Policy Prediction and Image Search on Content Sharing Sites
Neema George1 , Neena Joseph2 , Merlin Mary James3 , Simy Mary Kurian4
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-1 , Page no. 961-965, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.961965
Online published on Jan 31, 2019
Copyright © Neema George, Neena Joseph, Merlin Mary James, Simy Mary Kurian . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Neema George, Neena Joseph, Merlin Mary James, Simy Mary Kurian, “Policy Prediction and Image Search on Content Sharing Sites,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.961-965, 2019.
MLA Style Citation: Neema George, Neena Joseph, Merlin Mary James, Simy Mary Kurian "Policy Prediction and Image Search on Content Sharing Sites." International Journal of Computer Sciences and Engineering 7.1 (2019): 961-965.
APA Style Citation: Neema George, Neena Joseph, Merlin Mary James, Simy Mary Kurian, (2019). Policy Prediction and Image Search on Content Sharing Sites. International Journal of Computer Sciences and Engineering, 7(1), 961-965.
BibTex Style Citation:
@article{George_2019,
author = {Neema George, Neena Joseph, Merlin Mary James, Simy Mary Kurian},
title = {Policy Prediction and Image Search on Content Sharing Sites},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {961-965},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5506},
doi = {https://doi.org/10.26438/ijcse/v7i1.961965}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.961965}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5506
TI - Policy Prediction and Image Search on Content Sharing Sites
T2 - International Journal of Computer Sciences and Engineering
AU - Neema George, Neena Joseph, Merlin Mary James, Simy Mary Kurian
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 961-965
IS - 1
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
147 | 216 downloads | 128 downloads |
Abstract
Client can share their own data like pictures with different clients through satisfied sharing destinations. Tragically the security of transferred pictures in satisfied sharing site become a significant issue. To conquer this issue CHUI based Privacy Policy Prediction system and NPK for protection strategy based picture search are presented. CHUI ( Closed High Utility Itemsets) based Framework decides the best protection strategy for the transferred pictures and NPK (Non-Parametric Kernel) for picture search in secure way.
Key-Words / Index Term
CHUI, NPK, A3P, Adaptive Policy
References
[1] Anna Cinzia Squicciarini , Dan Lin, Smitha Sundareswaran, and Joshua Wede , ‘Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites’ , IEEE Transactions On Knowledge And Data Engineering, Vol. 27, Issue. 1,2015 .
[2] Jinfeng Zhuang and Steven C.H. Hoi , ‘Non-parametric Kernel Ranking Approach for Social Image Retrieval ‘, pp.26-33,2010
[3] Cheng-Wei Wu, Philippe Fournier-Viger, Jia-Yuan Gu and Vincent S. Tseng1 , ‘Mining Closed+ High Utility Itemsets without Candidate Generation’ , ACM international conference on Information and knowledge management ,2016
[4] J. Bonneau , J. Anderson, and L. Church , ‘Privacy suites: Shared privacy for social networks’, in Proc. Symp.Usable Privacy Security 2009.
[5] J. Bonneau, J. Anderson, and G. Danezis, ‘Prying data out of a social network’ ,in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining.,pp.249–254 ,2009
[6] Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang , ’Social circles: Tackling privacy in social networks’, in Proc. Symp. Usable Privacy Security, 2008.
[7] R. Ravichandran , M. Benisch , P. Kelley, and N. Sadeh , ‘Capturing social networking privacy preferences’ , in Proc. Symp. Usable Privacy Security,Vol. 5672, 2009.
[8] P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, ‘Tag, you can see it!: Using tags for access control in photo sharing’, in Proc. ACM Annu. Conf. Human Factors Comput. Syst., pp. 377–386, 2012
[9] Sergej Zerr, Stefan Siersdorfer, Jonathon Hare and Elena Demidova , ‘I Know What You Did Last Summer!:Privacy-Aware Image Classification and Search’ , ACM SIGIR conference on Research and development in information retrieval, 2012.
[10] H. Lipford, A. Besmer, and J. Watson, ‘Understanding privacy settings in facebook with an audience view’, in Proc. Conf. Usability, Psychol., Security, 2008.