CFP last date
20 January 2025
Reseach Article

Privacy Policy Inference for Social Images

by Chaitrali Salunke, S. A.Takale
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 15
Year of Publication: 2016
Authors: Chaitrali Salunke, S. A.Takale
10.5120/ijca2016910886

Chaitrali Salunke, S. A.Takale . Privacy Policy Inference for Social Images. International Journal of Computer Applications. 145, 15 ( Jul 2016), 31-36. DOI=10.5120/ijca2016910886

@article{ 10.5120/ijca2016910886,
author = { Chaitrali Salunke, S. A.Takale },
title = { Privacy Policy Inference for Social Images },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 15 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number15/25357-2016910886/ },
doi = { 10.5120/ijca2016910886 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:58.290538+05:30
%A Chaitrali Salunke
%A S. A.Takale
%T Privacy Policy Inference for Social Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 15
%P 31-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Social networking has become an indivisible part of the modern lifestyle. It plays a crucial role in our daily lives. It allows us to communicate with numerous individuals.Popular social networking sites such as Facebook1, LinkedIn2 allow people to get connected from diverse geographic locations. Existing and the emerging social media sites empower users to utilize various interesting features such as sharing photos or information with as many friends as they want, commenting on a text or picture, creating groups and so on. Privacy settings offered by these sites come into picture when a user may not want to share his profile globally or with certain people. Privacy violation is an important issue that needs to be addressed while being active on any social networking site. If the privacy settings provided by the respective site are inadequate, then people may invade your privacy and misuse your information. Going towards this need, utilizing system to compose privacy settings for user’s images is important. Further, the privacy inference policies should be maintained with respect to user profile. Hence, we have decided to develop a system that will help the user to maintain security for images he/she has uploaded on a content sharing site.

References
  1. Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and Joshua Wede, “Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites” IEEE Transaction On Knowledge And Data Enginnering, VOL. 27, NO. 1, January 2015 193
  2. Miss.Chaitrali A. Salunke Student, Computer Engineering Department, V.P College of Engineering, Baramati “A Survey On Privacy Policy Inference for Social Images” International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016
  3. A. Mazzia, K. LeFevre, and A. E.,, “The PViz comprehension tool for social network privacy settings,” in Proc. Symp. Usable Privacy Security, 2012.
  4. P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386.
  5. S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova, “Privacy-aware image classification and search,” in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp. 35–44.
  6. H. Sundaram, L. Xie, M. De Choudhury, Y. Lin, and A. Natsev, “Multimedia semantics: Interactions between content and community,” Proc. IEEE, vol. 100, no. 9, pp. 2737–2758, Sep. 2012.
  7. J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable fPrivacy Security, 2009.
  8. C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, “Providing access control to online photo albums based on tags and linked data,” in Proc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14.
  9. A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,” in Proc. Symp. Usable Privacy Security, 2008.
  10. K. Ghazinour, M. Sokolova, and S. Matwin. "Detecting Health-Related Privacy Leaks in Social Networks Using Text Mining Tools." Advances in Artificial Intelligence. Springer Berlin Heidelberg, 2013. 25-39
  11. P. Fong, M. Anwar, and Z. Zhao. A privacy preservation model for facebook-style social network systems. University of Calgary Technical Report 2009-926-05, 2009
  12. R. da Silva Torres and A. Falc~ao, “Content-based image retrieval: Theory and applications,” Revista de Inform_atica Te_orica e Aplicada, vol. 2, no. 13, pp. 161–185, 2006.
  13. R. Datta, D. Joshi, J. Li, and J. Wang, “Image retrieval: Ideas, influences, and trends of the new age,” ACM Comput. Surv., vol. 40, no. 2, p. 5, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Hierarchical clustering Cosine Similarity Social media Content sharing Privacy Policies User Profiles.