Abstract
Online photo sharing is an increasingly popular activity for Internet users. More and more users are now constantly sharing their images in various social media, from social networking sites to online communities, blogs, and content sharing sites. In this article, we present an extensive study exploring privacy and sharing needs of users’ uploaded images. We develop learning models to estimate adequate privacy settings for newly uploaded images, based on carefully selected image-specific features. Our study investigates both visual and textual features of images for privacy classification. We consider both basic image-specific features, commonly used for image processing, as well as more sophisticated and abstract visual features. Additionally, we include a visual representation of the sentiment evoked by images. To our knowledge, sentiment has never been used in the context of image classification for privacy purposes. We identify the smallest set of features, that by themselves or combined together with others, can perform well in properly predicting the degree of sensitivity of users’ images. We consider both the case of binary privacy settings (i.e., public, private), as well as the case of more complex privacy options, characterized by multiple sharing options. Our results show that with few carefully selected features, one may achieve high accuracy, especially when high-quality tags are available.
- Shane Ahern, Dean Eckles, Nathaniel S. Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM, New York, NY, 357--366. DOI:http://dx.doi.org/10.1145/1240624.1240683 Google Scholar
Digital Library
- Eytan Adar Alessandra Mazzia, Kristen LeFevre. 2011. UM Tech Report #CSE-TR-570-11.Google Scholar
- Morgan Ames and Mor Naaman. 2007. Why we tag: Motivations for annotation in mobile and online media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). 971--980. DOI:http://dx.doi.org/10.1145/1240624.1240772 Google Scholar
Digital Library
- Andrew Besmer and Heather Lipford. 2009. Tagged photos: Concerns, perceptions, and protections. In Proceedings of the 27th International Conference Extended Abstracts on Human Factors in Computing Systems (CHI’09). ACM, New York, NY, 4585--4590. DOI:http://dx.doi.org/10.1145/1520340.1520704 Google Scholar
Digital Library
- Social Discovery Blog. 2012. Pin or not to Pin: An Inside Look. Retrieved from http://blog.socialdiscovery.org/tag/statistics/.Google Scholar
- Joseph Bonneau, Jonathan Anderson, and Luke Church. 2009a. Privacy suites: Shared privacy for social networks. In Proceedings of the Symposium on Usable Privacy and Security. Google Scholar
Digital Library
- Joseph Bonneau, Jonathan Anderson, and George Danezis. 2009b. Prying data out of a social network. In ASONAM: Proceedings of the International Conference on Advances in Social Network Analysis and Mining. 249--254. Google Scholar
Digital Library
- Damian Borth, Rongrong Ji, Tao Chen, Thomas Breuel, and Shih-Fu Chang. 2013. Large-scale visual sentiment ontology and detectors using adjective noun pairs. In Proceedings of the 21st ACM International Conference on Multimedia. ACM, 223--232. Google Scholar
Digital Library
- Bullguard. 2014. Privacy violations, the dark side of social media. Retrieved from http://www.bullguard.com/bullguard-security-center/internet-security/social-media-dangers/privacy-violations-in-social-media.as px.Google Scholar
- O. Chapelle, P. Haffner, and V. N. Vapnik. 1999. Support vector machines for histogram-based image classification. IEEE. Trans. Neur. Netw. 10, 5 (1999), 1055--1064. Google Scholar
Digital Library
- S. A. Chatzichristofis, Y. S. Boutalis, and M. Lux. 2009. Img(Rummager): An interactive content based image retrieval system. In Proceedings of the 2nd International Workshop on Similarity Search and Applications (SISAP’09). 151--153. Google Scholar
Digital Library
- Gorrell P. Cheek and Mohamed Shehab. 2012. Policy-by-example for online social networks. In 17th ACM Symposium on Access Control Models and Technologies (SACMAT’12). ACM, New York, NY, 23--32. Google Scholar
Digital Library
- Hong-Ming Chen, Ming-Hsiu Chang, Ping-Chieh Chang, Ming-Chun Tien, Winston H. Hsu, and Ja-Ling Wu. 2008. SheepDog: Group and tag recommendation for flickr photos by automatic search-based learning. In Proceeding of the 16th ACM International Conference on Multimedia (MM’08). ACM, New York, NY, 737--740. DOI:http://dx.doi.org/10.1145/1459359.1459473 Google Scholar
Digital Library
- Munmun De Choudhury, Hari Sundaram, Yu-Ru Lin, Ajita John, and Dorée Duncan Seligmann. 2009. Connecting content to community in social media via image content, user tags and user communication. In Proceedings of the 2009 IEEE International Conference on Multimedia and Expo (ICME’09). IEEE, 1238--1241. Google Scholar
Cross Ref
- R. da Silva Torres and A. X. Falcão. 2006. Content-based image retrieval: Theory and applications. Rev. Inf. Teór. Apl. 2, 13 (2006), 161--185.Google Scholar
- R. Datta, D. Joshi, J. Li, and J. Z. Wang. 2008. Image retrieval: Ideas, influences, and trends of the new age. ACM Comput. Surv. 40, 2 (2008), 5. Google Scholar
Digital Library
- Jia Deng, Alexander C. Berg, Kai Li, and Li Fei-Fei. 2010. What does classifying more than 10,000 image categories tell us? In Proceedings of the 11th European Conference on Computer Vision: Part V (ECCV’10). Springer-Verlag, Berlin, 71--84. Retrieved from http://portal.acm.org/citation.cfm?id=1888150.1888157 Google Scholar
Cross Ref
- Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, NY, 351--360. Google Scholar
Digital Library
- J. He, W. W. Chu, and Z. Liu. 2006. Inferring privacy information from social networks. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics. Google Scholar
Digital Library
- X. He, W. Y. Ma, O. King, M. Li, and H. Zhang. 2002. Learning and inferring a semantic space from user’s relevance feedback for image retrieval. In Proceedings of the 10th ACM International Conference on Multimedia. ACM, 343--346. Google Scholar
Digital Library
- Benjamin Henne, Christian Szongott, and Matthew Smith. 2013. SnapMe if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 95--106. Google Scholar
Digital Library
- Kelly Jackson Higgins. 2010. Social Networks For Patients Stir Privacy, Security Worries. Retrieved from http://www.darkreading.com/authentication/167901072/security/privacy/227500908/social-networks-for-patients-stir-privacy-security-worries.html.Google Scholar
- Simon Jones and Eamonn O’Neill. 2011. Contextual dynamics of group-based sharing decisions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’11). ACM, 1777--1786. DOI:http://dx.doi.org/10.1145/1978942.1979200 Google Scholar
Digital Library
- Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael K. Reiter. 2012. Tag, you can see it! Using tags for access control in photo sharing. In Proceedings of the Conference on Human Factors in Computing Systems (CHI’12). ACM. Retrieved from http://www.ece.cmu.edu/∼lbauer/papers/2012/chi2012-tags.pdf.Google Scholar
- Jinaga Latha. 2011. Java Content Based Image Retrieval. Retrieved from https://code.google.com/p/jcbir/.Google Scholar
- Kun Liu and Evimaria Terzi. 2010. A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5, Article 6 (Dec. 2010), 30 pages. Issue 1.Google Scholar
Digital Library
- D. G. Lowe. 2004a. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 2 (2004), 91--110.Google Scholar
Digital Library
- David G. Lowe. 2004b. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 2 (Nov. 2004), 91--110. DOI:http://dx.doi.org/10.1023/B:VISI.0000029664.99615.94 Google Scholar
Digital Library
- Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. 2012. A study of privacy settings errors in an online social network. In Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, 340--345. Google Scholar
Cross Ref
- Andrew D. Miller and W. Keith Edwards. 2007. Give and take: A study of consumer photo-sharing culture and practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM, New York, NY, 347--356. DOI:http://dx.doi.org/10.1145/1240624.1240682 Google Scholar
Digital Library
- Wing W. Y. Ng, Andres Dorado, Daniel S. Yeung, Witold Pedrycz, and Ebroul Izquierdo. 2007. Image classification with the use of radial basis function neural networks and the minimization of the localized generalization error. Pattern Recogn. 40, 1 (2007), 19--32. DOI:http://dx.doi.org/10.1016/j.patcog.2006.07.002 Google Scholar
Digital Library
- Anon Plangprasopchok and Kristina Lerman. 2007. Exploiting social annotation for automatic resource discovery. CoRR abs/0704.1675 (2007).Google Scholar
- Mohamad Rabbath, Philipp Sandhaus, and Susanne Boll. 2011. Automatic creation of photo books from stories in social media. ACM Trans. Multimedia Comput. Commun. Appl. 7S, 1, Article 27 (Nov. 2011), 18 pages.Google Scholar
Digital Library
- Mohamad Rabbath, Philipp Sandhaus, and Susanne Boll. 2012. Analysing facebook features to support event detection for photo-based facebook applications. In Proceedings of the 2nd ACM International Conference on Multimedia Retrieval (ICMR’12). ACM, New York, NY, Article 11, 8 pages. Google Scholar
Digital Library
- Sridhar Ramaswamy, Rajeev Rastogi, and Kyuseok Shim. 2000. Efficient algorithms for mining outliers from large data sets. In ACM SIGMOD Record, Vol. 29. ACM, 427--438. Google Scholar
Digital Library
- Jesse Read, Bernhard Pfahringer, Geoff Holmes, and Eibe Frank. 2011. Classifier chains for multi-label classification. Machine Learning 85, 3 (2011), 333.Google Scholar
Digital Library
- Jose San Pedro and Stefan Siersdorfer. 2009. Ranking and classifying attractiveness of photos in folksonomies. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, New York, NY, 771--780. DOI:http://dx.doi.org/10.1145/1526709.1526813 Google Scholar
Digital Library
- Neela Sawant. 2011. Modeling tagged photos for automatic image annotation. In Proceedings of the 19th ACM International Conference on Multimedia (MM’11). ACM, New York, NY, 865--866. Google Scholar
Digital Library
- Neela Sawant, Jia Li, and James Ze Wang. 2011. Automatic image semantic interpretation using social action and tagging data. Multimedia Tools Appl. 51, 1 (2011), 213--246. Google Scholar
Digital Library
- Josef Sivic and Andrew Zisserman. 2003. Video google: A text retrieval approach to object matching in videos. In Proc. of ICCV. IEEE, 1470--1477. Google Scholar
Cross Ref
- Anna Cinzia Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2014. Analyzing images? Privacy for the modern web. In Proceedings of the 25th ACM Conference on Hypertext and Social Media. ACM, 136--147. Google Scholar
Digital Library
- Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, and Joshua Wede. 2011. A3P: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia. ACM, 261--270. Google Scholar
Digital Library
- Xiaoshuai Sun, Hongxun Yao, Rongrong Ji, and Shaohui Liu. 2009. Photo assessment based on computational visual attention model. In Proceedings of the 17th ACM International Conference on Multimedia (MM’09). ACM, New York, NY, 541--544. DOI:http://dx.doi.org/10.1145/1631272.1631351 Google Scholar
Digital Library
- H. Sundaram, L. Xie, M. De Choudhury, Y. R. Lin, and A. Natsev. 2012. Multimedia semantics: Interactions between content and community. Proc. IEEE 100, 9 (2012), 2737--2758. Google Scholar
Cross Ref
- Aditya Vailaya, Anil Jain, and Hong Jiang Zhang. 1998. On image classification: City images vs. landscapes. Pattern Recogn. 31, 12 (1998), 1921--1935. Google Scholar
Cross Ref
- Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng Chang, and Danfeng Yao. 2009. Towards automatic privacy management in web 2.0 with semantic analysis on annotations. In CollaborateCom. 1--10.Google Scholar
- Chong Wang, David M. Blei, and Fei-Fei Li. 2009. Simultaneous image classification and annotation. In Proceedings of the Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’09). IEEE, 1903--1910.Google Scholar
- Haitao Xu, Haining Wang, and Angelos Stavrou. 2015. Privacy risk assessment on online photos. In Research in Attacks, Intrusions, and Defenses. Springer, 427--447. Google Scholar
Digital Library
- Jun Yang, Yu-Gang Jiang, Alexander G. Hauptmann, and Chong-Wah Ngo. 2007. Evaluating bag-of-visual-words representations in scene classification. In Proc. of ACM Workshop on Multimedia Information Retrieval. ACM, 197--206. Google Scholar
Digital Library
- Che-Hua Yeh, Yuan-Chen Ho, Brian A. Barsky, and Ming Ouhyoung. 2010. Personalized photograph ranking and selection system. In Proceedings of the International Conference on Multimedia (MM’10). ACM, New York, NY, 211--220. DOI:http://dx.doi.org/10.1145/1873951.1873963 Google Scholar
Digital Library
- C. M. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt. 2009. Providing access control to online photo albums based on tags and linked data. Social Semantic Web: Where Web 2 (2009).Google Scholar
- Jie Yu, Xin Jin, Jiawei Han, and Jiebo Luo. 2010. Social group suggestion from user image collections. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, NY, 1215--1216. DOI:http://dx.doi.org/10.1145/1772690.1772881 Google Scholar
Digital Library
- J. Yu, D. Joshi, and J. Luo. 2009. Connecting people in photo-sharing sites by photo content and user annotations. In Proceedings of the 2009 IEEE International Conference on Multimedia and Expo (ICME’09). IEEE, 1464--1467. Google Scholar
Cross Ref
- Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, and Elena Demidova. 2012. Privacy-aware image classification and search. In Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’12). ACM, New York, NY, 35--44. http://doi.acm.org/10.1145/2348283.2348292 Google Scholar
Digital Library
- Nan Zheng, Qiudan Li, Shengcai Liao, and Leiming Zhang. 2010. Which photo groups should I choose? A comparative study of recommendation algorithms in flickr. J. Inf. Sci. 36 (Dec. 2010), 733--750. Issue 6.Google Scholar
- Jinfeng Zhuang and Steven C. H. Hoi. 2010. Non-parametric kernel ranking approach for social image retrieval. In Proceedings of the ACM International Conference on Image and Video Retrieval (CIVR’10). ACM, New York, NY, 26--33. DOI:http://dx.doi.org/10.1145/1816041.1816047 Google Scholar
Digital Library
Index Terms
Toward Automated Online Photo Privacy
Recommendations
Privacy-aware Tag Recommendation for Accurate Image Privacy Prediction
Survey Papers and Regular PapersOnline images’ tags are very important for indexing, sharing, and searching of images, as well as surfacing images with private or sensitive content, which needs to be protected. Social media sites such as Flickr generate these metadata from user-...
Image Privacy Prediction Using Deep Neural Networks
Images today are increasingly shared online on social networking sites such as Facebook, Flickr, and Instagram. Image sharing occurs not only within a group of friends but also more and more outside a user’s social circles for purposes of social ...
Privacy-aware image classification and search
SIGIR '12: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrievalModern content sharing environments such as Flickr or YouTube contain a large amount of private resources such as photos showing weddings, family holidays, and private parties. These resources can be of a highly sensitive nature, disclosing many details ...






Comments