Privacy Policy Inference of User-Uploaded Images on
Content Sharing Sites
ABSTRACT:
With the increasing volume of images users share through social sites, maintaining
privacy has become a major problem, as demonstrated by a recent wave of
publicized incidents where users inadvertently shared personal information. In
light of these incidents, the need of tools to help users control access to their shared
content is apparent. Toward addressing this need, we propose an Adaptive Privacy
Policy Prediction (A3P) system to help users compose privacy settings for their
images. We examine the role of social context, image content, and metadata as
possible indicators of users’ privacy preferences. We propose a two-level
framework which according to the user’s available history on the site, determines
the best available privacy policy for the user’s images being uploaded. Our
solution relies on an image classification framework for image categories which
may be associated with similar policies, and on a policy prediction algorithm to
automatically generate a policy for each newly uploaded image, also according to
users’ social features. Over time, the generated policies will follow the evolution of
users’ privacy attitude. We provide the results of our extensive evaluation over
5,000 policies, which demonstrate the effectiveness of our system, with prediction
accuracies over 90 percent.
EXISTING SYSTEM:
 Most content sharing websites allow users to enter their privacy preferences.
Unfortunately, recent studies have shown that users struggle to set up and
maintain such privacy settings.
 One of the main reasons provided is that given the amount of shared
information this process can be tedious and error-prone. Therefore, many
have acknowledged the need of policy recommendation systems which can
assist users to easily and properly configure privacy settings.
DISADVANTAGES OF EXISTING SYSTEM:
 Sharing images within online content sharing sites,therefore,may quickly
leadto unwanted disclosure and privacy violations.
 Further, the persistent nature of online media makes it possible for other
users to collect rich aggregated information about the owner of the published
content and the subjects in the published content.
 The aggregated information can result in unexpected exposure of one’s
social environment and lead to abuse of one’s personal information.
PROPOSED SYSTEM:
 In this paper, we propose an Adaptive Privacy Policy Prediction (A3P)
system which aims to provide users a hassle free privacy settings experience
by automatically generating personalized policies. The A3P system handles
user uploaded images, and factors in the following criteria that influence
one’s privacy settings of images:
o The impact of social environment and personal characteristics. Social
context of users, such as their profile information and relationships
with others may provide useful information regarding users’ privacy
preferences. For example, users interested in photography may like to
share their photos with other amateur photographers.
o The role of image’s content and metadata. In general, similar images
often incur similar privacy preferences, especially when people appear
in the images. For example, one may upload several photos of his kids
and specify that only his family members are allowed to see these
photos.
ADVANTAGES OF PROPOSED SYSTEM:
The A3P-core focuses on analyzing each individual user’s own images and
metadata, while the A3P-Social offers a community perspective of privacy setting
recommendations for a user’s potential privacy improvement. We design the
interaction flows between the two building blocks to balance the benefits from
meeting personal characteristics and obtaining community advice.
MODULES:
 System Construction Module
 Content-Based Classification
 Metadata-Based Classification
 Adaptive Policy Prediction
MODULES DESCSRIPTION:
System ConstructionModule
The A3P system consists of two main components: A3P-core and A3P-social. The
overall data flow is the following. When a user uploads an image, the image will
be first sent to the A3P-core. The A3P-core classifies the image and determines
whether there is a need to invoke the A3P-social. In most cases, the A3P-core
predicts policies for the users directly based on their historical behavior. If one of
the following two cases is verified true, A3P-core will invoke A3Psocial: (i) The
user does not have enough data for the type of the uploaded image to conduct
policy prediction; (ii) The A3P-core detects the recent major changes among the
user’s community about their privacy practices along with user’s increase of social
networking activities (addition of new friends, new posts onone’s profile etc).
Content-BasedClassification
To obtain groups of images that may be associated with similar privacy
preferences, we propose a hierarchical image classification which classifies images
first based on their contents and then refine each category into subcategories based
on their metadata. Images that do not have metadata will be grouped only by
content. Such a hierarchical classification gives a higher priority to image content
and minimizes the influence of missing tags. Note that it is possible that some
images are included in multiple categories as long as they contain the typical
content features or metadata of those categories.
Our approach to content-based classification is based on an efficient and yet
accurate image similarity approach. Specifically, our classification algorithm
compares image signatures defined based on quantified and sanitized version of
Haar wavelet transformation. For each image, the wavelet transform encodes
frequency and spatial information related to image color, size, invariant transform,
shape, texture, symmetry, etc. Then, a small number of coefficients are selected to
form the signature of the image. The content similarity among images is then
determined by the distance among their image signatures.
Metadata-BasedClassification
The metadata-based classification groups images into subcategories under
aforementioned baseline categories. The process consists of three main steps. The
first step is to extract keywords from the metadata associated with an image. The
metadata considered in our work are tags, captions, and comments. The second
step is to derive a representative hypernym (denoted as h) from each metadata
vector. The third step is to find a subcategory that an image belongs to. This is an
incremental procedure. At the beginning, the first image forms a subcategory as
itself and the representative hypernyms of the image becomes the subcategory’s
representative hypernyms.
Adaptive Policy Prediction
The policy prediction algorithm provides a predicted policy of a newly uploaded
image to the user for his/her reference. More importantly, the predicted policy will
reflect the possible changes of a user’s privacy concerns. The prediction process
consists of three main phases: (i) policy normalization; (ii) policy mining; and (iii)
policy prediction.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : ASP.NET,C#.NET
 Tool : Visual Studio 2008
 Database : SQL Server 2005
REFERENCE:
Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and
Joshua Wede, “Privacy Policy Inference of User-Uploaded Images on Content
Sharing Sites”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, VOL. 27, NO. 1, JANUARY 2015.
IEEE Projects 2015 | Privacy policy inference of user uploaded images on content sharing sites

More Related Content

DOCX
Privacy policy inference of user uploaded
PDF
Privacy policy inference of user uploaded images on content sharing sites
PPT
Privacy presentation
DOCX
Privacy policy inference of user uploaded
PDF
iaetsd Adaptive privacy policy prediction for user uploaded images on
PDF
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
PDF
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
PDF
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded images on content sharing sites
Privacy presentation
Privacy policy inference of user uploaded
iaetsd Adaptive privacy policy prediction for user uploaded images on
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling

What's hot (17)

PDF
Tag based image retrieval (tbir) using automatic image annotation
DOCX
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
DOCX
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PDF
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
PDF
A Survey On Privacy Policy Inference for Social Images
DOCX
Preventing private information inference attacks on social networks
PDF
oneslider_template_ACS [532226]
DOCX
Privacy policy inference of user uploaded
PDF
FIND MY VENUE: Content & Review Based Location Recommendation System
PDF
Identification of inference attacks on private Information from Social Networks
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
PDF
Computing Social Score of Web Artifacts - IRE Major Project Spring 2015
PPTX
Recommendation systems
PPT
Negotiated Studies - A semantic social network based expert recommender system
PPTX
Social Media Mining - Chapter 8 (Influence and Homophily)
PDF
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Tag based image retrieval (tbir) using automatic image annotation
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
A Survey On Privacy Policy Inference for Social Images
Preventing private information inference attacks on social networks
oneslider_template_ACS [532226]
Privacy policy inference of user uploaded
FIND MY VENUE: Content & Review Based Location Recommendation System
Identification of inference attacks on private Information from Social Networks
International Journal of Engineering Research and Development (IJERD)
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
Computing Social Score of Web Artifacts - IRE Major Project Spring 2015
Recommendation systems
Negotiated Studies - A semantic social network based expert recommender system
Social Media Mining - Chapter 8 (Influence and Homophily)
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Ad

Similar to IEEE Projects 2015 | Privacy policy inference of user uploaded images on content sharing sites (20)

PDF
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
PDF
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DOCX
Privacy policy inference of user uploaded
DOCX
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
DOCX
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PDF
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
PDF
Implementation of Privacy Policy Specification System for User Uploaded Image...
PDF
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
PDF
Protect Social Connection Using Privacy Predictive Algorithm
PDF
My Privacy My decision: Control of Photo Sharing on Online Social Networks
PDF
Intelligent access control policies for Social network site
PDF
Detecting and Providing Solutions to Privacy Issues in Social Media
PPTX
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
PDF
Privacy Protection Using Formal Logics in Onlne Social Networks
PPTX
Personalized Privacy-Aware Image Classification
PDF
Ijcatr04041017
PDF
Socially Shared Images with Automated Annotation Process by Using Improved Us...
PDF
Master's Thesis
PDF
A Survey on Multi-party Privacy Disputes in Social Networks
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy policy inference of user uploaded
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Implementation of Privacy Policy Specification System for User Uploaded Image...
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Protect Social Connection Using Privacy Predictive Algorithm
My Privacy My decision: Control of Photo Sharing on Online Social Networks
Intelligent access control policies for Social network site
Detecting and Providing Solutions to Privacy Issues in Social Media
SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
Privacy Protection Using Formal Logics in Onlne Social Networks
Personalized Privacy-Aware Image Classification
Ijcatr04041017
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Master's Thesis
A Survey on Multi-party Privacy Disputes in Social Networks
Ad

Recently uploaded (20)

PDF
My India Quiz Book_20210205121199924.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
Trump Administration's workforce development strategy
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
IGGE1 Understanding the Self1234567891011
My India Quiz Book_20210205121199924.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Environmental Education MCQ BD2EE - Share Source.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
Empowerment Technology for Senior High School Guide
Trump Administration's workforce development strategy
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Weekly quiz Compilation Jan -July 25.pdf
Virtual and Augmented Reality in Current Scenario
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Paper A Mock Exam 9_ Attempt review.pdf.
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
B.Sc. DS Unit 2 Software Engineering.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
IGGE1 Understanding the Self1234567891011

IEEE Projects 2015 | Privacy policy inference of user uploaded images on content sharing sites

  • 1. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
  • 2. ABSTRACT: With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content, and metadata as possible indicators of users’ privacy preferences. We propose a two-level framework which according to the user’s available history on the site, determines the best available privacy policy for the user’s images being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users’ social features. Over time, the generated policies will follow the evolution of users’ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent. EXISTING SYSTEM:  Most content sharing websites allow users to enter their privacy preferences. Unfortunately, recent studies have shown that users struggle to set up and maintain such privacy settings.
  • 3.  One of the main reasons provided is that given the amount of shared information this process can be tedious and error-prone. Therefore, many have acknowledged the need of policy recommendation systems which can assist users to easily and properly configure privacy settings. DISADVANTAGES OF EXISTING SYSTEM:  Sharing images within online content sharing sites,therefore,may quickly leadto unwanted disclosure and privacy violations.  Further, the persistent nature of online media makes it possible for other users to collect rich aggregated information about the owner of the published content and the subjects in the published content.  The aggregated information can result in unexpected exposure of one’s social environment and lead to abuse of one’s personal information. PROPOSED SYSTEM:  In this paper, we propose an Adaptive Privacy Policy Prediction (A3P) system which aims to provide users a hassle free privacy settings experience by automatically generating personalized policies. The A3P system handles user uploaded images, and factors in the following criteria that influence one’s privacy settings of images: o The impact of social environment and personal characteristics. Social context of users, such as their profile information and relationships with others may provide useful information regarding users’ privacy
  • 4. preferences. For example, users interested in photography may like to share their photos with other amateur photographers. o The role of image’s content and metadata. In general, similar images often incur similar privacy preferences, especially when people appear in the images. For example, one may upload several photos of his kids and specify that only his family members are allowed to see these photos. ADVANTAGES OF PROPOSED SYSTEM: The A3P-core focuses on analyzing each individual user’s own images and metadata, while the A3P-Social offers a community perspective of privacy setting recommendations for a user’s potential privacy improvement. We design the interaction flows between the two building blocks to balance the benefits from meeting personal characteristics and obtaining community advice. MODULES:  System Construction Module  Content-Based Classification  Metadata-Based Classification  Adaptive Policy Prediction MODULES DESCSRIPTION:
  • 5. System ConstructionModule The A3P system consists of two main components: A3P-core and A3P-social. The overall data flow is the following. When a user uploads an image, the image will be first sent to the A3P-core. The A3P-core classifies the image and determines whether there is a need to invoke the A3P-social. In most cases, the A3P-core predicts policies for the users directly based on their historical behavior. If one of the following two cases is verified true, A3P-core will invoke A3Psocial: (i) The user does not have enough data for the type of the uploaded image to conduct policy prediction; (ii) The A3P-core detects the recent major changes among the user’s community about their privacy practices along with user’s increase of social networking activities (addition of new friends, new posts onone’s profile etc). Content-BasedClassification To obtain groups of images that may be associated with similar privacy preferences, we propose a hierarchical image classification which classifies images first based on their contents and then refine each category into subcategories based on their metadata. Images that do not have metadata will be grouped only by content. Such a hierarchical classification gives a higher priority to image content and minimizes the influence of missing tags. Note that it is possible that some images are included in multiple categories as long as they contain the typical content features or metadata of those categories. Our approach to content-based classification is based on an efficient and yet accurate image similarity approach. Specifically, our classification algorithm compares image signatures defined based on quantified and sanitized version of
  • 6. Haar wavelet transformation. For each image, the wavelet transform encodes frequency and spatial information related to image color, size, invariant transform, shape, texture, symmetry, etc. Then, a small number of coefficients are selected to form the signature of the image. The content similarity among images is then determined by the distance among their image signatures. Metadata-BasedClassification The metadata-based classification groups images into subcategories under aforementioned baseline categories. The process consists of three main steps. The first step is to extract keywords from the metadata associated with an image. The metadata considered in our work are tags, captions, and comments. The second step is to derive a representative hypernym (denoted as h) from each metadata vector. The third step is to find a subcategory that an image belongs to. This is an incremental procedure. At the beginning, the first image forms a subcategory as itself and the representative hypernyms of the image becomes the subcategory’s representative hypernyms. Adaptive Policy Prediction The policy prediction algorithm provides a predicted policy of a newly uploaded image to the user for his/her reference. More importantly, the predicted policy will reflect the possible changes of a user’s privacy concerns. The prediction process consists of three main phases: (i) policy normalization; (ii) policy mining; and (iii) policy prediction.
  • 8.  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.NET,C#.NET  Tool : Visual Studio 2008  Database : SQL Server 2005 REFERENCE: Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and Joshua Wede, “Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015.