skip to main content
research-article
Public Access

Toward Automated Online Photo Privacy

Published:03 April 2017Publication History
Skip Abstract Section

Abstract

Online photo sharing is an increasingly popular activity for Internet users. More and more users are now constantly sharing their images in various social media, from social networking sites to online communities, blogs, and content sharing sites. In this article, we present an extensive study exploring privacy and sharing needs of users’ uploaded images. We develop learning models to estimate adequate privacy settings for newly uploaded images, based on carefully selected image-specific features. Our study investigates both visual and textual features of images for privacy classification. We consider both basic image-specific features, commonly used for image processing, as well as more sophisticated and abstract visual features. Additionally, we include a visual representation of the sentiment evoked by images. To our knowledge, sentiment has never been used in the context of image classification for privacy purposes. We identify the smallest set of features, that by themselves or combined together with others, can perform well in properly predicting the degree of sensitivity of users’ images. We consider both the case of binary privacy settings (i.e., public, private), as well as the case of more complex privacy options, characterized by multiple sharing options. Our results show that with few carefully selected features, one may achieve high accuracy, especially when high-quality tags are available.

References

  1. Shane Ahern, Dean Eckles, Nathaniel S. Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM, New York, NY, 357--366. DOI:http://dx.doi.org/10.1145/1240624.1240683 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Eytan Adar Alessandra Mazzia, Kristen LeFevre. 2011. UM Tech Report #CSE-TR-570-11.Google ScholarGoogle Scholar
  3. Morgan Ames and Mor Naaman. 2007. Why we tag: Motivations for annotation in mobile and online media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). 971--980. DOI:http://dx.doi.org/10.1145/1240624.1240772 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Andrew Besmer and Heather Lipford. 2009. Tagged photos: Concerns, perceptions, and protections. In Proceedings of the 27th International Conference Extended Abstracts on Human Factors in Computing Systems (CHI’09). ACM, New York, NY, 4585--4590. DOI:http://dx.doi.org/10.1145/1520340.1520704 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Social Discovery Blog. 2012. Pin or not to Pin: An Inside Look. Retrieved from http://blog.socialdiscovery.org/tag/statistics/.Google ScholarGoogle Scholar
  6. Joseph Bonneau, Jonathan Anderson, and Luke Church. 2009a. Privacy suites: Shared privacy for social networks. In Proceedings of the Symposium on Usable Privacy and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Joseph Bonneau, Jonathan Anderson, and George Danezis. 2009b. Prying data out of a social network. In ASONAM: Proceedings of the International Conference on Advances in Social Network Analysis and Mining. 249--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Damian Borth, Rongrong Ji, Tao Chen, Thomas Breuel, and Shih-Fu Chang. 2013. Large-scale visual sentiment ontology and detectors using adjective noun pairs. In Proceedings of the 21st ACM International Conference on Multimedia. ACM, 223--232. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bullguard. 2014. Privacy violations, the dark side of social media. Retrieved from http://www.bullguard.com/bullguard-security-center/internet-security/social-media-dangers/privacy-violations-in-social-media.as px.Google ScholarGoogle Scholar
  10. O. Chapelle, P. Haffner, and V. N. Vapnik. 1999. Support vector machines for histogram-based image classification. IEEE. Trans. Neur. Netw. 10, 5 (1999), 1055--1064. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. A. Chatzichristofis, Y. S. Boutalis, and M. Lux. 2009. Img(Rummager): An interactive content based image retrieval system. In Proceedings of the 2nd International Workshop on Similarity Search and Applications (SISAP’09). 151--153. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Gorrell P. Cheek and Mohamed Shehab. 2012. Policy-by-example for online social networks. In 17th ACM Symposium on Access Control Models and Technologies (SACMAT’12). ACM, New York, NY, 23--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hong-Ming Chen, Ming-Hsiu Chang, Ping-Chieh Chang, Ming-Chun Tien, Winston H. Hsu, and Ja-Ling Wu. 2008. SheepDog: Group and tag recommendation for flickr photos by automatic search-based learning. In Proceeding of the 16th ACM International Conference on Multimedia (MM’08). ACM, New York, NY, 737--740. DOI:http://dx.doi.org/10.1145/1459359.1459473 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Munmun De Choudhury, Hari Sundaram, Yu-Ru Lin, Ajita John, and Dorée Duncan Seligmann. 2009. Connecting content to community in social media via image content, user tags and user communication. In Proceedings of the 2009 IEEE International Conference on Multimedia and Expo (ICME’09). IEEE, 1238--1241. Google ScholarGoogle ScholarCross RefCross Ref
  15. R. da Silva Torres and A. X. Falcão. 2006. Content-based image retrieval: Theory and applications. Rev. Inf. Teór. Apl. 2, 13 (2006), 161--185.Google ScholarGoogle Scholar
  16. R. Datta, D. Joshi, J. Li, and J. Z. Wang. 2008. Image retrieval: Ideas, influences, and trends of the new age. ACM Comput. Surv. 40, 2 (2008), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jia Deng, Alexander C. Berg, Kai Li, and Li Fei-Fei. 2010. What does classifying more than 10,000 image categories tell us? In Proceedings of the 11th European Conference on Computer Vision: Part V (ECCV’10). Springer-Verlag, Berlin, 71--84. Retrieved from http://portal.acm.org/citation.cfm?id=1888150.1888157 Google ScholarGoogle ScholarCross RefCross Ref
  18. Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, NY, 351--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. He, W. W. Chu, and Z. Liu. 2006. Inferring privacy information from social networks. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. X. He, W. Y. Ma, O. King, M. Li, and H. Zhang. 2002. Learning and inferring a semantic space from user’s relevance feedback for image retrieval. In Proceedings of the 10th ACM International Conference on Multimedia. ACM, 343--346. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Benjamin Henne, Christian Szongott, and Matthew Smith. 2013. SnapMe if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 95--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kelly Jackson Higgins. 2010. Social Networks For Patients Stir Privacy, Security Worries. Retrieved from http://www.darkreading.com/authentication/167901072/security/privacy/227500908/social-networks-for-patients-stir-privacy-security-worries.html.Google ScholarGoogle Scholar
  23. Simon Jones and Eamonn O’Neill. 2011. Contextual dynamics of group-based sharing decisions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’11). ACM, 1777--1786. DOI:http://dx.doi.org/10.1145/1978942.1979200 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael K. Reiter. 2012. Tag, you can see it! Using tags for access control in photo sharing. In Proceedings of the Conference on Human Factors in Computing Systems (CHI’12). ACM. Retrieved from http://www.ece.cmu.edu/∼lbauer/papers/2012/chi2012-tags.pdf.Google ScholarGoogle Scholar
  25. Jinaga Latha. 2011. Java Content Based Image Retrieval. Retrieved from https://code.google.com/p/jcbir/.Google ScholarGoogle Scholar
  26. Kun Liu and Evimaria Terzi. 2010. A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5, Article 6 (Dec. 2010), 30 pages. Issue 1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. G. Lowe. 2004a. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 2 (2004), 91--110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. David G. Lowe. 2004b. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 2 (Nov. 2004), 91--110. DOI:http://dx.doi.org/10.1023/B:VISI.0000029664.99615.94 Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. 2012. A study of privacy settings errors in an online social network. In Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, 340--345. Google ScholarGoogle ScholarCross RefCross Ref
  30. Andrew D. Miller and W. Keith Edwards. 2007. Give and take: A study of consumer photo-sharing culture and practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM, New York, NY, 347--356. DOI:http://dx.doi.org/10.1145/1240624.1240682 Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Wing W. Y. Ng, Andres Dorado, Daniel S. Yeung, Witold Pedrycz, and Ebroul Izquierdo. 2007. Image classification with the use of radial basis function neural networks and the minimization of the localized generalization error. Pattern Recogn. 40, 1 (2007), 19--32. DOI:http://dx.doi.org/10.1016/j.patcog.2006.07.002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Anon Plangprasopchok and Kristina Lerman. 2007. Exploiting social annotation for automatic resource discovery. CoRR abs/0704.1675 (2007).Google ScholarGoogle Scholar
  33. Mohamad Rabbath, Philipp Sandhaus, and Susanne Boll. 2011. Automatic creation of photo books from stories in social media. ACM Trans. Multimedia Comput. Commun. Appl. 7S, 1, Article 27 (Nov. 2011), 18 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Mohamad Rabbath, Philipp Sandhaus, and Susanne Boll. 2012. Analysing facebook features to support event detection for photo-based facebook applications. In Proceedings of the 2nd ACM International Conference on Multimedia Retrieval (ICMR’12). ACM, New York, NY, Article 11, 8 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Sridhar Ramaswamy, Rajeev Rastogi, and Kyuseok Shim. 2000. Efficient algorithms for mining outliers from large data sets. In ACM SIGMOD Record, Vol. 29. ACM, 427--438. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Jesse Read, Bernhard Pfahringer, Geoff Holmes, and Eibe Frank. 2011. Classifier chains for multi-label classification. Machine Learning 85, 3 (2011), 333.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Jose San Pedro and Stefan Siersdorfer. 2009. Ranking and classifying attractiveness of photos in folksonomies. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, New York, NY, 771--780. DOI:http://dx.doi.org/10.1145/1526709.1526813 Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Neela Sawant. 2011. Modeling tagged photos for automatic image annotation. In Proceedings of the 19th ACM International Conference on Multimedia (MM’11). ACM, New York, NY, 865--866. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Neela Sawant, Jia Li, and James Ze Wang. 2011. Automatic image semantic interpretation using social action and tagging data. Multimedia Tools Appl. 51, 1 (2011), 213--246. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Josef Sivic and Andrew Zisserman. 2003. Video google: A text retrieval approach to object matching in videos. In Proc. of ICCV. IEEE, 1470--1477. Google ScholarGoogle ScholarCross RefCross Ref
  41. Anna Cinzia Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2014. Analyzing images? Privacy for the modern web. In Proceedings of the 25th ACM Conference on Hypertext and Social Media. ACM, 136--147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, and Joshua Wede. 2011. A3P: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia. ACM, 261--270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Xiaoshuai Sun, Hongxun Yao, Rongrong Ji, and Shaohui Liu. 2009. Photo assessment based on computational visual attention model. In Proceedings of the 17th ACM International Conference on Multimedia (MM’09). ACM, New York, NY, 541--544. DOI:http://dx.doi.org/10.1145/1631272.1631351 Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. H. Sundaram, L. Xie, M. De Choudhury, Y. R. Lin, and A. Natsev. 2012. Multimedia semantics: Interactions between content and community. Proc. IEEE 100, 9 (2012), 2737--2758. Google ScholarGoogle ScholarCross RefCross Ref
  45. Aditya Vailaya, Anil Jain, and Hong Jiang Zhang. 1998. On image classification: City images vs. landscapes. Pattern Recogn. 31, 12 (1998), 1921--1935. Google ScholarGoogle ScholarCross RefCross Ref
  46. Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng Chang, and Danfeng Yao. 2009. Towards automatic privacy management in web 2.0 with semantic analysis on annotations. In CollaborateCom. 1--10.Google ScholarGoogle Scholar
  47. Chong Wang, David M. Blei, and Fei-Fei Li. 2009. Simultaneous image classification and annotation. In Proceedings of the Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’09). IEEE, 1903--1910.Google ScholarGoogle Scholar
  48. Haitao Xu, Haining Wang, and Angelos Stavrou. 2015. Privacy risk assessment on online photos. In Research in Attacks, Intrusions, and Defenses. Springer, 427--447. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Jun Yang, Yu-Gang Jiang, Alexander G. Hauptmann, and Chong-Wah Ngo. 2007. Evaluating bag-of-visual-words representations in scene classification. In Proc. of ACM Workshop on Multimedia Information Retrieval. ACM, 197--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Che-Hua Yeh, Yuan-Chen Ho, Brian A. Barsky, and Ming Ouhyoung. 2010. Personalized photograph ranking and selection system. In Proceedings of the International Conference on Multimedia (MM’10). ACM, New York, NY, 211--220. DOI:http://dx.doi.org/10.1145/1873951.1873963 Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. C. M. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt. 2009. Providing access control to online photo albums based on tags and linked data. Social Semantic Web: Where Web 2 (2009).Google ScholarGoogle Scholar
  52. Jie Yu, Xin Jin, Jiawei Han, and Jiebo Luo. 2010. Social group suggestion from user image collections. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, NY, 1215--1216. DOI:http://dx.doi.org/10.1145/1772690.1772881 Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. J. Yu, D. Joshi, and J. Luo. 2009. Connecting people in photo-sharing sites by photo content and user annotations. In Proceedings of the 2009 IEEE International Conference on Multimedia and Expo (ICME’09). IEEE, 1464--1467. Google ScholarGoogle ScholarCross RefCross Ref
  54. Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, and Elena Demidova. 2012. Privacy-aware image classification and search. In Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’12). ACM, New York, NY, 35--44. http://doi.acm.org/10.1145/2348283.2348292 Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Nan Zheng, Qiudan Li, Shengcai Liao, and Leiming Zhang. 2010. Which photo groups should I choose? A comparative study of recommendation algorithms in flickr. J. Inf. Sci. 36 (Dec. 2010), 733--750. Issue 6.Google ScholarGoogle Scholar
  56. Jinfeng Zhuang and Steven C. H. Hoi. 2010. Non-parametric kernel ranking approach for social image retrieval. In Proceedings of the ACM International Conference on Image and Video Retrieval (CIVR’10). ACM, New York, NY, 26--33. DOI:http://dx.doi.org/10.1145/1816041.1816047 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Toward Automated Online Photo Privacy

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on the Web
      ACM Transactions on the Web  Volume 11, Issue 1
      February 2017
      203 pages
      ISSN:1559-1131
      EISSN:1559-114X
      DOI:10.1145/3062397
      Issue’s Table of Contents

      Copyright © 2017 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 April 2017
      • Accepted: 1 October 2016
      • Revised: 1 September 2016
      • Received: 1 May 2015
      Published in tweb Volume 11, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!