Submit Search
Upload
A Survey On Privacy Policy Inference for Social Images
•
0 likes
•
41 views
IRJET Journal
Follow
https://irjet.net/archives/V3/i2/IRJET-V3I2155.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
rahulmonikasharma
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Iaetsd Iaetsd
Ijcatr04041017
Ijcatr04041017
Editor IJCATR
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
IJMER
Kt3518501858
Kt3518501858
IJERA Editor
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media Feeds
IRJET Journal
Recommended
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
rahulmonikasharma
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Iaetsd Iaetsd
Ijcatr04041017
Ijcatr04041017
Editor IJCATR
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
IJMER
Kt3518501858
Kt3518501858
IJERA Editor
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media Feeds
IRJET Journal
Privacy presentation
Privacy presentation
cnewm095
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
grindle-hcii
grindle-hcii
Viktoria Grindle
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1crore projects
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded
jpstudcorner
Privacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sites
ieeepondy
Overview Of Network Analysis Platforms
Overview Of Network Analysis Platforms
Noah Flower
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
Venkat Projects
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
IRJET Journal
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
IRJET Journal
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded
Nexgen Technology
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Shakas Technologies
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
Engineering and Social Informatics (ESOTICS)
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijripublishers Ijri
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
IJMTST Journal
More Related Content
What's hot
Privacy presentation
Privacy presentation
cnewm095
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
grindle-hcii
grindle-hcii
Viktoria Grindle
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1crore projects
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded
jpstudcorner
Privacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sites
ieeepondy
Overview Of Network Analysis Platforms
Overview Of Network Analysis Platforms
Noah Flower
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
Venkat Projects
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
IRJET Journal
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
IRJET Journal
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded
Nexgen Technology
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Shakas Technologies
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
Engineering and Social Informatics (ESOTICS)
What's hot
(16)
Privacy presentation
Privacy presentation
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
grindle-hcii
grindle-hcii
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sites
Overview Of Network Analysis Platforms
Overview Of Network Analysis Platforms
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
Similar to A Survey On Privacy Policy Inference for Social Images
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijripublishers Ijri
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
IJMTST Journal
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
AM Publications
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1crore projects
Protect Social Connection Using Privacy Predictive Algorithm
Protect Social Connection Using Privacy Predictive Algorithm
IRJET Journal
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
ijsptm
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
IRJET Journal
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
IOSR Journals
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
IJECEIAES
549 458-465
549 458-465
idescitation
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
paperpublications3
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Xevol1
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET Journal
Similar to A Survey On Privacy Policy Inference for Social Images
(20)
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Protect Social Connection Using Privacy Predictive Algorithm
Protect Social Connection Using Privacy Predictive Algorithm
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
549 458-465
549 458-465
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdf
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Recently uploaded
(20)
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Internship report on mechanical engineering
Internship report on mechanical engineering
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
A Survey On Privacy Policy Inference for Social Images
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 886 A Survey On Privacy Policy Inference for Social Images Miss. Chaitrali A. Salunke Student, Computer Engineering Department, V.P College of Engineering, Baramati, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Social media has become one of the ultimate important parts of our daily life as it enables us to communicate with a many people. Creation of social networking sites such as Facebook LinkedIn etc, individuals are given opportunities to meet new friends in their own and also in the other variety of communities across the world. So that many of the photo sharing applications or content sharing applications on these sites allow users to annotate photos with those who are in them. A number of researchers have studied the social uses and privacy issues of online photo sharing or content sharing sites , but less have explored the privacy issues of photo sharing in social networks. Users of social-networking services share abundant information with numerous “friends.” This improved technology causes to privacy violation where the users are sharing the enormous volumes of images across more number of peoples. This privacy need to be taken care in order to make better the user satisfaction level. Towards or focusing on this need, using Adaptive Privacy Policy Prediction (A3P) system to assist users compose privacy settings for their images. Our main contribution to the existing work is to generate user profile, further the privacy inference policies should be mainatained with respect to user profile. Key Words: Social media; content sharing. 1. INTRODUCTION Creating privacy controls for social media or networks that are both expressive and usable is a major challenge. The word “social media” refers to the outspread of Internet-based and mobile services that allow users to participate in online exchanges, bring user-created content, or join online communities. Online social networks or sharing/content sites are websites that allow users to build or construct connections and relationships to other Internet users. Social networks store information remotely, rather than on a user’s personal computer. Social networking can be used to keep in touch with friends, make new friends and find people with similar interests and ideas. The relation between privacy and a person’s social network is multi-faceted. So it required to develop more security mechanisms for different communication technologies, especially online social networks. Privacy is very important to the design of security mechanisms. Most social networks providers have provide an opportunity of privacy settings to allow or refuse others access to personal information details. In certain event or an occasion we want information about ourselves to be known only by a small circle of close friends, and not by strangers or unknown people. In other side, we are willing to reveal our personal information to strangers, but not to those who know us better. Social network theorists have studied the relevance of relations of different depth and strength in a person’s social network and the valued of so-called weak ties in the flow of information across different nodes in a network. An Internet privacy can be define as the ability to control what information one reveals about oneself, and who can access that information. Essentially, when the data is gathered or analyzed without the knowledge or permission of its owner, privacy is violated. When it comes to the usage of the data, the owner should be informed about the purposes and aim for which the data is being or will be used. Most content sharing or photo sharing websites permit users to enter their privacy preferences. Unfortunately, recent studies have shown that users struggle or it is difficult to set up and maintain such privacy settings. One of the main reasons provided is that given the amount of shared information this process can be tiresome and error-prone. Therefore, many have recognized the need of policy recommendation systems which can help users to easily and properly configure privacy settings. However, existing system for automating privacy settings appear to be insufficient to address the unique privacy needs of images due to the amount of information absolutely carried within images and their relationship with the online environment wherein they are exposed. The privacy of user data can be given by using two methods. 1. The user can enter the privacy preferences 2. Usage of recommendation systems which helps users for setting the privacy preferences.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 887 The privacy policy of user uploaded data can be provided depends on the user social environment and personal characteristics. Social context of users, such as their profile information and relationships with others may provide beneficial information regarding users’ privacy preferences. The privacy policy for image which is uploaded by user can be provided depend on the user uploaded image’s content and its metadata. A hierarchical image classification which classifies images first based on their contents and then decides each category into subcategories based on their metadata. Images that do not have metadata will be classed together only by content. Such a hierarchical classification provides by A3P system which gives a higher priority to image content and reduces the influence of missing tags[1]. 2. LITERATURE SURVEY Many studies and analysis have been performed on privacy policy techniques. Alessandra Mazzia et al. [2012] introduced PViz Comprehension Tool , an interface and system that corresponds more directly with how users model groups and privacy policies applied to their networks. It allows the user to understand the Visibility of her profile according to automatically natural sub-groupings of people. Because the user must be able to identify and differentiated automatically-constructed groups, we also address the important sub-problem of producing effective group labels. PViz tool is better than other current policy comprehension tools Facebook's Audience View and Custom Settings page. Peter F. Klemperer et al. [2012] developed a tag based access control of data shared in the social media sites. A system that generates access-control policies from photo management tags. Every photo is incorporated with an access grid for mapping the photo with the user’s friends. The participants can select a suitable preference and access the information. Photo tags can be divided as organizational or communicative based on the user needs. There are several important limitations to our study design. First, our results are limited by the participants we recruited and the photos they provided. A second set of disadvantages concerns our use of machine generated access-control rules. The algorithm has no access to the context and meaning of tags and no insight into the policy the participant intended when tagging for access control. As a result, some rules appeared strange to the participants, potentially driving them toward explicit policy-based tags like “private” and “public. Sergej Zerr et al. [2012] proposed a technique Privacy- Aware Image Classification and Search to automatically detect private images, and to enable privacy-oriented image search. It combines textual meta data images with variety of visual features to give security policies. In this the selected image features (edges, faces, color histograms) which can help discriminate between natural and man-made objects that can indicate the presence or absence of particular objects (SIFT). It uses various classification models trained on a large scale dataset with privacy assignments obtained through a social annotation game. Choudhury et al. [2009] proposed a recommendation framework to connect image content with communities in online social media. They characterize images through three types of features: visual features, user generated text tags, and social interaction, from which they recommend the most likely groups for a given image. Similarly, an automated recommendation system for a user’s images to provide suitable photo-sharing groups. Jonathan Anderson et al. [2009] proposed Privacy Suites which allows users to easily choose “suites" of privacy settings. A privacy suite can be created by an expert using privacy programming. The privacy suite is distributed through distribution channels to the members of the social sites. The drawback of a rich programming language is less understandability for end users. Given a sufficiently high-level language and good coding practice, motivated users should be able to verify a Privacy Suite. The main goal is transparency, which is essential for convincing influential users that it is safe to use. Ching-man Au Yeung et al. [2009] proposed a access control system based on a decentralised authentication protocol, descriptive tags and linked data of social networks in the Semantic Web. It allows users to create expressive policies for their photos stored in one or more photo sharing sites, and users can specify access control rules based on open linked data provided by other parties. Danezis et al. [2009] proposed a machine-learning based approach to automatically extract privacy settings from the social context within which the data is produced. It develop privacy settings based on a concept of “Social Circles” which consist of clusters of friends. User’s privacy preferences for location-based data based on location and time of day. Fabeah Adu-Oppong et al. [2008] developed concept of social circles. It provides a web based solution to protect personal information. The technique named Social Circles Finder, which automatically generates the friend’s list. It is a technique that analyses the social circle of a person and identifies the intensity of relationship and therefore social circles obtained a meaningful categorization of friends for setting privacy policies. The application will identify the social circles of the subject but not show them to the subject. The subject will then be asked questions about
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 888 their willingness to share a piece of their personal information. Based on the answers the application finds the visual graph of users. Kambiz Ghazinour et al. [2008] designed a recommender system known as Your Privacy Protector that understands the social net behavior of their privacy settings and recommending privacy options. It uses user’s personal profile, User’s interests and User’s privacy settings on photo albums as parameters and on the basis of these parameters the system constructs the personal profile of the user. It automatically learned for a given profile of users and assign the privacy options. It allows users to see their current privacy settings on their social network profile, namely Facebook, and detects the possible privacy risks. Based on the risks it adopts the necessary privacy settings. Fang et al. [2007] proposed a privacy wizard to assist users grant privileges to their friends. The wizard asks users to first assign privacy labels to selected friends, and then uses this as input to construct a classifier which divides friends based on their profiles and automatically assign privacy labels to the unlabeled friends. 3. CONCLUSIONS This paper describes various privacy policy techniques for user uploaded images in various content sharing sites. The privacy policy can be applied based on the user social behavior and the user uploaded image content. Privacy policy techniques among the existing systems. Future research leads towards improving the performance by a novel semantic retrieval of images. REFERENCES 1. Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and Joshua Wede, “Privacy Policy Inference of User- Uploaded Images on Content Sharing Sites” IEEE Transaction On Knowledge And Data Enginnering, VOL. 27, NO. 1, January 2015 193 2. A. Mazzia, K. LeFevre, and A. E.,, “The PViz comprehension tool for social network privacy settings,” in Proc. Symp. Usable Privacy Security, 2012. 3. P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386. 4. S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova, “Privacy- aware image classification and search,” in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp. 35–44. 5. H. Sundaram, L. Xie, M. De Choudhury, Y. Lin, and A. Natsev, “Multimedia semantics: Interactions between content andcommunity,” Proc. IEEE, vol. 100, no. 9, pp. 2737–2758, Sep. 2012. 6. J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security,2009. 7. C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, “Providing access control to online photo albums based on tags and linked data,” in Proc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14. 8. J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,” in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining.,2009, pp.249–254. 9. A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,” in Proc. Symp. Usable Privacy Security, 2008.
Download now