SlideShare a Scribd company logo
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PRIVACY POLICY INFERENCE OF USER-UPLOADED
IMAGES ON CONTENT SHARING SITES
ABSTRACT
With the increasing volume of images users share through social sites, maintaining
privacy has become a major problem, as demonstrated by a recent wave of publicized incidents
where users inadvertently shared personal information. In light of these incidents, the need of
tools to help users control access to their shared content is apparent. Toward addressing this
need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose
privacy settings for their images. We examine the role of social context, image content, and
metadata as possible indicators of users’ privacy preferences. We propose a two-level framework
which according to the user’s available history on the site, determines the best available privacy
policy for the user’s images being uploaded. Our solution relies on an image classification
framework for image categories which may be associated with similar policies, and on a policy
prediction algorithm to automatically generate a policy for each newly uploaded image, also
according to users’ social features. Over time, the generated policies will follow the evolution of
users’ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies,
which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
Several recent works have studied how to automate the task of privacy settings Bonneau
et al. proposed the concept of privacy suites which recommend to users a suite of privacy
settings that n“expert” users or other trusted friends have already set, so that normal users can
either directly choose a setting or only need to do minor modification. Similarly, Danezis
proposed a machine-learning based approach to automatically extract privacy settings from the
social context within which the data is produced. Parallel to the work of Danezis, Adu-Oppong et
al. develop privacy settings based on a concept of “Social Circles” which consist of clusters of
friends formed by partitioning users’ friend lists. Ravichandran et al. studied how to predict a
user’s privacy preferences for location-based data (i.e., share her location or not) based on
location and time of day. Fang et al. proposed a privacy wizard to help users grant privileges to
their friends. The wizard asks users to first assign privacy labels to selected friends, and then
uses this as input to construct a classifier which classifies friends based on their profiles and
automatically assign privacy labels to the unlabeled friends. More recently, Klemperer et al.
studied whether the keywords and captions with which users tag their photos can be used to help
users more intuitively create and maintain access-control policies. Their findings are inline with
our approach: tags created for organizational purposes can be repurposed to help create
reasonably accurate access-control rules.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PROPOSED SYSTEM:
We propose an Adaptive Privacy Policy Prediction (A3P) system which aims to provide
users a hassle free privacy settings experience by automatically generating personalized policies.
The A3P system handles user uploaded images, and factors in the following criteria that
influence one’s privacy settings of images: The impact of social environment and personal
characteristics. Social context of users, such as their profile information and relationships with
others may provide useful information regarding users’ privacy preferences. For example, users
interested in photography may like to share their photos with other amateur photographers. Users
who have several family members among their social contacts may share with them pictures
related to family events. However, using common policies across all users or across users with
similar traits may be too simplistic and not satisfy individual preferences. Users may have
drastically different opinions even on the same type of images. For example, a privacy adverse
person may be willing to share all his personal images while a more conservative person may
just want to share personal images with his family members. In light of these considerations, it is
important to find the balancing point between the impact of social environment and users’
individual characteristics in order to predict the policies that match each individual’s needs.
Moreover, individuals may change their overall attitude toward privacy as time passes. In order
to develop a personalized policy recommendation system, such changes on privacy opinions
should be carefully considered. The role of image’s content and metadata. In general, similar
images often incur similar privacy preferences, especially when people appear in the images. For
example, one may upload several photos of his kids and specify that only his family members are
allowed to see these photos. He may upload some other photos of landscapes which he took as a
hobby and for these photos, he may set privacy preference allowing anyone to view and
comment the photos. Analyzing the visual content may not be sufficient to capture users’ privacy
preferences. Tags and other metadata are indicative of the social context of the image, including
where it was taken and why , and also provide a synthetic description of images, complementing
the information obtained from visual content analysis.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Module 1
A3P-CORE
There are two major components in A3P-core: (i) Image classification and (ii) Adaptive
policy prediction. For each user, his/her images are first classified based on content and
metadata. Then, privacy policies of each category of images are analyzed for the policy
prediction. Adopting a two-stage approach is more suitable for policy recommendation than
applying the common one-stage data mining approaches to mine both image features and
policies together. Recall that when a user uploads a new image, the user is waiting for a
recommended policy. The two-stage approach allows the system to employ the first stage to
classify the new image and find the candidate sets of images for the subsequent policy
recommendation. As for the one-stage mining approach, it would not be able to locate the right
class of the new image because its classification criteria needs both image features and policies
whereas the policies of the new image are not available yet. Moreover, combining both image
features and policies into a single classifier would lead to a system which is very dependent to
the specific syntax of the policy. If a change in the supported policies were to be introduced, the
whole learning model would need to change.
Module 2
Image Classification
To obtain groups of images that may be associated with similar privacy preferences, we
propose a hierarchical image classification which classifies images first based on their contents
and then refine each category into subcategories based on their metadata. Images that do not
have metadata will be grouped only by content. Such a hierarchical classification gives a higher
priority to image content and minimizes the influence of missing tags. Note that it is possible that
some images are included in multiple categories as long as they contain the typical content
features or metadata of those categories. The content-based classification creates two categories:
“landscape” and “kid”. Images C, D, E and F are included in both categories as they show kids
playing outdoor which satisfy the two themes: “landscape” and “kid”. These two categories are
further divided into subcategories based on tags associated with the images. As a result, we
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
obtain two subcategories under each theme respectively. Notice that image G is not shown in any
subcategory as it does not have any tag; image A shows up in both subcategories because it has
tags indicating both “beach” and “wood”.
Module 3
Policy Mining
We propose a hierarchical mining approach for policy mining. Our approach leverages
association rule mining techniques to discover popular patterns in policies. Policy mining is
carried out within the same category of the new image because images in the same category are
more likely under the similar level of privacy protection. The basic idea of the hierarchical
mining is to follow a natural order in which a user defines a policy. Given an image, a user
usually first decides who can access the image, then thinks about what specific access rights
(e.g., view only or download) should be given, and finally refine the access conditions such as
setting the expiration date. Correspondingly, the hierarchical mining first look for popular
subjects defined by the user, then look for popular actions in the policies containing the popular
subjects, and finally for popular conditions in the policies containing both popular subjects and
conditions.
Step 1: In the same category of the new image, conduct association rule mining on the subject
component of polices. Let S1, S2; . . ., denote the subjects occurring in policies. Each resultant
rule is an implication of the form X ) Y, where X, Y _ fS1, S2; . . . ; g, and X  Y ¼ ;. Among the
obtained rules, we select the best rules according to one of the interestingness measures, i.e., the
generality of the rule, defined using support and confidence as introduced in [16]. The selected
rules indicate the most popular subjects (i.e., single subject) or subject combinations (i.e.,
multiple subjects) in policies. In the subsequent steps, we consider policies which contain at least
one subject in the selected rules. For clarity, we denote the set of such policies as Gsub i
corresponding to a selected rule Rsub i .
Step 2: In each policy set Gsub i , we now conduct association rule mining on the action
component. The result will be a set of association rules in the form of X ) Y, where X, Y _fopen,
comment, tag, downloadg, and X  Y ¼ ;. Similar to the first step, we will select the best rules
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
according to the generality interestingness. This time, the selected rules indicate the most popular
combination of actions in policies with respect to each particular subject or subject combination.
Policies which do not contain any action included in the selected rules will be removed. Given a
selected rule Ract j we denote the set of remaining policies as Gact j , and note that Gact j _ Gsub
Step 3: We proceed to mine the condition component in each policy set Gact j . Let attr1, attr2,
..., attrn denote the distinct attributes in the condition component of the policies in Gact j . The
association rules are in the same format of X ) Y but with X, Y _fattr1, attr2; . . . ; attrng. Once
the rules are obtained, we again select the best rules using the generality interestingness measure.
The selected rules give us a set of attributes which often appear in policies. Similarly, we denote
the policies containing at least one attribute in the selected rule Rcon k as Gcon k and Gcon k _
Gact j
Step 4: This step is to generate candidate policies. Given Gcon k _ Gact j _ Gsub i , we consider
each corresponding series of best rules: Rcon kx , Ract jy and Rsub iz . Candidate policies are
required to possess all elements in Rcon kx , Ract jy and Rsub iz Note that candidate policies
may be different from the policies as result of Step 3. This is because Step 3 will keep policies as
long as they have one of the attributes in the selected rules.
Module 4
A3P-SOCIAL
The A3P-social employs a multi-criteria inference mechanism that generates
representative policies by leveraging key information related to the user’s social context and his
general attitude toward privacy. As mentioned earlier, A3Psocial will be invoked by the A3P-
core in two scenarios. One is when the user is a newbie of a site, and does not have enough
images stored for the A3P-core to infer meaningful and customized policies. The other is when
the system notices significant changes of privacy trend in the user’s social circle, which may be
of interest for the user to possibly adjust his/her privacy settings accordingly. In what follows,
we first present the types of social context considered by A3P-Social, and then present the policy
recommendation process.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
CONCLUSION:
We have proposed an Adaptive Privacy Policy Prediction (A3P) system that helps users
automate the privacy policy settings for their uploaded images. The A3P system provides a
comprehensive framework to infer privacy preferences based on the information available for a
given user. We also effectively tackled the issue of cold-start, leveraging social context
information. Our experimental study proves that our A3P is a practical tool that offers significant
improvements over current approaches to privacy.

More Related Content

What's hot

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
 
IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...
IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...
IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...
1crore projects
 
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
inventionjournals
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
IOSR Journals
 
Social Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image SearchSocial Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image Search
IRJET Journal
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
ijsptm
 
Personalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed imagesPersonalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed images
eSAT Journals
 

What's hot (8)

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...
IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...
IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...
 
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
 
Social Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image SearchSocial Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image Search
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Personalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed imagesPersonalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed images
 

Viewers also liked

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
Shakas Technologies
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Shakas Technologies
 
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Shakas Technologies
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
Shakas Technologies
 
K nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedK nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encrypted
Shakas Technologies
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backscPassive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Shakas Technologies
 
Key updating for leakage resiliency with application to aes modes of operation
Key updating for leakage resiliency with application to aes modes of operationKey updating for leakage resiliency with application to aes modes of operation
Key updating for leakage resiliency with application to aes modes of operation
Shakas Technologies
 
A profit maximization scheme with guaranteed quality of service in cloud comp...
A profit maximization scheme with guaranteed quality of service in cloud comp...A profit maximization scheme with guaranteed quality of service in cloud comp...
A profit maximization scheme with guaranteed quality of service in cloud comp...
Shakas Technologies
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
Shakas Technologies
 
Entity linking with a knowledge baseissues, techniques, and solutions
Entity linking with a knowledge baseissues, techniques, and solutionsEntity linking with a knowledge baseissues, techniques, and solutions
Entity linking with a knowledge baseissues, techniques, and solutions
Shakas Technologies
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Shakas Technologies
 
Minimum bandwidth reservations for periodic streams in wireless real time sys...
Minimum bandwidth reservations for periodic streams in wireless real time sys...Minimum bandwidth reservations for periodic streams in wireless real time sys...
Minimum bandwidth reservations for periodic streams in wireless real time sys...
Shakas Technologies
 
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
Shakas Technologies
 
Behavior rule specification based ntrusion detection for safety critical medi...
Behavior rule specification based ntrusion detection for safety critical medi...Behavior rule specification based ntrusion detection for safety critical medi...
Behavior rule specification based ntrusion detection for safety critical medi...
Shakas Technologies
 

Viewers also liked (16)

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
 
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
K nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedK nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encrypted
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backscPassive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backsc
 
Key updating for leakage resiliency with application to aes modes of operation
Key updating for leakage resiliency with application to aes modes of operationKey updating for leakage resiliency with application to aes modes of operation
Key updating for leakage resiliency with application to aes modes of operation
 
A profit maximization scheme with guaranteed quality of service in cloud comp...
A profit maximization scheme with guaranteed quality of service in cloud comp...A profit maximization scheme with guaranteed quality of service in cloud comp...
A profit maximization scheme with guaranteed quality of service in cloud comp...
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 
Entity linking with a knowledge baseissues, techniques, and solutions
Entity linking with a knowledge baseissues, techniques, and solutionsEntity linking with a knowledge baseissues, techniques, and solutions
Entity linking with a knowledge baseissues, techniques, and solutions
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Minimum bandwidth reservations for periodic streams in wireless real time sys...
Minimum bandwidth reservations for periodic streams in wireless real time sys...Minimum bandwidth reservations for periodic streams in wireless real time sys...
Minimum bandwidth reservations for periodic streams in wireless real time sys...
 
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
 
Behavior rule specification based ntrusion detection for safety critical medi...
Behavior rule specification based ntrusion detection for safety critical medi...Behavior rule specification based ntrusion detection for safety critical medi...
Behavior rule specification based ntrusion detection for safety critical medi...
 

Similar to Privacy policy inference of user uploaded

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
nexgentechnology
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
Nexgen Technology
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
nexgentech15
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1crore projects
 
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images oniaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Iaetsd Iaetsd
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijripublishers Ijri
 
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
IJERA Editor
 
User service-rating-prediction-by-exploring social users rating Behaviours
User service-rating-prediction-by-exploring social users rating BehavioursUser service-rating-prediction-by-exploring social users rating Behaviours
User service-rating-prediction-by-exploring social users rating Behaviours
Shakas Technologies
 
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTSQUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
Shakas Technologies
 
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTSQUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
Shakas Technologies
 
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingAdaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social Networking
IOSR Journals
 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
IJMTST Journal
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
 
Image Tagging With Social Assistance
Image Tagging With Social AssistanceImage Tagging With Social Assistance
Image Tagging With Social Assistance
ijtsrd
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
IRJET Journal
 
Domain sensitive recommendation with user-item subgroup analysis
Domain sensitive recommendation with user-item subgroup analysisDomain sensitive recommendation with user-item subgroup analysis
Domain sensitive recommendation with user-item subgroup analysis
Shakas Technologies
 
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...
IJERA Editor
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
IRJET Journal
 
Relevance feedback a novel method to associate user subjectivity to image
Relevance feedback a novel method to associate user subjectivity to imageRelevance feedback a novel method to associate user subjectivity to image
Relevance feedback a novel method to associate user subjectivity to image
IAEME Publication
 
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION  IN  SOCIAL MEDIA BY IMAGE PROCESSINGPRIVACY PRESERVATION  IN  SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
AM Publications
 

Similar to Privacy policy inference of user uploaded (20)

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
 
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images oniaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
 
User service-rating-prediction-by-exploring social users rating Behaviours
User service-rating-prediction-by-exploring social users rating BehavioursUser service-rating-prediction-by-exploring social users rating Behaviours
User service-rating-prediction-by-exploring social users rating Behaviours
 
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTSQUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTSQUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingAdaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social Networking
 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
Image Tagging With Social Assistance
Image Tagging With Social AssistanceImage Tagging With Social Assistance
Image Tagging With Social Assistance
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
 
Domain sensitive recommendation with user-item subgroup analysis
Domain sensitive recommendation with user-item subgroup analysisDomain sensitive recommendation with user-item subgroup analysis
Domain sensitive recommendation with user-item subgroup analysis
 
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
 
Relevance feedback a novel method to associate user subjectivity to image
Relevance feedback a novel method to associate user subjectivity to imageRelevance feedback a novel method to associate user subjectivity to image
Relevance feedback a novel method to associate user subjectivity to image
 
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION  IN  SOCIAL MEDIA BY IMAGE PROCESSINGPRIVACY PRESERVATION  IN  SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 

Recently uploaded (20)

"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 

Privacy policy inference of user uploaded

  • 1. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES ABSTRACT With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content, and metadata as possible indicators of users’ privacy preferences. We propose a two-level framework which according to the user’s available history on the site, determines the best available privacy policy for the user’s images being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users’ social features. Over time, the generated policies will follow the evolution of users’ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent.
  • 2. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM: Several recent works have studied how to automate the task of privacy settings Bonneau et al. proposed the concept of privacy suites which recommend to users a suite of privacy settings that n“expert” users or other trusted friends have already set, so that normal users can either directly choose a setting or only need to do minor modification. Similarly, Danezis proposed a machine-learning based approach to automatically extract privacy settings from the social context within which the data is produced. Parallel to the work of Danezis, Adu-Oppong et al. develop privacy settings based on a concept of “Social Circles” which consist of clusters of friends formed by partitioning users’ friend lists. Ravichandran et al. studied how to predict a user’s privacy preferences for location-based data (i.e., share her location or not) based on location and time of day. Fang et al. proposed a privacy wizard to help users grant privileges to their friends. The wizard asks users to first assign privacy labels to selected friends, and then uses this as input to construct a classifier which classifies friends based on their profiles and automatically assign privacy labels to the unlabeled friends. More recently, Klemperer et al. studied whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. Their findings are inline with our approach: tags created for organizational purposes can be repurposed to help create reasonably accurate access-control rules.
  • 3. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com PROPOSED SYSTEM: We propose an Adaptive Privacy Policy Prediction (A3P) system which aims to provide users a hassle free privacy settings experience by automatically generating personalized policies. The A3P system handles user uploaded images, and factors in the following criteria that influence one’s privacy settings of images: The impact of social environment and personal characteristics. Social context of users, such as their profile information and relationships with others may provide useful information regarding users’ privacy preferences. For example, users interested in photography may like to share their photos with other amateur photographers. Users who have several family members among their social contacts may share with them pictures related to family events. However, using common policies across all users or across users with similar traits may be too simplistic and not satisfy individual preferences. Users may have drastically different opinions even on the same type of images. For example, a privacy adverse person may be willing to share all his personal images while a more conservative person may just want to share personal images with his family members. In light of these considerations, it is important to find the balancing point between the impact of social environment and users’ individual characteristics in order to predict the policies that match each individual’s needs. Moreover, individuals may change their overall attitude toward privacy as time passes. In order to develop a personalized policy recommendation system, such changes on privacy opinions should be carefully considered. The role of image’s content and metadata. In general, similar images often incur similar privacy preferences, especially when people appear in the images. For example, one may upload several photos of his kids and specify that only his family members are allowed to see these photos. He may upload some other photos of landscapes which he took as a hobby and for these photos, he may set privacy preference allowing anyone to view and comment the photos. Analyzing the visual content may not be sufficient to capture users’ privacy preferences. Tags and other metadata are indicative of the social context of the image, including where it was taken and why , and also provide a synthetic description of images, complementing the information obtained from visual content analysis.
  • 4. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Module 1 A3P-CORE There are two major components in A3P-core: (i) Image classification and (ii) Adaptive policy prediction. For each user, his/her images are first classified based on content and metadata. Then, privacy policies of each category of images are analyzed for the policy prediction. Adopting a two-stage approach is more suitable for policy recommendation than applying the common one-stage data mining approaches to mine both image features and policies together. Recall that when a user uploads a new image, the user is waiting for a recommended policy. The two-stage approach allows the system to employ the first stage to classify the new image and find the candidate sets of images for the subsequent policy recommendation. As for the one-stage mining approach, it would not be able to locate the right class of the new image because its classification criteria needs both image features and policies whereas the policies of the new image are not available yet. Moreover, combining both image features and policies into a single classifier would lead to a system which is very dependent to the specific syntax of the policy. If a change in the supported policies were to be introduced, the whole learning model would need to change. Module 2 Image Classification To obtain groups of images that may be associated with similar privacy preferences, we propose a hierarchical image classification which classifies images first based on their contents and then refine each category into subcategories based on their metadata. Images that do not have metadata will be grouped only by content. Such a hierarchical classification gives a higher priority to image content and minimizes the influence of missing tags. Note that it is possible that some images are included in multiple categories as long as they contain the typical content features or metadata of those categories. The content-based classification creates two categories: “landscape” and “kid”. Images C, D, E and F are included in both categories as they show kids playing outdoor which satisfy the two themes: “landscape” and “kid”. These two categories are further divided into subcategories based on tags associated with the images. As a result, we
  • 5. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com obtain two subcategories under each theme respectively. Notice that image G is not shown in any subcategory as it does not have any tag; image A shows up in both subcategories because it has tags indicating both “beach” and “wood”. Module 3 Policy Mining We propose a hierarchical mining approach for policy mining. Our approach leverages association rule mining techniques to discover popular patterns in policies. Policy mining is carried out within the same category of the new image because images in the same category are more likely under the similar level of privacy protection. The basic idea of the hierarchical mining is to follow a natural order in which a user defines a policy. Given an image, a user usually first decides who can access the image, then thinks about what specific access rights (e.g., view only or download) should be given, and finally refine the access conditions such as setting the expiration date. Correspondingly, the hierarchical mining first look for popular subjects defined by the user, then look for popular actions in the policies containing the popular subjects, and finally for popular conditions in the policies containing both popular subjects and conditions. Step 1: In the same category of the new image, conduct association rule mining on the subject component of polices. Let S1, S2; . . ., denote the subjects occurring in policies. Each resultant rule is an implication of the form X ) Y, where X, Y _ fS1, S2; . . . ; g, and X Y ¼ ;. Among the obtained rules, we select the best rules according to one of the interestingness measures, i.e., the generality of the rule, defined using support and confidence as introduced in [16]. The selected rules indicate the most popular subjects (i.e., single subject) or subject combinations (i.e., multiple subjects) in policies. In the subsequent steps, we consider policies which contain at least one subject in the selected rules. For clarity, we denote the set of such policies as Gsub i corresponding to a selected rule Rsub i . Step 2: In each policy set Gsub i , we now conduct association rule mining on the action component. The result will be a set of association rules in the form of X ) Y, where X, Y _fopen, comment, tag, downloadg, and X Y ¼ ;. Similar to the first step, we will select the best rules
  • 6. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com according to the generality interestingness. This time, the selected rules indicate the most popular combination of actions in policies with respect to each particular subject or subject combination. Policies which do not contain any action included in the selected rules will be removed. Given a selected rule Ract j we denote the set of remaining policies as Gact j , and note that Gact j _ Gsub Step 3: We proceed to mine the condition component in each policy set Gact j . Let attr1, attr2, ..., attrn denote the distinct attributes in the condition component of the policies in Gact j . The association rules are in the same format of X ) Y but with X, Y _fattr1, attr2; . . . ; attrng. Once the rules are obtained, we again select the best rules using the generality interestingness measure. The selected rules give us a set of attributes which often appear in policies. Similarly, we denote the policies containing at least one attribute in the selected rule Rcon k as Gcon k and Gcon k _ Gact j Step 4: This step is to generate candidate policies. Given Gcon k _ Gact j _ Gsub i , we consider each corresponding series of best rules: Rcon kx , Ract jy and Rsub iz . Candidate policies are required to possess all elements in Rcon kx , Ract jy and Rsub iz Note that candidate policies may be different from the policies as result of Step 3. This is because Step 3 will keep policies as long as they have one of the attributes in the selected rules. Module 4 A3P-SOCIAL The A3P-social employs a multi-criteria inference mechanism that generates representative policies by leveraging key information related to the user’s social context and his general attitude toward privacy. As mentioned earlier, A3Psocial will be invoked by the A3P- core in two scenarios. One is when the user is a newbie of a site, and does not have enough images stored for the A3P-core to infer meaningful and customized policies. The other is when the system notices significant changes of privacy trend in the user’s social circle, which may be of interest for the user to possibly adjust his/her privacy settings accordingly. In what follows, we first present the types of social context considered by A3P-Social, and then present the policy recommendation process.
  • 7. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com CONCLUSION: We have proposed an Adaptive Privacy Policy Prediction (A3P) system that helps users automate the privacy policy settings for their uploaded images. The A3P system provides a comprehensive framework to infer privacy preferences based on the information available for a given user. We also effectively tackled the issue of cold-start, leveraging social context information. Our experimental study proves that our A3P is a practical tool that offers significant improvements over current approaches to privacy.