Privacy Policy and Deduplication of User Uploaded Images on Social Websites

J.Santhiya*, K.Nirosha**, N. Kalaivani***, R. Jayanthinisha****, K.Kamatchi*****
* Assistant Professor, Department of Information Technology, A.V.C College of Engineering, Mayiladuthurai, India.
**-***** UG Scholars, Department of Information Technology, A.V.C College of Engineering, Mayiladuthurai, India.
Periodicity:December - February'2016
DOI : https://doi.org/10.26634/jcom.3.4.4832

Abstract

Usage of social medias have increased now-a-days. User share personal information and images through social network. While maintaining the privacy has become a major problem and also duplication of images have reduced the capacity of the databases. The authors a two level framework for maintaining privacy and securing the photo share. Users who want to maintain privacy are usually provided with access control. The canny edge detection technique is used for the deduplication of images. It increases the storage space capacity of the database. Watermarking is used for every image that is shared on the website for the copyright protection and restricting the images on other websites.

Keywords

Privacy, Online Content, Social Website, Image, Edge Detection.

How to Cite this Article?

Santhiya, J., Nirosha, K., Kalaivani, N., Jayanthinisha, R., and Kamatchi, K. (2016). Privacy Policy and Deduplication of User Uploaded Images on Social Websites Optimization. i-manager’s Journal on Computer Science, 3(4), 36-39. https://doi.org/10.26634/jcom.3.4.4832

References

[1]. D. Liu, X.S. Hua, M. Wang, and H.J. Zhang, (2010). “Retagging Social Images Based on Visual and Semantic Consistency”. in Proceedings of 19 ACM International Conference on World Wide Web, pp.1149-1150.
[2]. R. Da Silva Torres and A. Falcao, (2006). “Contentbased Image Retrieval: Theory and Applications”. Revista de Informatics Teoricae Aplicada, Vol.2, No.13, pp.161- 185.
[3]. H. Lipford, A. Besmer, and J. Watson, (2008). “Understanding Privacy Settings in Facebook with an Audience View”. in Proceedings of Conference Usability, Psychology, and Security.
[4]. Mitra Basu, (2002). “Gaussian-Based Edge-Detection Methods-A Survey”. IEEE Transactions on Systems, Man, and Cybernetics, Vol.135, No.3, pp.252-260.
[5]. Katherine Strater and Heather Richter Lipford, (2008). “Strategies and Struggles with Privacy in an Online Social Networking Community”. Proceedings of the 22 British HCI Group Annual Conference on People and Computers: Culture, Creativity, and Interaction, Vol.1, pp.111-119.
[6]. Ching-man Au Yeung, Lalana Kagal, Nicholas Gibbins, and Nigel Shadbolt, (2009). “Providing Access Control to Online Photo Albums Based on Tags and Linked Data”. Retrieved from http://dig.csail.mit.edu/2008/ Papers/AAAI%20SSS%202009/paper.pdf
[7]. X. Su and T. M. Khoshgoftaar, (2009). “A Survey of Collaborative Filtering Techniques”. Advances in Artificial Intelligence, Vol.2009, pp.19.
[8]. Anna Cinzia Squicciarini, (2015). “Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites”. IEEE Transactions on Knowledge and Data Engineering, Vol.27, No.1.
[9]. Anna C. Squicciarini, Mohamed Shehab, and Federica Paci, (2009). “Collective Privacy Management in Social Networks”. Retrieved from http://www2009. eprints.org/53/1/ p521.pdf
[10]. Sattarova Feruza Y. and Tao-hoon Kim, (2007). “IT Security Review: Privacy, Protection, Access Control, Assurance and System Security”. International Journal of Multimedia and Ubiquitous Engineering, Vol.2, No.2, pp.17-32.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.