| Peer-Reviewed

Secrecy of Uploaded Images on Locates Using A3P Algorithm

Received: 13 February 2017     Accepted: 15 March 2017     Published: 29 March 2017
Views:       Downloads:
Abstract

With increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users individually shared personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content and metadata as possible indicators of user’s privacy preferences. We propose a two-level framework which according to the user’s available history on the site, determines the best available privacy policy for the user’s images being uploaded. Our solution relies on an image classification framework for images categories which may be associated with similar policies on a policy prediction algorithm to automatically generate a policy for each newly uploaded image and also according to user’s social features. Over time, generated policies will follow the evolution of user’s privacy attitude.

Published in Machine Learning Research (Volume 2, Issue 3)
DOI 10.11648/j.mlr.20170203.11
Page(s) 78-85
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2017. Published by Science Publishing Group

Keywords

Content Sharing Sites, Privacy, Metadata, A3P, Social Media

References
[1] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, “Over-exposed? Privacy patterns and considerations in online and mobile photo sharing,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 357–366.
[2] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing facebook privacy settings: User expectations vs. reality,” inProc. ACMSIGCOMM Conf. Internet Meas. Conf., 2011, pp. 61–70.
[3] S. Jones and E. O’Neill, “Contextual dynamics of group-based sharing decisions,” in Proc. Conf. Human Factors Comput. Syst., 2011, pp. 1777–1786. [Online]. Available: http://doi.acm.org/ 10.1145/1978942.1979200.
[4] A. Acquisti and R. Gross, “Imagined communities: Awareness, information sharing, and privacy on the facebook,” in Proc. 6th Int. Conf. Privacy Enhancing Technol. Workshop, 2006, pp. 36–58.
[5] L. Church, J. Anderson, J. Bonneau, and F. Stajano, “Privacy stories: Confidence on privacy behaviors through end user programming,” in Proc, 2009, 5th Symp. Usable Privacy Security.
[6] H. Lipford, A. Besmer, and J. Watson, “Understanding privacy settings in facebook with an audience view,” in Proc. Conf. Usability, Psychol., Security, 2008.
[7] K. Strater and H. Lipford, “Strategies and struggles with privacy in an online social networking community,” in Proc. Brit. Comput. Soc. Conf. Human-Comput. Interact, 2008, pp. 111–119.
[8] J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security, 2009.
[9] A. Mazzia, K. LeFevre, and A. E., “The PViz comprehension tool for social network privacy settings,” in Proc. Symp. Usable Privacy Security, 2012.
[10] R. Ravichandran, M. Benisch, P. Kelley, and N. Sadeh, “Capturing social networking privacy preferences,” in Proc. Symp. Usable Privacy Security, 2009.
[11] A. Besmer and H. Lipford, “Tagged photos: Concerns, perceptions, and protections,” in Proc. 27th Int. Conf. Extended Abstracts Human Factors Comput. Syst., 2009, pp. 4585–4590.
[12] C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, “Providing access control to online photo albums based on tags and linked data,” in Proc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14.
[13] M. Ames and M. Naaman, “Why we tag: Motivations for annotation in mobile and online media,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 971–980.
[14] G. Loy and A. Zelinsky, “Fast radial symmetry for detecting points of interest,” IEEE Trans. Pattern Anal. Mach. Intell. 2003, vol. 25, no. 8, pp. 959–973, Aug.
[15] D. G. Lowe, (2004, Nov.). Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. [Online]. 60 (2), pp. 91–110. Available: http://dx.doi.org/10.1023/B: VISI.0000029664.99615.
Cite This Article
  • APA Style

    Sivanantham Sivakumar, Musrathasleema Abdul Rahman, Nandhini Balu, Nivetha Nainar. (2017). Secrecy of Uploaded Images on Locates Using A3P Algorithm. Machine Learning Research, 2(3), 78-85. https://doi.org/10.11648/j.mlr.20170203.11

    Copy | Download

    ACS Style

    Sivanantham Sivakumar; Musrathasleema Abdul Rahman; Nandhini Balu; Nivetha Nainar. Secrecy of Uploaded Images on Locates Using A3P Algorithm. Mach. Learn. Res. 2017, 2(3), 78-85. doi: 10.11648/j.mlr.20170203.11

    Copy | Download

    AMA Style

    Sivanantham Sivakumar, Musrathasleema Abdul Rahman, Nandhini Balu, Nivetha Nainar. Secrecy of Uploaded Images on Locates Using A3P Algorithm. Mach Learn Res. 2017;2(3):78-85. doi: 10.11648/j.mlr.20170203.11

    Copy | Download

  • @article{10.11648/j.mlr.20170203.11,
      author = {Sivanantham Sivakumar and Musrathasleema Abdul Rahman and Nandhini Balu and Nivetha Nainar},
      title = {Secrecy of Uploaded Images on Locates Using A3P Algorithm},
      journal = {Machine Learning Research},
      volume = {2},
      number = {3},
      pages = {78-85},
      doi = {10.11648/j.mlr.20170203.11},
      url = {https://doi.org/10.11648/j.mlr.20170203.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.mlr.20170203.11},
      abstract = {With increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users individually shared personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content and metadata as possible indicators of user’s privacy preferences. We propose a two-level framework which according to the user’s available history on the site, determines the best available privacy policy for the user’s images being uploaded. Our solution relies on an image classification framework for images categories which may be associated with similar policies on a policy prediction algorithm to automatically generate a policy for each newly uploaded image and also according to user’s social features. Over time, generated policies will follow the evolution of user’s privacy attitude.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Secrecy of Uploaded Images on Locates Using A3P Algorithm
    AU  - Sivanantham Sivakumar
    AU  - Musrathasleema Abdul Rahman
    AU  - Nandhini Balu
    AU  - Nivetha Nainar
    Y1  - 2017/03/29
    PY  - 2017
    N1  - https://doi.org/10.11648/j.mlr.20170203.11
    DO  - 10.11648/j.mlr.20170203.11
    T2  - Machine Learning Research
    JF  - Machine Learning Research
    JO  - Machine Learning Research
    SP  - 78
    EP  - 85
    PB  - Science Publishing Group
    SN  - 2637-5680
    UR  - https://doi.org/10.11648/j.mlr.20170203.11
    AB  - With increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users individually shared personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content and metadata as possible indicators of user’s privacy preferences. We propose a two-level framework which according to the user’s available history on the site, determines the best available privacy policy for the user’s images being uploaded. Our solution relies on an image classification framework for images categories which may be associated with similar policies on a policy prediction algorithm to automatically generate a policy for each newly uploaded image and also according to user’s social features. Over time, generated policies will follow the evolution of user’s privacy attitude.
    VL  - 2
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Department of Information Technology, Adhiyamaan College of Engineering, Hosur, Tamil Nadu, India

  • Department of Information Technology, Adhiyamaan College of Engineering, Hosur, Tamil Nadu, India

  • Department of Information Technology, Adhiyamaan College of Engineering, Hosur, Tamil Nadu, India

  • Department of Information Technology, Adhiyamaan College of Engineering, Hosur, Tamil Nadu, India

  • Sections