A TOOL FOR PROVIDING SECURITY FOR GRAPHIC DATA ON CS

Y. Srilaxmi, P. Surekha

Abstract


The majority of the content discussing websites will grant customers to go in the privacy preferences. Our jobs are connected to works according to privacy configuration within places to waste time, recommendation systems, in addition to privacy analysis of internet images. We advise an adaptive online privacy policy conjecture system to help customers make privacy configurations intended for their images and look at social context, image content, in addition to metadata as achievable indicators of user privacy preference. The suggested plan will handle pictures of user submitted, in addition to factors that influence privacy configurations of images for example impact of social setting in addition to personal qualities and role of image content in addition to metadata. The forecasted system will offer you comprehensive structure to infer privacy preferences on foundation of information accessible for any specified user and includes two primaries building for example Adaptive Online Privacy Policy Conjecture-Social in addition to Core. Adaptive online privacy policy conjecture core will spotlight on examining of every individual user own images in addition to metadata, while adaptive online privacy policy conjecture-social will show a residential area point of view of privacy strategies for user privacy enhancement.


Keywords


Content sharing; Adaptive privacy policy prediction system; Metadata; Recommendation; Privacy preference; Online images;

References


A. Mazzia, K. LeFevre, and A. E.,, “The PViz comprehension tool for social network privacy settings,” in Proc. Symp. Usable Privacy Security, 2012.

M. Rabbath, P. Sandhaus, and S. Boll, “Analysing facebook features to support event detection for photo-based facebook applications,” in Proc. 2nd ACM Int. Conf. Multimedia Retrieval, 2012, pp. 11:1–11:8.

H. Lipford, A. Besmer, and J. Watson, “Understanding privacy settings in facebook with an audience view,” in Proc. Conf. Usability, Psychol., Security, 2008.

D. Liu, X.-S. Hua, M. Wang, and H.-J. Zhang, “Retagging social images based on visual and semantic consistency,” in Proc. 19th ACM Int. Conf. World Wide Web, 2010, pp.1149–1150.

Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing facebook privacy settings: User expectations vs. reality,” in Proc. ACMSIGCOMMConf. Internet Meas. Conf., 2011, pp. 61–70.

E. M. Maximilien, T. Grandison, T. Sun, D. Richardson, S. Guo, and K. Liu, “Privacy-as-a-service: Models, algorithms, and results on the Facebook platform,” in Proc. Web 2.0 Security Privacy Workshop, 2009.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.