Submit Search
Upload
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
•
0 likes
•
24 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i2/IRJET-V4I2271.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
IRJET Journal
InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...
ecarrow
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
Migrant Systems
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
IEEEFINALYEARPROJECTS
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
IJNSA Journal
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
Recommended
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
IRJET Journal
InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...
ecarrow
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
Migrant Systems
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
IEEEFINALYEARPROJECTS
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
IJNSA Journal
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
Uvaraj Shan
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
IRJET Journal
Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryption
Conference Papers
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
Do4301690695
Do4301690695
IJERA Editor
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET Journal
C43021014
C43021014
IJERA Editor
network-host-reconciliation
network-host-reconciliation
Gordon Mackay - CISSP
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...
IJNSA Journal
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
Shekhar Vimalendu
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
IJNSA Journal
NDSS_submission_240
NDSS_submission_240
Sakshi Jain
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
Hindering data theft attack through fog computing
Hindering data theft attack through fog computing
eSAT Publishing House
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
IJECEIAES
Portable voice communication system on raspberry pi
Portable voice communication system on raspberry pi
IRJET Journal
Sag/Swell Compensation by using BES DVR in Industrial Drives Applications
Sag/Swell Compensation by using BES DVR in Industrial Drives Applications
IRJET Journal
Free vibration analysis on cantilever beam-A review
Free vibration analysis on cantilever beam-A review
IRJET Journal
A review paper on closed loop control of bldc motor using fuzzy logic
A review paper on closed loop control of bldc motor using fuzzy logic
IRJET Journal
More Related Content
What's hot
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
Uvaraj Shan
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
IRJET Journal
Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryption
Conference Papers
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
Do4301690695
Do4301690695
IJERA Editor
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET Journal
C43021014
C43021014
IJERA Editor
network-host-reconciliation
network-host-reconciliation
Gordon Mackay - CISSP
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...
IJNSA Journal
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
Shekhar Vimalendu
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
IJNSA Journal
NDSS_submission_240
NDSS_submission_240
Sakshi Jain
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
Hindering data theft attack through fog computing
Hindering data theft attack through fog computing
eSAT Publishing House
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
IJECEIAES
What's hot
(18)
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryption
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Do4301690695
Do4301690695
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
C43021014
C43021014
network-host-reconciliation
network-host-reconciliation
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
NDSS_submission_240
NDSS_submission_240
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
Hindering data theft attack through fog computing
Hindering data theft attack through fog computing
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
Viewers also liked
Portable voice communication system on raspberry pi
Portable voice communication system on raspberry pi
IRJET Journal
Sag/Swell Compensation by using BES DVR in Industrial Drives Applications
Sag/Swell Compensation by using BES DVR in Industrial Drives Applications
IRJET Journal
Free vibration analysis on cantilever beam-A review
Free vibration analysis on cantilever beam-A review
IRJET Journal
A review paper on closed loop control of bldc motor using fuzzy logic
A review paper on closed loop control of bldc motor using fuzzy logic
IRJET Journal
A novel four wire inverter system using SVPWM technique for ups applications
A novel four wire inverter system using SVPWM technique for ups applications
IRJET Journal
Optimum design of braking system for a formula 3 race cars with numeric compu...
Optimum design of braking system for a formula 3 race cars with numeric compu...
IRJET Journal
Gesture control wheel chair cum stretcher
Gesture control wheel chair cum stretcher
IRJET Journal
Design and analysis for supporting system of circular ESR for different seism...
Design and analysis for supporting system of circular ESR for different seism...
IRJET Journal
Review on low power high speed 32 point cyclotomic parallel FFT Processor
Review on low power high speed 32 point cyclotomic parallel FFT Processor
IRJET Journal
Biofuel Generation from Grass
Biofuel Generation from Grass
IRJET Journal
Review on Automation Tool for ERD Normalization
Review on Automation Tool for ERD Normalization
IRJET Journal
Forward and Inverse Kinematic Analysis of Robotic Manipulators
Forward and Inverse Kinematic Analysis of Robotic Manipulators
IRJET Journal
A Geo-PFM Model for Point Of Interest Recommendation
A Geo-PFM Model for Point Of Interest Recommendation
IRJET Journal
A Paper on Study & Design of Multipurpose Riveting Machine
A Paper on Study & Design of Multipurpose Riveting Machine
IRJET Journal
A review towards various hash algorithms and their comparative analysis
A review towards various hash algorithms and their comparative analysis
IRJET Journal
A Review Paper on Pneumatic Operated Collapsable Steering System
A Review Paper on Pneumatic Operated Collapsable Steering System
IRJET Journal
An analysis of effect of variable compression ratio in C.I. engine using turb...
An analysis of effect of variable compression ratio in C.I. engine using turb...
IRJET Journal
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
IRJET Journal
Analysis of 24×7 Water Distribution Network of Gabbur zone in Hubballi city, ...
Analysis of 24×7 Water Distribution Network of Gabbur zone in Hubballi city, ...
IRJET Journal
Automatic pneumatic bumper
Automatic pneumatic bumper
IRJET Journal
Viewers also liked
(20)
Portable voice communication system on raspberry pi
Portable voice communication system on raspberry pi
Sag/Swell Compensation by using BES DVR in Industrial Drives Applications
Sag/Swell Compensation by using BES DVR in Industrial Drives Applications
Free vibration analysis on cantilever beam-A review
Free vibration analysis on cantilever beam-A review
A review paper on closed loop control of bldc motor using fuzzy logic
A review paper on closed loop control of bldc motor using fuzzy logic
A novel four wire inverter system using SVPWM technique for ups applications
A novel four wire inverter system using SVPWM technique for ups applications
Optimum design of braking system for a formula 3 race cars with numeric compu...
Optimum design of braking system for a formula 3 race cars with numeric compu...
Gesture control wheel chair cum stretcher
Gesture control wheel chair cum stretcher
Design and analysis for supporting system of circular ESR for different seism...
Design and analysis for supporting system of circular ESR for different seism...
Review on low power high speed 32 point cyclotomic parallel FFT Processor
Review on low power high speed 32 point cyclotomic parallel FFT Processor
Biofuel Generation from Grass
Biofuel Generation from Grass
Review on Automation Tool for ERD Normalization
Review on Automation Tool for ERD Normalization
Forward and Inverse Kinematic Analysis of Robotic Manipulators
Forward and Inverse Kinematic Analysis of Robotic Manipulators
A Geo-PFM Model for Point Of Interest Recommendation
A Geo-PFM Model for Point Of Interest Recommendation
A Paper on Study & Design of Multipurpose Riveting Machine
A Paper on Study & Design of Multipurpose Riveting Machine
A review towards various hash algorithms and their comparative analysis
A review towards various hash algorithms and their comparative analysis
A Review Paper on Pneumatic Operated Collapsable Steering System
A Review Paper on Pneumatic Operated Collapsable Steering System
An analysis of effect of variable compression ratio in C.I. engine using turb...
An analysis of effect of variable compression ratio in C.I. engine using turb...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Analysis of 24×7 Water Distribution Network of Gabbur zone in Hubballi city, ...
Analysis of 24×7 Water Distribution Network of Gabbur zone in Hubballi city, ...
Automatic pneumatic bumper
Automatic pneumatic bumper
Similar to Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Protect Social Connection Using Privacy Predictive Algorithm
Protect Social Connection Using Privacy Predictive Algorithm
IRJET Journal
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
IRJET Journal
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
Supporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web Search
IRJET Journal
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
AM Publications
Final review m score
Final review m score
azhar4010
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Iaetsd Iaetsd
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IJITE
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET Journal
Privacy preserving and obscure delicate data with collaborative tagging
Privacy preserving and obscure delicate data with collaborative tagging
eSAT Publishing House
Similar to Privacy Recommendations and Ranking of User Images on Content Sharing Sites
(20)
Protect Social Connection Using Privacy Predictive Algorithm
Protect Social Connection Using Privacy Predictive Algorithm
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
Supporting Privacy Protection In Personalized Web Search
Supporting Privacy Protection In Personalized Web Search
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
Final review m score
Final review m score
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
Privacy preserving and obscure delicate data with collaborative tagging
Privacy preserving and obscure delicate data with collaborative tagging
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
result management system report for college project
result management system report for college project
Tonystark477637
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Recently uploaded
(20)
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
result management system report for college project
result management system report for college project
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1387 Privacy Recommendations and Ranking of User Images on Content Sharing Sites Ms. Gaikwad S.S.1 , Ms. Shete P.S.2, Ms. Jadhav S.S.3 1,2,3 Assistant Professor, Dept. of Computer Science and Engineering, Dnyanshree Institute of Engineering and Technology, Sajjangad (Satara) Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this day and age client can share their own data like pictures all the more effortlessly because of expanding utilization of social destinations. Number of pictures client can impart to more number of individuals. Upgrade in innovation damages the protection of substance because of substantial measure of sharing of the information. With the reason to make a metadata and to enhance security for data paper actualize robotized explanation of pictures by utilizing a specific method. This paper presents a framework called Adaptive Privacy Policy Prediction (A3P) framework through which for pictures clients can make their security settings and to fulfill different requirements. The distinctive substance like social setting, picture substance, and metadata are administrated for clients' security inclinations. As indicated by the history accessible on the site already paper execute two level systems to give a best protection to the pictures which will be transferred by the clients. The pictures transferred are characterized by the picture classes and arrangement expectation calculations on which our usage depends and produces a specific procedure for client transferred pictures and trademark. Keywords— Social media, Content Sharing sites, Metadata, Privacy Recommendation, Clustering,Cluster Labelling. 1. INTRODUCTION Communication between the users now a day’s emphasis on the images. The readily established groups of users as the social networks along with the users not either communicated over social networks can communicatewith each other, help each other, identify new groups and get a keen knowledge about their social surroundings. Hereby the images exposing any semantics may unknowingly pass any sensitive information. Taking an example in consideration if an employee posts his photograph of winning a best employee award on Picasa, it may lead to undesirable sharing information of his employee profile, family members and other personal information. Unwanted exposure of personal information andtransgressionmay be caused due to sharing the images on the social network. The image owner information can be collected easily byany one which may lead to violation and data on the social media is persistent so undesirable exposure of the data. This can exploit security on the greater extent. 2. LITERATURE SURVEY A. Anna Cinzia Squicciarini [1]. This paper built up an A3P framework. It naturally produces arrangements. In view of clients individual elements A3P frameworkoversawclienttransferredpictures and pictures substance and metadata. Two parts of A3P framework are A3P Core and A3P Social. Client transferred picture first sent to the A3P-center. Picture arrangement is finished. As per grouping discovering a requirementforA3P- social. Off base order and protection infringement happened because of manual making of metadata log information data. If not adequate metadata data about picture is accessible, then this technique is erroneous for era of security strategy. B. Jonathan, Anderson [2]. This paper created Privacy suites. This security suites made by specialists, additionally by existing setup UIs. Clients utilize these suites to give securitysettings. Protection suits are conveyed to social destinations utilizing dissemination channels. Confirming this suit by abnormal state dialects. Straightforwardness is kept up here. This dialect can't have the capacity to comprehend by end clients. C. Adu-Oppong [3]. It utilizes diverse innovations like Social Circles Finders to secure the individual data of any client by executing an electronic arrangement from infringement. It utilizes the approaches of interpersonal organizations to improve the security setting of the client. This innovation builds up a companion's rundown of client; perceive their informal organizations and not demonstrating them. The essential classification of the companions rundown can be accomplished by distinguishing the interpersonal organization of subject and quality of their connections. On the premise of the responses for the inquiries got some information about their readinesstosharetheirowndatathe visual charts of the clients are plainly settled. D. Kambiz Ghazinour [4]. To prompt the fitting security decisions, this paper proposes framework called as Your Privacy Protector which for these reason gets a handle on the protection setting and frontier net conduct of client.Individualprofilesoftheclients are built utilizing distinctive properties like individual profiles, customer security settings on his photographs accumulation and the customer's advantage ranges. By breaking down the client's profiles naturally security decisions are doled out. Social profile can likewise show all
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1388 the security setting of the client as orkut and can recognize the conceivable dangers to the profile. Every single required setting are executed to maintain a strategic distance from those dangers. E. Alessandra Mazzia [5]. An interface is presented by thispapercalledasPViz Comprehension Tool that speak to how clients plan the gathering and specific security settings utilized on their informal communities. Clients can likewise point the issues confronted amid buildingtheagentbunchesmarkssincethey are allowed with straightforwardnessoftheircreatedprofile, additionally sub groupings at unmistakable levels of granularity.Contrastedanddifferentapparatusesthisismore viable. F. Peter F. Klemperer [6]. Amid partaking in informal organization with each label, framework createsa controlstrategy.Eachphotograph labels are named hierarchical or open, this arrangement is done on premise of the subject's needs. Alongside every tag each labeled photograph is instilled with the frameworks required for the get to which can delineate the clients companions. Each individualincludinghimselfcanpickgetto data of his decision. Our outcomes are the restrictions to our review demonstrateon premise of the members weallotand the photographs they transfer. Created get to control conventions are worried by gathering of the deficiencies. A portion of the conventions and arrangements appear to be new and irregular to the clients in light of the fact that at the season of labeling, get to control calculation has no directly over the components data and furthermore no obstruction into the approaches actualized by the clients. This makes strategy labels allowed as "private" and "open". Ching-man Au Yeung propose a get to control framework in light of a decentralized verification convention [7], information connected in interpersonal organizations through comparative web photographs and other educational labels distributedtovariousphotographsharinglocalesasfacebook produces additionally passing on arrangements for the photographs to shared and on the information gave by outsider . G. Sergej Zerr [8]. This strategy utilizes different arrangement miniatures which takes a shot at the colossal information accumulation with a specific protection assingned through social discourse gaming. This procedure exhorts protection accentuation picture seek and look at private pictures. This categorisationupgradedistensionamongstcharacteristicand human-made questions on premise of picture components like measurements, edges, hues and so forth which betokens nearness or nonappearance of specific protest. This strategy joins literary data of pictures with different components to give security systems. OBJECTIVE OF STUDY For somesubstance sharing locales clientscanentertheir security inclinations itself. Be that as it may, clients getting hard to set up and keep up this protection settings. For huge shared data this procedure get to be distinctly dull and blunder inclined. DISADVANTAGES OF EXISTING SYSTEM: Image sharing lead to undesirable revelation and security infringement. Persistent natureof onlinemedia,gatherrichgathered data of proprietorandsubjectindistributedsubstance. Collected data can abuse security on the more noteworthy degree and unpredicted uncover of one's social surroundings. 4. PROPOSED SYESTEM A. An Adaptive Privacy Policy Prediction (A3P) framework is proposed in this paper which targets towards the inconvenience free security settingcustomisation forthe clients by creating different protection strategies. The accompanying components and the transferred pictures by the clients are taken care of by A3Pframeworkthatcangivea more noteworthy effect on individual's security settings: The impact of individual qualities and social environment. Client'squalitiesastheirownprofiledata, their substance and his interpersonalorganizationmay give sharp data about clients security decisions. For instance, client's attached to photography might be keen on imparting his photographs to other intrigued picture takers. The elements of substance of pictures and its metadata. Generally same security choice is bond with the comparable pictures, especially while individualsshow up in the pictures. For instance, here relegate the general population that are allowed to see the photographs when one transfers the family photos and distributes protectionthat exclusiverelatives can see it. B. Scope: Through Input question picture, handles client transferred pictures. As of late transferred picture mark is contrasted and the picture marks put away in the present picturedatabase. To begin with discover m close-bymatches for discovering class of transferred picture. The class is then ascertained as the class to whichlarger part of thempictures have a place. New class is made if no current class is found. The picture is to be put into the comparing picture class in our picture database, if the anticipated arrangement for this
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1389 new picture turns out right. In our present model, m is set to 25, got utilizing a little preparing information set. C. Advantages Maintain both adequacy and high expectation precision of a framework. Every prerequisite of clients by and by about pictures and concerned metadata is real issue for AP3-center on which it centers, alongsideA3Poffers with a change in protection systems of the clients. The exchanges andcorrespondencestreambetween the different elements are displayedwiththereason for harmony between the advantages on premise of social advices and individual elements. 5. RESULTS AND DISCUSSION Chart -1: Difference between existing and proposed Feature Working Accuracy Privacy Settings Set privacy for images Works accurate Groups such as family/friends Add Groups Groups are created if users exist Sharing with group Share images to only specific group Images are shownto the group only with which they are shared Metadata search Search relative images Images are searched and privacy is preserved CBIR search Match images according to feature Images are matched based on feature Ranking Show most matched images first Ranking from 1 to 0 in descending order is shown Privacy recommendation Recommend privacy Privacy Is Recommended according to upload history Table 1: Evaluation of secure image The fig. Above demonstrates the distension between the two frameworksproposedandexistingframework.Proposed framework comprises of restrictions on the page get to progressively when contrasted with the current framework. 6. CONCLUSION The proposed Adaptive Privacy Policy Prediction (A3P) framework which self working the protection strategy settings for clients transferred pictures and helps client. The A3P framework gives a total system and abridges security inclinations on the premise of the data accessible for a given client. The framework prescribessecuritystrategiesandhelp clients for seeking pictures effectively with either metadata or substance of a picture. Frameworkchoosespositioningfor correct matches. In Future work our subject prompts to create protection arrangements with a wide range of record data for securing information. REFERENCES [1] Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and Joshua Wede, “Privacy Policy Inference of User -Uploaded Images on Content Sharing Sites”, IEEE Transactions on Knowledge and Data Engineering, Vol. 27, NO. 1, January 2015. [2] J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security, 2009. [3] A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1390 networks,” in Proc. Symp. Sable Privacy Security, 2008. [4] Kambiz Ghazinour, Stan Matwin and Marina Sokolova, “Yourprivacyprotector: A Recommender System For Privacy Settings In Social Networks”, International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013. [5] Alessandra Mazzia Kristen LeFevre andEytanAdar, The PViz Comprehension Tool for Social Network Privacy Settings, Tech. rep., University of Michigan, 2011.
Download now