Submit Search
Upload
My Privacy My decision: Control of Photo Sharing on Online Social Networks
•
0 likes
•
120 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i7/IRJET-V4I7169.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
549 458-465
549 458-465
idescitation
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
AM Publications
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
rahulmonikasharma
Kt3518501858
Kt3518501858
IJERA Editor
Recommended
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
549 458-465
549 458-465
idescitation
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
AM Publications
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
rahulmonikasharma
Kt3518501858
Kt3518501858
IJERA Editor
Ijcatr04041017
Ijcatr04041017
Editor IJCATR
Threats_Report_2013
Threats_Report_2013
Mary Claire Thompson
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
204
204
vivatechijri
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Iaetsd Iaetsd
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Eswar Publications
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Maurice Dawson
Online Social Networking Site
Online Social Networking Site
Sabbir Ahmed Saikat
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media Feeds
IRJET Journal
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
editorjournal
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
social networking site
social networking site
Abhishek Ranjan
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET Journal
An iac approach for detecting profile cloning
An iac approach for detecting profile cloning
IJNSA Journal
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijripublishers Ijri
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
More Related Content
What's hot
Ijcatr04041017
Ijcatr04041017
Editor IJCATR
Threats_Report_2013
Threats_Report_2013
Mary Claire Thompson
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
204
204
vivatechijri
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Iaetsd Iaetsd
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Eswar Publications
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Maurice Dawson
Online Social Networking Site
Online Social Networking Site
Sabbir Ahmed Saikat
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media Feeds
IRJET Journal
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
editorjournal
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
social networking site
social networking site
Abhishek Ranjan
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET Journal
An iac approach for detecting profile cloning
An iac approach for detecting profile cloning
IJNSA Journal
What's hot
(19)
Ijcatr04041017
Ijcatr04041017
Threats_Report_2013
Threats_Report_2013
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
204
204
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Online Social Networking Site
Online Social Networking Site
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media Feeds
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
social networking site
social networking site
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
An iac approach for detecting profile cloning
An iac approach for detecting profile cloning
Similar to My Privacy My decision: Control of Photo Sharing on Online Social Networks
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijripublishers Ijri
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
IRJET Journal
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
IRJET Journal
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
ijsptm
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
ijmpict
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IJITE
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
4 newmain doc
4 newmain doc
Webdesigner Hyderabad
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Similar to My Privacy My decision: Control of Photo Sharing on Online Social Networks
(20)
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
4 newmain doc
4 newmain doc
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Recently uploaded
(20)
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
My Privacy My decision: Control of Photo Sharing on Online Social Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 655 My Privacy My decision: Control of Photo Sharing on Online Social Networks Prashant Abhang1, S. B. Rathod2 1Student,Dept. of computer engineering, Sinhgad Academy of Engineering, pune. 2Professor, Dept. of computer engineering, Sinhgad Academy of Engineering, pune. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Photo sharing refers tothetransferorpublishing of a user’s digital photos online and the website which provides such acquaintances over services such as hosting, uploading, sharing and managing of photos through online system. This function provides the upload and display of images through both websites and applications. The photo sharing term can be set up and managed by individual users for the usage of online photo galleries includingphotoblogs. It means that other users can view but not essentially download the photos, users being able to select different copy-right options for their photos. Unfortunately, it may reveal users privacy if they are permitted to post, comment, and tag a photo liberally. To address this problem, this project proposes an efficient facial recognition system that can recognize everyone in the photo. Online photo sharing applicationshave become popular as it provides users various new and innovative alternatives to share photoswitharangeofpeople. The photo sharing feature is incorporated in many social networking sites which allow users to post photo for their loving ones, families and friends. For users of social networking sites such as Facebook, this system focuses on the privacy concerns and needs of the users, at the same time explores ideas for privacy protection mechanisms. By considering users current concernsand behaviors, thetoolcan be designed as per the user’s desire which they can adopt and then can be motivated to use. Key Words: Online Social Network, privacy preserving, photo sharing, FR system, face detection, feature extraction 1. INTRODUCTION With the huge popularity of sharing and the vast usage of social networking sites users unknowingly reveal certain kinds of personal information. Social-networking usersmay or may not have the idea of getting their personal information will be leaked or could pro t the malicious attackers and may perpetrate significant privacy breaches. The rest decade of 21st century has seen the extreme popularization of Internet and the growth of web services which facilitate participatory information sharing and collaboration. Social Networking Sites(SNSs)havebecomea boundless communication media to keep in touch beyond boundaries. SNSs are a part of human culturethanjusta web application. Use of SNSs has out spacedinalmosteveryfields as news agencies, big and small companies, governments, and famous personalities etc. to interact with each other. With the adoration of sharing, Facebook has stood outasthe most renown SNSs in the world where people hangout for hours. With the extravagancy of technology and services sharing of news, photos, personal tasteandinformationwith friends and family has led to an ease. Butalongwiththisuser privacy should also be taken into consideration. An issue related to privacy with facebook users has been constantly appearing on international press either because of the companies privacy policy or because of users unaware-ness of content sharing consequences. As a research says the simple disclosure of date and place of birth of a pro le in Facebook can be used to predict the Social Security Number (SSN) of a citizen in the U.S. Many a times just by simply publishing their friends list, users might be revealing a large amount of information. For example, through the use of prediction algorithms it is possible to infer private information that was previously undisclosed. Sometimes sensitive information even comes embedded in the photo as metadata and may identify people on the photo by accompanying more informationthatcouldbeexploited,like captions, comments and photo tags; marked regions. Evenif the individuals in a photo are not explicitly identified by photo tags, the combinationofpubliclyavailableinformation and face recognition software can be used to infersomeones identity. These kinds of problems are defined as collateral damage: users unintentionally put theirownprivacyortheir friends privacy at risk when performingeventsonSNSssuch as Facebook. 2. LITERATURE SURVEY In 2006, Barbara Carminati, Elena Ferrari, and Andrea Perego [3], presents a sys-tem that consists of policies in the form of constraints on the type, depth and trust level of the relationship that are existing on the accesscontrol model for Web-based social networks(WBSNs).Theauthenticityto the relationships are presented in the form of certificates and rule based approach is used on the client side enforcement to provide access control where the user requesting for access has the entire rights to it. The system doesn’t use the relationship among users to provide access as the relationship might not be a strong point of consideration. Instead the trust factor and the depth of relationship among users are very important and based on that the access is provided. A rule-based access control model is proposed for WBSNs, which allows the requirement of access rules for
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 656 online resources where the relationship be-tween authorized users in the network is denoted in terms of the relationship type, depth, and trust level. In this system, the certificates which are specified by the users are stored and managed by the central node of the network, whereas storing of access control and performing access control is done by a set of peripheral nodes. In 2009, Jonathan Anderson proposed a paradigm called Privacy Suites [7] which allows users to easily choose suites of privacy settings that can be created by an expert using privacy programming or can be created through exporting them to the abstract format or through existing configuration UIs. A Privacy suite can be verified by a good practice, a high level language and motivated users which then can be then distributed to the members of the social sites through existing distribution channels. In 2011, Barbara Carminati, Elena Ferrari , Raymond Heatherly, Murat Kantar-cioglub, Bhavani Thuraisingham [11], address that security and privacy concerns need to be addressed for creating applicationsofonlinesocial networks that include person specific information. So a primeconcern is given towards improving social network access control systems. But the current OSNs provide very basic access control system to the users suchasmarkinga particularitem as public, private or accessible by their direct contacts but they lack exibility as they do not specify the access control requirements. So a ne-grained OSN access control model based on semantic web technologies is proposed in [11] which encode social network-related information by means of ontology. Semantic Web Rule Language (SWRL) can be used to set the security policies in the form of rules which are expressed in ontology and this canbeenforced bysimply querying the authorizations. In 2013, Kambiz Ghazinour proposed a recommender system known as Your Privacy Protector [17] that assists by understanding the behavior of privacy setting andrecommendsreasonableprivacyoptions. The personal pro le of the user is constructed based on the parameters such as users interests, users privacy settings and users personal pro le on photo albums and basedonthis pro le of users it assigns the privacy options. The user is granted permission to see their current privacy settings which will be monitored by the system and if any risk is detected it adopts the necessary privacy settings. In 2015, Anna Cinzia Squicciarini developed an Adaptive Privacy Policy Pre-diction (A3P) [18] system, that automatically generates personalized policies as it is a free privacy settings system. Based on the images content, persons personal characteristics and metadata, the user uploaded image can be handled by A3P system. It consists of two components: A3P Core and A3P Social. The A3P core receives the image uploaded by the user, which it classifies and decides whether there is a need to call upon the A3P- social. If the metadata is unavailable or if it is created manually then it may cause inaccurate classification, violation policy and even may cause inaccurate privacy policy generation. 3. SYSTEM ARCHITECTURE A mechanism has been designed to make users aware of the posting activity and make them actively take part in the photo posting and decision making paradigm for which a facial recognition (FR) system is recommended which can recognize everyone present in the photo. If more privacy setting is done then it may limit the number of photos which will be utilized as the training set for FR system. In order to overcome this problem and for training setforFRsystem we would utilize the private photos of users which would differentiate the photo co-owners without affecting their privacy. A distributed consensus based methodisdeveloped which would protect theprivatetrainingsetandeven reduce the computational complexity. Our contributions to this work when compared with previous work are mentioned below: 1. We can find the potential owners of shared photos automatically even when the use of generated tags is kept as an option in our paper. 2. Private photos in a privacy-preserving manner and social contexts to derive a personal FR engine for any particular user is proposed in our paper. 3. We propose a consensus-based method to achieve privacy and efficiency. A privacy-preserving FR system is used to identify individuals in a co-photo. The owners present in the shared photos can be automatically recognized and identified with or without user-generated tags. The FR engine is derived from the private photos and social contexts. The privacy is protected by providing users facility to restrict others from seeing their photos. Each user is able to de ne his/her policy which are privacy policy and exposure policy. Computation cost is very low. FR system provides privacy by notifyingthe subject about the posting activity and thus leading the other subjects to take active part in it. To prevent possible privacy leakage of a photo, we design a mechanism to enable each individual present in a photo be aware of thepostingactivity and participate in the decision making on the photo posting. For this purpose, an efficient facial recognition (FR) system is needed which recognizes everyone in thephoto.However, if more privacy settings are done then it may bind the number of photos necessary to train the FR system. So in order to solve this problem, private photos of users is utilized to train the FR system and thus prevent the leakage of the privacy of the individuals.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 657 Fig -1: System Architecture A. Steps in project: 1. User needs to register his account. 2. Login to the home page of the application. 3. Enter OTP which will be sent to an authorized user. 4. Upload train images where the faces will be detected and cropped. 5. Search for friendsifanyorelsesendfriend request to other users. 6. Request can be accepted if any user has sent any request. 7. Upload or add photo on the home page. 8. OTP will be sent to the registered mail id of an authorized user. 9. Face recognition algorithm is used to recognize the faces present in the uploaded photo 10. If faces are recognized then notification is sent to the co-owner about posting activity. 11. Finally, if permission is given by the co- owner then photo will be uploaded. 4. RESULT The proposed scheme is very useful in protecting users' privacy in photo/image sharing over onlinesocial networks. However, there always exist trade-o between privacy and utility. Preserving user privacy and making them actively participate in the photo posting activity is a very prime concern in OSNs. The co-photo can be posted only with the permission of the co-owner and if the privacy and exposure policy gets satis es. To make the system more secured the noti cation is sent to the co-owner and only with his/her acceptance the photo is posted. In addition random OTP is generated while uploading photo to verify the user who is posting it as someone may access hisaccount to upload photos which are in actual not to be posted bytheconcerned account holder.The result of the system is shown with the help of the comparison table where it re ects the di erence between the existing system and the system proposed. The result of the system depends on the number of the train images. As the number of train images increases the recognition of the ownersandco-ownersphotoisdonemore easily and quickly. 5. CONCLUSION Photo sharing is the process of publishing or transfer of a user's digital photos on-line. Individuals in a co-photo are identified by the proposed FR system. The system reveals the detailed description of our system. Generally speaking, the consensus resultcouldbeachievedbyiterativelyrefining the local training result. Various websites o er services such as uploading, hosting, and managing for photo-sharing (publicly or privately).These functionsprovided bywebsites and applications facilitate the upload and display of images. The term may even be useful for online photo galleries that are positioned up and managed by individual users, including photo blogs. The system used a toy system with two users to demonstrate the principle of the design. The system that is built has proven that how to build a general personal FR with more than two users. The system can reduce the privacy leakage by usingthisdesignasitprovides intimation to the co-owners and even to the ownersthrough random OTP generation. REFERENCES [1] Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, Xiaolin Li, ”My Privacy My Decision: Control of Photo Sharing on OnlineSocial Networks”,IEEETransactionon Dependable and Secure Computing, Volume: PP , Issue: 99, pp-1-1, 2015 [2] Z. Stone, T. Zickler, and T. Darrell, ”Autotagging facebook: Social network context improves photo annotation”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1-8, 2008. [3] A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, ”Social circles: Tackling privacy in social networks”, in Proc. Sympsable Privacy Security, 2008. [4] J. Bonneau, J. Anderson, and L. Church, ”Privacy suites: Shared privacy for social networks”, in Proc. Symp. Usable Privacy Security, 2009.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 658 [5] C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, ”Pro- viding access control to online photo albums based on tags and linked data”, pp. 9-14, 2009. [6] A. Besmer and H. Richter Lipford. Moving beyonduntag- ging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1563-1572, 2010. [7] Barbara Carminati, Elena Ferrari, Raymond Heatherly, Mu-rat Kantarcioglu, BhavaniThuraisingham,”Semantic web-based social network access control”, pp. 108-115, 2011. [8] Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, Elena Demi-dova , ”I Know What You Did Last Summer!:Privacy-AwareImageClassificationandSearch ”, Proceedings of the 35th international ACM SIGIR conference on Researchanddevelopmentininformation retrieval, 2012. [9] Kambiz Ghazinour, Stan Matwin and Marina Sokolova, ”Yourprivacyprotector:ARecommenderSystemFor Pri- vacy Settings In Social Networks”, International Journal of Security, PrivacyandTrustManagement(IJSPTM),Vol 2, No 4, August 2013. [10] Barbara Carminati, Elena Ferrari,RaymondHeatherly, Murat Kantar-cioglu, Bhavani Thuraisingham, Semantic web-based social network access control, 2011. [11] J. Y. Choi, W. De Neve, K. Plataniotis, and Y.M. Ro., Collaborative face recognition for improved face annotation in personal photo collections shared on online social networks, Multimedia, IEEE Transactions on, 2011. [12] Anna Cinzia Squicciarini, Privacy Policy Inference of User-Uploaded Im-ages on Content Sharing Sites, IEEE Transactions On Knowledge And Data Engineering, vol. 27, no. 1, January 2015.
Download now