Downloads: 126 | Views: 314
Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017 | Popularity: 6.2 / 10
Hyrarchical Classification of Images to Predict Privacy Policy to Uploaded Images on Content Sharing Site
Pranay Diwakar Kute, H. A. Hingoliwala
Abstract: Social Network is an e-service which is booming for sharing contents. Reliable communication is done with social networking sites. Though these sites are a new attacking area for hackers for hacking, they are able to misuse the data through these sites. Some users over CSS affect users privacy on their personal contents, where some users keep on sending unwanted comments and messages by taking advantage of the users inherent trust in their relationship network. Towards addressing this need, we propose a Content-Predicated Relegation system to avail users to get automatically set privacy of their images. We examine the role of gregarious context, image content, and metadata as possible bespeakers of users privacy predilections. Our solution relies on an image relegation framework for image categories which may be associated with homogeneous policies and on a policy presage algorithm to automatically engender a policy for each incipiently uploaded image.
Keywords: Social media, Content sharing sites, Privacy, Meta data, Content-Based Classification system, policy prediction algorithm
Edition: Volume 6 Issue 1, January 2017
Pages: 1151 - 1154
DOI: https://www.doi.org/10.21275/ART20164243
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2001
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 718
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 698
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 687
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera