Annapureddy Anji Reddy, P. Rambabu


A lot of the content discussing websites will grant users to get in the privacy preferences. Our tasks are linked to works based on privacy configuration within crack houses, recommendation systems, additionally to privacy analysis of internet images. We advise an adaptive privacy conjecture system to assist users make privacy settings meant for their images and check out social context, image content, additionally to metadata as achievable indicators of user privacy preference. The recommended plan will handle images of user posted, additionally to factors that influence privacy settings of images for instance impact of social setting additionally to non-public characteristics and role of image content additionally to metadata. The forecasted system will give you comprehensive structure to infer privacy preferences on first step toward information available for any specified user and includes two primary building for instance Adaptive Privacy Conjecture-Social additionally to Core. Adaptive privacy conjecture core will spotlight on analyzing of each and every individual user own images additionally to metadata, while adaptive privacy conjecture-social can have a residential district perspective of privacy techniques for user privacy enhancement.


Content Sharing; Adaptive Privacy Policy Prediction System; Metadata; Recommendation; Privacy Preference; Online Images;


Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing facebook privacy settings: User expectations vs. reality,” in Proc. ACMSIGCOMMConf. Internet Meas. Conf., 2011, pp. 61–70.

D. G. Lowe, (2004, Nov.). Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. [Online]. 60(2), pp. 91–110.

G. Loy and A. Zelinsky, “Fast radial symmetry for detecting points of interest,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 8, pp. 959–973, Aug. 2003.

M. Rabbath, P. Sandhaus, and S. Boll, “Analysing facebook features to support event detection for photo-based facebook applications,” in Proc. 2nd ACM Int. Conf. Multimedia Retrieval, 2012, pp. 11:1–11:8.

R. Ravichandran, M. Benisch, P. Kelley, and N. Sadeh, “Capturing social networking privacy preferences,” in Proc. Symp. Usable Privacy Security, 2009.

A. Singhal, “Modern information retrieval: A brief overview,” IEEE Data Eng. Bullet., Speicial Issue on Text Databases, vol. 24, no. 4, pp. 35-43, Dec. 2001.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at