Sharing of Images in Content Sharing Sites Based On User Profile Inferences

Authors

  • S. Pavithra  P. A. College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • K. Saranya  P. A. College of Engineering and Technology, Coimbatore, Tamil Nadu, India

Keywords:

Adaptive Privacy Policy Prediction, Scale Invariant Feature Transform, Speeded Up Robust Feature

Abstract

Usage of social media are increased considerably in today world it enables the user to share images with one another. Sharing the images may leads to performance violation. Web mining is use of data mining technique to discover and extract the information from the web. Web content mining is the extraction and integration of data, information and knowledge from web page. In the web, one can mine the images and find association between various images. Privacy techniques needed to adapt in order to improve the satisfaction level of user, by means of automated privacy policy generation. Adaptive Privacy Policy Prediction system helps the user to compose customized privacy settings. A Two level framework is proposed with Speeded Up Robust Feature for identifying the feature points of an images, by demonstrating in MATLAB tool. The region of selected points is an effective method for identifying the extracted features in the images based on the image feature extraction.

References

  1. Acquisti, Aand Gross,R.(2006) ‘Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook’Privacy Enhancing Technologies.
  2. Ahern S., Eckles D., Good NS., King S., Naaman M., and Nair R., (2007)‘Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing,’ in Proceeding Conference Human Factors Computation System,, pp357–366.
  3. Ames Mand Naaman M., (2007) ‘Why We Tag: Motivations or Annotation in Mobile and Online Media,’ in Proceeding SIGCHI CHI’07.
  4. Bonneau J., Anderson J., and Danezis G., (2009) ‘Prying data out of a social network,’ in Proceeding International Conference Advances Social Network Analytical Miningpp.249–254.
  5. Chen H.-M., Chang M.-H., Chang P.-C., Tien M.-C., Hsu WH., and Wu J.-L., (2008) ‘Sheepdog: Group and tag recommendation for flickr photos by automatic search-based learning,’ in Proceeding 16th ACM International Conference Multimedia,, pp737–740.
  6. Choudhury MD., Sundaram H., Lin Y.R., John Aand Seligmann DD., (2009) ‘Connecting content to community in social media via image content, user tags and user communication,’ in Proceeding IEEE International Conference Multimedia Expo, pp.1238–1241.
  7. Datta R., Joshi D., Li J., and Wang J., (2008) ‘Image retrieval : Ideas, influences and trends of new age’, ACM Computation survey, vol40, no.2, p5.
  8. Jones Sand O’Neill E., (2011) ‘Contextual dynamics of groupbased sharing decisions,’ in Proceeding Conference Human Factors Computation System, pp1777–1786 9Kapadia A., Adu-Oppong F., Gardiner CK., and Tsang PP., (2008) ‘Social circles: Tackling privacy in social networks,’ in Proceeding Symposium Usable Privacy Security
  9. Klemperer P., Liang Y., Mazurek M., Sleeper M., Ur B., Bauer L., Cranor LF., Gupta N., and Reiter M., (2012) ‘Tag, you can see it!: Using tags for access control in photo sharing,’ in Proceeding ACM Annual Conference Human Factors Computation System, pp377– 386.
  10. Lerman K., Plangprasopchok Aand Wong C., (2007) ‘Personalizing image search results on flickr’, CoRR, volabs/0704.1676.
  11. Liu Y., Gummadi KP., Krishnamurthy Band Mislove A., (2011), ‘Analysing facebook privacy settings: User expectations vsreality’, in proceeding ACM SIGCOMM Conference Internet Measuring Conference, pp61-70.
  12. Lipford H., Besmer A., and Watson J., (2008) ‘Understanding privacy settings in facebook with an audience view,’ in Proceeding Conference Usability, Psychology, Security
  13. Loy Gand Zelinsky A., (2003) ‘Fast radial symmetry for detecting points of interest’, IEEE Transactions Pattern Analysis Machine Intelligence, vol25, no8, pp959-973
  14. Maximilien EM., Grandison T., Sun T., Richardson D., Guo S., and Liu K., (2009) ‘Privacy-as-a-service: Models, algorithms, and results on the Facebook platform,’ in Proceeding Web 2.0 Security Privacy Workshop.
  15. Mazzia A., LeFevre K., and E A..,, (2012) ‘The PViz comprehension tool for social network privacy settings,’ in Proceeding Symposium Usable Privacy Security.
  16. Ravichandran R., Benisch M., Kelley P., and Sadeh N., (2009) ‘Capturing social networking privacy preferences,’ in Proceeding Symposium Usable Privacy Security
  17. Wagner RAand Fischer MJ., (1974) ‘The string-to-string correction problem,’ JACM, vol21, no1, pp168–173
  18. Yeh C.-H., Ho Y.-C., Barsky BA., and Ouhyoung M., (2010) ‘Personalized photograph ranking and selection system,’ in Proceeding International Conference Multimedia, pp211–220.
  19. Yeung CA., Kagal L., Gibbins N., and Shadbolt N., (2009) ‘Providing access control to online photo albums based on tags and linked data,’ in Proceeding Social Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symposium, pp9–14.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
S. Pavithra, K. Saranya, " Sharing of Images in Content Sharing Sites Based On User Profile Inferences, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.702-708, March-April-2016.