the posting photo. For this system, I require an efficient facial
recognition (FR) system. However, more FR system is trained
the privacy setting may limit the number of the photos
publicly available. For this purpose my mechanism provides
to utilize user’s private photos to design a personalized FR
system. Specifically trained to differentiate possible photo co-
owners without leaking their security. Need to develop a
distributed consensus-based method to reduce the comparison
difficulties and protect the private training set.
6. PURPOSE
This application purpose is to provide a mechanism to
enable each individual in a photo be aware of the posting
activity and participate in the decision making on the
photo posting.
7. SCOPE
The scope of the application achieves efficiency
and privacy at the same time. The idea is to let
each user only deal with his/her private photo set
as the local train data and use it to learn out the
local training result. After this, local training results
are exchanged among users to form a global
knowledge.
8. EXISTING SYSTEM
Mavridis et al. study the statistics of photo sharing
on social networks and propose a three realms
model: “a social realm, in which identities are
entities, and friendship a relation; second, a visual
sensory realm, of which faces are entities, and co-
occurrence in images a relation; and third, a
physical realm, in which bodies belong, with
physical proximity being a relation.”
9. DISADVANTAGES
1. Currently there is no restriction with sharing of co-
photos, on the contrary, social network service
providers like Face book.
2. on most current OSNs, users have no control over
the information appearing outside their profile
page.
10. PROPOSED SYSTEM
We propose a privacy-preserving distributed
collaborative training system as our FR engine. In our
system, we ask each of our users to establish a private
photo set of their own. We use these private photos to
build personal FR engines based on the specific social
context and promise that during FR training, only the
discriminating rules are revealed but nothing else.
we propose a novel consensus based approach to
achieve efficiency and privacy at the same time.
11. ADVANTAGES
1. It uses private photos in a privacy-preserving
manner and social contexts to derive a
personal FR engine for any particular user.
2. It propose a consensus-based method to
achieve privacy and efficiency.
15. Photo privacy
Users care about privacy is unlikely to put photos online.
we ask each of our users to establish a private photo set of
their own.
Social network
A social network service is an online platform which people
use to build social relationship with other people who share
similar personal or career interests.
We designed a privacy-preserving FR system to identify
individuals in a co-photo.
Friend list
According to our protocol, A person friends communicate only
with his/her friend. And they have no idea of what they are
computing for.
Collaborative Learning
Propose to use multiple personal FR engines to work
collaboratively to improve the recognition ratio.
16. HARDWARE REQUIREMENTS
System : Intel Dual Core
Hard Disk : 120 GB.
RAM : 1GB.
SOFTWARE REQUIREMENTS
Operating system : Windows 7.
Coding Language : JAVA/J2EE
Front End : JSP,HTML
Web server : tomcat7.x
Database : MYSQL
17. NON-FUNCTIONAL REQUIREMENTS
Reliability:-The packages will pick-up current transactions
online. Regarding the old transactions, user will enter them in
to the system.
Security:-The web server and database server should be
protected from hacking, virus etc.
Portability:-The application will be developed using standard
open source software (Except Oracle) like Java, tomcat web
server, Internet Explorer Browser etc. these software will
work both on Windows and Linux OS. Hence portability
problems will not arise.
Performance:-System is highly functional and good in
performance. The system must use the minimal set of
variables and minimal usage of the control structures will
dynamically increase the performance of the system.
21. Column name Data type(Size) Constraint
Id Int(11) Primary key
Username Varchar(45) NOT NULL
Password Varchar(45) NOT NULL
DATA TABLES
TABLE NAME :- ADMIN
22. Column name Data type(Size) Constraint
cid Int(11) Primar key
Username Varchar(45) NOT NULL
Imageid Int(11) NOT NULL
Date Varchar(45) NOT NULL
Comment Varchar(500) NOT NULL
TABLE NAME :- COMMENTS
23. Column name Data type Constraint
Id Int(11) Primary key
Title Varchar(45) NOT NULL
Post to Varchar(45) NOT NULL
Description Text NOT NULL
Location Varchar(45) NOT NULL
Privacy Varchar (45) NOT NULL
Images longblob NOT NULL
Binary image Long text NOT NULL
Count Int(11) NOT NULL
Image title Varchar(45) NOT NULL
uname Varchar(45) NOT NULL
Date Varchar(45) NOT NULL
TABLE NAME :- IMAGES
24. Column name Data type Constraint
Id Int(11) Primary key
username Varchar(45) NOT NULL
Password Varchar(45) NOT NULL
Email Varchar(45) NOT NULL
Mobile Int(11) NOT NULL
Address Varchar(45) NOT NULL
Dob Varchar(45) NOT NULL
Gender Varchar(45) NOT NULL
Location Varchar(45) NOT NULL
Image Lonblob NOT NULL
TABLE NAME :- USER
26. USE CASE DIAGRAM FOR OVERALL SYSTEM
Add posts
Search posts based on keyword
Search history
View user profile
User
List all images with comments
View image ranks
Search posts
View user profile
Search posts based on content
Search friend
admin
28. SEQUENCE DIAGRAM FOR ADD POSTS
: User
: User
: system
: system : Serv
er
: Serv
er : Databse
: Databse
1: login()
2: Prompt for user details()
3: Enter details()
4: Process details()
5: compare details()
6: Result()
7: Display user profile()
8: Select add post()
9: Add post()
10: Encrypt and add post
11: Update database
12: Sav
e post details()
13: Display()
14: v
iew post()
15: logout()
29. SEQUENCE DIAGRAM TO LIST OF IMAGES WITH
COMMENTS
13: v
iew all images with comments()
: User
: User : System
: System : Server
: Server : Database
: Database
1: login()
2: Prompt for user details()
3: Enter details
4: Process details
5: Compare details()
6: Result()
7: Display user details()
8: Select activ
ity log in user profile()
9: Select categeory as all images with comments()
10: Search()
11: Fetch details()
12: Display()
14: logout()
30. SEQUENCE DIAGRAM FOR SEARCH FRIEND
: User
: User
: System
: System : Server
: Server : Database
: Database
1: login()
2: prompt for user details()
3: enter details()
4: process details()
5: compare details()
6: Result()
7: display user profile()
8: select search box in user profile()
9: type name in the box()
10: search()
11: fetch details()
12: display()
13: check profile()
14: logout()
31. SEQUENCE DIAGRAM FOR VIEW USER PROFILE
13: v
iew user profile
: User
: User
: System
: System : Serv
er
: Serv
er : Database
: Database
1: login()
2: prompt for user details()
3: enter details()
4: process details()
5: compare details()
6: result()
7: display usr profile()
8: check user profile()
9: check()
10: fetch details()
11: send details()
12: display()
14: logout()
32. ACTIVITY DIAGRAM FOR ADD POSTS
Login
Prov
ide userid
& password
Inv
alid userid &
password
Select add post
on user profile
Encrypt & add
post
View post
Prompt for
user details
Giv
e
permission
Prov
ide acess
to user profile
Update
database
Check user
details
Post is added
Failure
Sucess
Database
System
User
33. ACTIVITY DIAGRAM TO LIST OF IMAGES WITH COMMENTS
Login
Prov
ide userid
& password
Inv
alid userid &
password
Prompt to v
iew
profile page
Select activ
ity log
in user profile page
Select categeory as all
images with comments
All images with
comments is displayed
Prompt for
user details
Giv
e
permission
Prov
ide access
to user profile
Display user
profile
Search
Check user
details
Fetch details
Send details
Inv
alid v
alid
Database
System
Admin
34. ACTIVITY DIAGRAM FOR SEARCH FRIEND
Login
Prov
ide userid
& password
Inv
alid userid &
password
Select search
box in user profile
Type name in
the search box
Inv
alid user
Check profile
Prompt for
user details
Giv
e
permission
Prov
ide acess
to user profile
Search
Giv
e result
Check user
details
Fetch details
Failure
Sucess
Inv
alid
Valid
Database
System
User
35. ACTIVITY DIAGRAM FOR VIEW USER PROFILE
Login
Prov
ide userid
& password
Inv
alid userid &
password
Check user
profile
View user
profile
Prompt for
user details
Giv
e
permission
Prov
ide acess
to user profile
Prompt to check
user details
Receiv
e
Check user
details
Fetch details
Send details
Inv
alid
v
alid
Database
System
Admin
37. TESTING
Testing is a process, which reveals errors in the program.
It is the major quality measure during software
development. During software development, during
testing, the program is executed with a set of test cases
and the output of the program for the test cases is
evaluated to determine if the program is performing as it.
expected to perform.
38. TESTING METHODOLOGIES
Types:
White box testing
Black box testing
Levels of testing:
Unit Testing
Integration Testing
System Testing
Acceptance Testing
39. TEST CASES
TEST CASES FOR ADMIN
Test cases Input Expected Result Actual Result Status
Login Give the valid user
name and password
Admin home page
should be opened
Admin home Page
has been opened
Pass
Login Give Username
without Password
User page should
not be opened
User name and
password is invalid
Pass
List of Users Select List of Users
Display User
Profile Details
List of users is
displayed
successfully
Pass
List all images with
comments
Select list all
images with
comments
Display list all
images with
comments
List all images with
comments is
displayed
successfully
Pass
View search history Select view search
history
Display search
history
Search history is
displayed
successfully
Pass
Search post Select search post
And give details
Display list of posts List of posts is
displayed
successfully
Pass
View image ranks Select view image
ranks
Display image ranks Images with ranks
displayed
successfully
Pass
40. TEST CASES
TEST CASES FOR USER
TEST CASES INPUT EXPECTED
RESULT
ACTUAL RESULT STATUS
Registration Enter all fields
properly
User gets registered Registration
is successful
Pass
Registration If user miss any
mandatory field
User not registered Registration is
un successful
Pass
Login Give valid Username
and password
User page should be
opened
User page has been
opened
Pass
Login Give Username
without Password
User page should not
be opened
User name and
password is invalid
Fail
Add post Select add post and
give details
Display post Post is added Success
Fully
Pass
View All Requests Select View all
Requests
Display User Profiles List of friends are
displayed
successfully
Pass
Search Posts based on
Keyword
Give Keyword Display List of Posts Posts Based on
Keyword is
Displayed
Successfully
Pass
Search Posts Based
on Content
Give Contents
Keyword
Display List of Posts Posts Based on
Content is Displayed
Successfully
Pass
Search History Select Search History Display User Search
History
User Search History
is displayed
Successfully
Pass
41. IMPLEMENTATION
Implementation is the process of assuring the
information system which is operational and then
allowing user take its operation for its operations for use
and evaluation.
65. CONCLUSIONS
Photo sharing is one of the most popular features in online social
networks such as Facebook. Unfortunately, careless photo
posting may reveal privacy of individuals in a posted photo. To
curb the privacy leakage, I propose to enable individuals
potentially in a photo to give the permissions. The proposed
system is featured with low computation cost and confidentiality
of the training set. Theoretical analysis and experiments were
conducted to show effectiveness and efficiency of the proposed
scheme, before posting a co-photo. I expect that my proposed
scheme be very useful in protecting user’s privacy in
photo/image sharing over online social networks.