Abstract
Images today are increasingly shared online on social networking sites such as Facebook, Flickr, and Instagram. Image sharing occurs not only within a group of friends but also more and more outside a user’s social circles for purposes of social discovery. Despite that current social networking sites allow users to change their privacy preferences, this is often a cumbersome task for the vast majority of users on the Web, who face difficulties in assigning and managing privacy settings. When these privacy settings are used inappropriately, online image sharing can potentially lead to unwanted disclosures and privacy violations. Thus, automatically predicting images’ privacy to warn users about private or sensitive content before uploading these images on social networking sites has become a necessity in our current interconnected world.
In this article, we explore learning models to automatically predict appropriate images’ privacy as private or public using carefully identified image-specific features. We study deep visual semantic features that are derived from various layers of Convolutional Neural Networks (CNNs) as well as textual features such as user tags and deep tags generated from deep CNNs. Particularly, we extract deep (visual and tag) features from four pre-trained CNN architectures for object recognition, i.e., AlexNet, GoogLeNet, VGG-16, and ResNet, and compare their performance for image privacy prediction. The results of our experiments obtained on a Flickr dataset of 32,000 images show that ResNet yeilds the best results for this task among all four networks. We also fine-tune the pre-trained CNN architectures on our privacy dataset and compare their performance with the models trained on pre-trained features. The results show that even though the overall performance obtained using the fine-tuned networks is comparable to that of pre-trained networks, the fine-tuned networks provide an improved performance for the private class. The results also show that the learning models trained on features extracted from ResNet outperform the state-of-the-art models for image privacy prediction. We further investigate the combination of user tags and deep tags derived from CNN architectures using two settings: (1) Support Vector Machines trained on the bag-of-tags features and (2) text-based CNN. We compare these models with the models trained on ResNet visual features and show that, even though the models trained on the visual features perform better than those trained on the tag features, the combination of deep visual features with image tags shows improvements in performance over the individual feature sets. We also compare our models with prior privacy prediction approaches and show that for private class, we achieve an improvement of ≈ 10% over prior CNN-based privacy prediction approaches. Our code, features, and the dataset used in experiments are available at https://github.com/ashwinitonge/deepprivate.git.
- Fabeah Adu-Oppong, Casey K. Gardiner, Apu Kapadia, and Patrick P. Tsang. 2008. Social circles: Tackling privacy in social networks. In Proceedings of the Symposium on Usable Privacy andSecurity (SOUPS’08).Google Scholar
- Shane Ahern, Dean Eckles, Nathaniel S. Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the Special Interest Group on Computer–Human Interaction Conference (CHI’07). ACM, New York, NY, 357--366.Google Scholar
Digital Library
- Emilia Apostolova and Dina Demner-Fushman. 2009. Towards automatic image region annotation - image region textual coreference resolution. In Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics, Companion Volume: Short Papers. Association for Computational Linguistics, 41--44.Google Scholar
- Arjun Baokar. 2016. A contextually-aware, privacy-preserving android permission model. In Technical Report No. UCB/EECS-2016-69, University of California, Berkeley.Google Scholar
- Yoshua Bengio. 2012. Deep learning of representations for unsupervised and transfer learning. In Proceedings of the International Conference on Machine Learning (ICML’12) , Isabelle Guyon, Gideon Dror, Vincent Lemaire, Graham W. Taylor, and Daniel L. Silver (Eds.), Vol. 27, 17--36.Google Scholar
- Andrew Besmer and Heather Lipford. 2009. Tagged photos: Concerns, perceptions, and protections. In Proceedings of the Special Interest Group on Computer--Human Interaction Conference (CHI’09). ACM, New York, NY, 4585--4590.Google Scholar
Digital Library
- Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Maria Gazaki, and Jean-Pierre Hubaux. 2016. A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Perv. Mobile Comput. 25 (2016), 125--142. https://doi.org/10.1016/j.pmcj.2015.01.006Google Scholar
Digital Library
- Kerstin Bischoff, Claudiu S. Firan, Wolfgang Nejdl, and Raluca Paiu. 2008. Can all tags be used for search? In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM’08). ACM, New York, NY, 193--202.Google Scholar
Digital Library
- Joseph Bonneau, Jonathan Anderson, and Luke Church. 2009a. Privacy suites: Shared privacy for social networks. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS’09). ACM, New York, NY.Google Scholar
Digital Library
- Joseph Bonneau, Jonathan Anderson, and George Danezis. 2009b. Prying data out of a social network. In Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining (ASONAM’09). IEEE Computer Society, Washington, DC, 249--254.Google Scholar
Digital Library
- Daniel Buschek, Moritz Bader, Emanuel von Zezschwitz, and Alexander De Luca. 2015. Automatic privacy classification of personal photos. In Proceedings of the Conference on Human Computer Interaction (INTERACT’15), Julio Abascal, Simone Barbosa, Mirko Fetter, Tom Gross, Philippe Palanque, and Marco Winckler (Eds.). Vol. 9297. 428--435.Google Scholar
Cross Ref
- Jaeyoung Choi, Martha Larson, Xinchao Li, Kevin Li, Gerald Friedland, and Alan Hanjalic. 2017. The geo-privacy bonus of popular photo enhancements. In Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval (ICMR’17). ACM, New York, NY, 84--92. DOI:https://doi.org/10.1145/3078971.3080543Google Scholar
Digital Library
- Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, and Michaela Kauer. 2013. Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications. Inf. Secur. Tech. Rep. 17, 3 (Feb. 2013), 105--116.Google Scholar
Digital Library
- Ronan Collobert, Jason Weston, Léon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. 2011. Natural language processing (almost) from scratch. J. Mach. Learn. Res. 12 (Nov. 2011), 2493--2537.Google Scholar
Digital Library
- George Danezis. 2009. Inferring privacy policies for social networking services. In Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence (AISec’09). ACM, New York, NY, 5--10. DOI:https://doi.org/10.1145/1654988.1654991Google Scholar
Digital Library
- Munmun De Choudhury, Hari Sundaram, Yu-Ru Lin, Ajita John, and Doree Duncan Seligmann. 2009. Connecting content to community in social media via image content, user tags and user communication. In Proceedings of the 2009 IEEE International Conference on Multimedia and Expo (ICME’09). IEEE Press, Piscataway, NJ, 1238--1241.Google Scholar
Cross Ref
- Jeff Donahue, Yangqing Jia, Oriol Vinyals, Judy Hoffman, Ning Zhang, Eric Tzeng, and Trevor Darrell. 2013. DeCAF: A deep convolutional activation feature for generic visual recognition. CoRR abs/1310.1531 (2013).Google Scholar
- F. Dufaux and T. Ebrahimi. 2008. Scrambling for privacy protection in video surveillance systems. IEEE Trans. Circ. Sys. Vid. Technol. 18, 8 (Aug. 2008), 1168--1174. DOI:https://doi.org/10.1109/TCSVT.2008.928225Google Scholar
Digital Library
- Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, NY, 351--360.Google Scholar
Digital Library
- Clement Farabet, Camille Couprie, Laurent Najman, and Yann LeCun. 2013. Learning hierarchical features for scene labeling. IEEE Trans. Pattern Anal. Mach. Intell. 35, 8 (2013), 1915--1929.Google Scholar
Digital Library
- Drew Fisher, Leah Dorner, and David Wagner. 2012. Short paper: Location privacy: User behavior in the field. In Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM’12). ACM, New York, NY, 51--56. DOI:https://doi.org/10.1145/2381934.2381945Google Scholar
Digital Library
- Julien Freudiger, Reza Shokri, and Jean-Pierre Hubaux. 2012. Evaluating the privacy risk of location-based services. In Financial Cryptography and Data Security, George Danezis (Ed.). Springer, Berlin, 31--46.Google Scholar
- Gerald Friedland and Robin Sommer. 2010. Cybercasing the joint: On the privacy implications of geo-tagging. In Proceedings of the USENIX Summit on Hot Topeics in Security (HotSec’10). USENIX Association.Google Scholar
- Yue Gao, Meng Wang, Huanbo Luan, Jialie Shen, Shuicheng Yan, and Dacheng Tao. 2011. Tag-based social image search with visual-text joint hypergraph learning. In Proceedings of the 19th ACM International Conference on Multimedia (MM’11). ACM, New York, NY, 1517--1520. DOI:https://doi.org/10.1145/2072298.2072054Google Scholar
Digital Library
- Kambiz Ghazinour, Stan Matwin, and Marina Sokolova. 2013. Monitoring and recommending privacy settings in social networks. In Proceedings of the Joint EDBT/ICDT 2013 Workshops (EDBT’13). ACM, New York, NY, 164--168.Google Scholar
Digital Library
- Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. 71--80.Google Scholar
Digital Library
- Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016a. Deep residual learning for image recognition. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 770--778.Google Scholar
Cross Ref
- Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016b. Identity mappings in deep residual networks. In Proceedings of the European Conference on Computer Vision (ECCV’16).Google Scholar
Cross Ref
- Benjamin Henne, Christian Szongott, and Matthew Smith. 2013. SnapMe if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In Proceedings of the ACM Conference on Wireless Network Security (WiSec’13). 12. DOI:https://doi.org/10.1145/2462096.2462113Google Scholar
Digital Library
- Livia Hollenstein and Ross Purves. 2010. Exploring place through user-generated content: Using Flickr tags to describe city cores. J. Spatial Inf. Sci. 1, 1 (2010), 21--48. DOI:https://doi.org/10.5311/JOSIS.2010.1.3Google Scholar
- D. Hu, F. Chen, X. Wu, and Z. Zhao. 2016. A framework of privacy decision recommendation for image sharing in online social networks. In Proceedings of the 2016 IEEE 1st International Conference on Data Science in Cyberspace (DSC’16). 243--251.Google Scholar
- Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, New York, NY, 781--792. DOI:https://doi.org/10.1145/2810103.2813603Google Scholar
Digital Library
- Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. 2014. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the ACM International Conference on Multimedia. 675--678.Google Scholar
Digital Library
- Simon Jones and Eamonn O’Neill. 2011. Contextual dynamics of group-based sharing decisions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’11). ACM, 1777--1786.Google Scholar
Digital Library
- James B. D. Joshi and Tao Zhang (Eds.). 2009. Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’09). ICST/IEEE.Google Scholar
- Nal Kalchbrenner, Edward Grefenstette, and Phil Blunsom. 2014. A convolutional neural network for modelling sentences. CoRR abs/1404.2188 (2014).Google Scholar
- Berkant Kepez and Pinar Yolum. 2016. Learning privacy rules cooperatively in online social networks. In Proceedings of the 1st International Workshop on AI for Privacy and Security (PrAISe’16). ACM, New York, NY, Article 3, 4 pages.Google Scholar
Digital Library
- Yoon Kim. 2014. Convolutional neural networks for sentence classification. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP’14). ACL, 1746--1751.Google Scholar
Cross Ref
- Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael K. Reiter. 2012. Tag, you can see it! Using tags for access control in photo sharing. In Proceedings of the Conference on Human Factors in Computing Systems (CHI’12). ACM.Google Scholar
- Balachander Krishnamurthy and Craig E. Wills. 2008. Characterizing privacy in online social networks. In Proceedings of the 1st Workshop on Online Social Networks (WOSN’08). ACM, New York, NY, 37--42.Google Scholar
- Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 1097--1105.Google Scholar
Digital Library
- Zhenzhong Kuang, Zongmin Li, Dan Lin, and Jianping Fan. 2017. Automatic privacy prediction to accelerate social image sharing. In Proceedings of the 3rd IEEE International Conference on Multimedia Big Data (BigMM’17). 197--200. DOI:https://doi.org/10.1109/BigMM.2017.70Google Scholar
Cross Ref
- Abdurrahman Can Kurtan and Pinar Yolum. 2018. PELTE: Privacy estimation of images from tags. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS’18). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 1989--1991.Google Scholar
Digital Library
- Benjamin Laxton, Kai Wang, and Stefan Savage. 2008. Reconsidering physical key secrecy: Teleduplication via optical decoding. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS’08). ACM, 469--478.Google Scholar
Digital Library
- Quoc V. Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In Proceedings of the International Conference on Machine Learning (ICML’14) (JMLR Workshop and Conference Proceedings), Vol. 32. 1188--1196.Google Scholar
- Yann LeCun. 2017. Facebook Envisions AI That Keeps You From Uploading Embarrassing Pics. Retrieved April 12, 2017 from https://www.wired.com/2014/12/fb/all/1.Google Scholar
- Yifang Li, Wyatt Troutman, Bart P. Knijnenburg, and Kelly Caine. 2018. Human perceptions of sensitive content in photos. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18) Workshops.Google Scholar
Cross Ref
- Heather Richter Lipford, Andrew Besmer, and Jason Watson. 2008. Understanding privacy settings in facebook with an audience view. In Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSEC’08). 2:1--2:8.Google Scholar
Digital Library
- David G. Lowe. 2004. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 2 (Nov. 2004), 91--110.Google Scholar
Digital Library
- Mary Madden. 2012. Privacy Management on Social Media Sites. Retrieved November 12, 2017 from http://www.pewinternet.org/2012/02/24/privacy-management-on-social-media-sites.Google Scholar
- Mohammad Mannan and Paul C. van Oorschot. 2008. Privacy-enhanced sharing of personal content on the web. In Proceedings of the 17th International Conference on World Wide Web. 487--496.Google Scholar
- Erika McCallister, Timothy Grance, and Karen A. Scarfone. 2010. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Technical Report. Gaithersburg, MD.Google Scholar
Digital Library
- Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2011. Automatic generation of privacy-protected videos using background estimation. In Proceedings of the 2011 IEEE International Conference on Multimedia and Expo (ICME’11). 1--6. DOI:https://doi.org/10.1109/ICME.2011.6011955Google Scholar
Digital Library
- Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2012. Intended human object detection for automatically protecting privacy in mobile video surveillance. Multimedia Syst. 18, 2 (2012), 157--173. DOI:https://doi.org/10.1007/s00530-011-0244-yGoogle Scholar
Cross Ref
- Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2016. Privacy protection for social video via background estimation and CRF-based videographer’s intention modeling. IEICE Trans. 99-D, 4 (2016), 1221--1233.Google Scholar
- Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford, CA.Google Scholar
Digital Library
- Katarzyna Olejnik, Italo Dacosta, Joana Soares Machado, Kévin Huguenin, Mohammad Emtiyaz Khan, and Jean-Pierre Hubaux. 2017. SmarPer: Context-aware and automatic runtime-permissions for mobile devices. In Proceedings of the 38th IEEE Symposium on Security and Privacy (S8P). IEEE, 1058--1076. DOI:https://doi.org/10.1109/SP.2017.25Google Scholar
Cross Ref
- Aude Oliva and Antonio Torralba. 2001. Modeling the shape of the scene: A holistic representation of the spatial envelope. Int. J. Comput. Vis. 42, 3 (May 2001), 145--175.Google Scholar
Digital Library
- Tribhuvanesh Orekondy, Mario Fritz, and Bernt Schiele. 2018. Connecting pixels to privacy and utility: Automatic redaction of private information in images. In Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR’18).Google Scholar
Cross Ref
- Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2017. Towards a visual privacy advisor: Understanding and predicting privacy risks in images. In Proceedings of the IEEE International Conference on Computer Vision (ICCV’17). 3706--3715.Google Scholar
Cross Ref
- J. Parra-Arnau, A. Perego, E. Ferrari, J. Forné, and D. Rebollo-Monedero. 2014. Privacy-preserving enhanced collaborative tagging. IEEE Trans. Knowl. Data Eng. 26, 1 (Jan. 2014), 180--193.Google Scholar
Digital Library
- Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné, Jose L. Muñoz, and Oscar Esparza. 2012. Optimal tag suppression for privacy protection in the semantic Web. Data Knowl. Eng. 81--82 (2012), 46--66. https://doi.org/10.1016/j.datak.2012.07.004Google Scholar
- João Paulo Pesce, Diego Las Casas, Gustavo Rauber, and Virgílio Almeida. 2012. Privacy attacks in social media using photo tagging networks: A case study with facebook. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM’12). ACM, New York, NY.Google Scholar
Digital Library
- Georgios Petkos, Symeon Papadopoulos, and Yiannis Kompatsiaris. 2015. Social circle discovery in ego-networks by mining the latent structure of user connections and profile attributes. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 (ASONAM’15). ACM, New York, NY, 880--887.Google Scholar
Digital Library
- Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward privacy-preserving photo sharing. In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI’13). USENIX Association, Berkeley, CA, 515--528. http://dl.acm.org/citation.cfm?id=2482626.2482675Google Scholar
Digital Library
- Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, and Norman M. Sadeh. 2009. Capturing Social Networking Privacy Preferences. Springer, Berlin, 1--18.Google Scholar
- Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. 2015. ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115, 3 (2015), 211--252. https://doi.org/10.1007/s11263-015-0816-yGoogle Scholar
Digital Library
- Pierre Sermanet, David Eigen, Xiang Zhang, Michael Mathieu, Rob Fergus, and Yann LeCun. 2014. OverFeat: Integrated recognition, localization and detection using convolutional networks. In Proceedings of the International Conference on Learning Representations (ICLR’14). CBLS.Google Scholar
- Pierre Sermanet, Koray Kavukcuoglu, Soumith Chintala, and Yann Lecun. 2013. Pedestrian detection with unsupervised multi-stage feature learning. In Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition. 3626--3633.Google Scholar
Digital Library
- S. Shamma and M. Y. S. Uddin. 2014. Towards privacy-aware photo sharing using mobile phones. In Proceedings of the 8th International Conference on Electrical and Computer Engineering. 449--452. DOI:https://doi.org/10.1109/ICECE.2014.7026919Google Scholar
Cross Ref
- Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. 2011. Quantifying location privacy. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 247--262.Google Scholar
Digital Library
- Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. CoRR abs/1409.1556 (2014).Google Scholar
- Andrew Simpson. 2008. On the need for user-defined fine-grained access control policies for social networking applications. In Proceedings of the Workshop on Security in Opportunistic and Social Networks (SOSOC’08). ACM, New York. DOI:https://doi.org/10.1145/1461469.1461470Google Scholar
Digital Library
- Eleftherios Spyromitros-Xioufis, Symeon Papadopoulos, Adrian Popescu, and Yiannis Kompatsiaris. 2016. Personalized privacy-aware image classification. In Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval (ICMR’16). ACM, New York, NY, 71--78.Google Scholar
Digital Library
- Anna Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2014. Analyzing images’ privacy for the modern web. In Proceedings of the 25th ACM Conference on Hypertext and Social Media (HT’14). ACM, New York, NY, 136--147.Google Scholar
Digital Library
- Anna Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2017a. Toward automated online photo privacy. ACM Trans. Web 11, 1, Article 2 (Apr. 2017), 29 pages.Google Scholar
Digital Library
- Anna Squicciarini, D. Lin, S. Karumanchi, and N. DeSisto. 2012. Automatic social group organization and privacy management. In Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’12). 89--96.Google Scholar
- Anna Squicciarini, Dan Lin, Smitha Sundareswaran, and Joshua Wede. 2015. Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans. Knowl. Data Eng. 27, 1 (2015), 193--206.Google Scholar
Cross Ref
- Anna Squicciarini, Andrea Novelli, Dan Lin, Cornelia Caragea, and Haoti Zhong. 2017b. From tag to protect: A tag-driven PolicyRecommender system for image sharing. In Proceedings of the International Conference on Privacy, Security and Trust (PST’17).Google Scholar
Cross Ref
- Anna Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, New York, NY, 521--530.Google Scholar
Digital Library
- H. Sundaram, L. Xie, M. De Choudhury, Y. R. Lin, and A. Natsev. 2012. Multimedia semantics: Interactions between content and community. Proc. IEEE 100, 9 (2012), 2737--2758.Google Scholar
Cross Ref
- Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2014. Going deeper with convolutions. CoRR abs/1409.4842 (2014).Google Scholar
- Monika Taddicken. 2014. The ’privacy paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. J. Comp.-Med. Commun. 19, 2 (Jan. 2014), 248--273. DOI:https://doi.org/10.1111/jcc4.12052Google Scholar
- Jinhui Tang, Shuicheng Yan, Richang Hong, Guo-Jun Qi, and Tat-Seng Chua. 2009. Inferring semantic concepts from community-contributed images and noisy tags. In Proceedings of the 17th ACM International Conference on Multimedia (MM’09). ACM, New York, NY, 223--232. DOI:https://doi.org/10.1145/1631272.1631305Google Scholar
Digital Library
- Eran Toch. 2014. Crowdsourcing privacy preferences in context-aware applications. Pers. Ubiq. Comput. 18, 1 (Jan. 2014), 129--141. DOI:https://doi.org/10.1007/s00779-012-0632-0Google Scholar
Digital Library
- Ashwini Tonge and Cornelia Caragea. 2016. Image privacy prediction using deep features. In Proceedings of the 30th AAAI Conference on Artificial Intelligence 4266--4267.Google Scholar
- Ashwini Tonge and Cornelia Caragea. 2018. On the use of “Deep” features for online image sharing. In The Web Conference Companion.Google Scholar
- Ashwini Tonge, Cornelia Caragea, and Anna Squicciarini. 2018a. Privacy-aware tag recommendation for image sharing. In Proceedings of the 29th Conference on Hypertext and Social Media (HT’18). ACM, New York, NY, 52--56.Google Scholar
Digital Library
- Ashwini Tonge, Cornelia Caragea, and Anna Squicciarini. 2018b. Uncovering scene context for predicting privacy of online shared images. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18).Google Scholar
- Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI’16). 1317--1323.Google Scholar
- Paul Viola and Michael Jones. 2002. Robust real-time object detection. International Journal of Computer Vision 57, 2 (2002), 137--154.Google Scholar
Digital Library
- Emanuel von Zezschwitz, Sigrid Ebbinghaus, Heinrich Hussmann, and Alexander De Luca. 2016. You can’t watch this!: Privacy-respectful photo browsing on smartphones. In Proceedings of the 2016 Conference on Human Factors in Computing Systems (CHI’16). ACM, New York, NY, 4320--4324. DOI:https://doi.org/10.1145/2858036.2858120Google Scholar
Digital Library
- Nitya Vyas, Anna Squicciarini, Chih-Cheng Chang, and Danfeng Yao. 2009. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. In Proceedings of the International Conference on Collaborative Computing (CollaborateCom’09). 1--10.Google Scholar
Cross Ref
- Susan Waters and James Ackerman. 2011. Exploring privacy management on facebook: Motivations and perceived consequences of voluntary disclosure. J. Comput.-Med. Commun. 17, 1 (2011), 101--115.Google Scholar
Cross Ref
- Jason Watson, Heather Richter Lipford, and Andrew Besmer. 2015. Mapping user preference to privacy default settings. ACM Trans. Comput.-Hum. Interact. 22, 6, Article 32 (Nov. 2015), 20 pages. DOI:https://doi.org/10.1145/2811257Google Scholar
Digital Library
- Zhenyu Wu, Zhangyang Wang, Zhaowen Wang, and Hailin Jin. 2018. Towards privacy-preserving visual recognition via adversarial training: A pilot study. In Proceedings of the European Conference on Computer Vision (ECCV’18), Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss (Eds.), Lecture Notes in Computer Science,Vol. 11220. Springer, 627--645. DOI:https://doi.org/10.1007/978-3-030-01270-0_37Google Scholar
Cross Ref
- Haitao Xu, Haining Wang, and Angelos Stavrou. 2015. Privacy risk assessment on online photos. In Proceedings of the Conference on Robotics, Artificial Intelligence, Internet of Things 8 Data (RAID’15), Herbert Bos, Fabian Monrose, and Gregory Blanc (Eds.), Vol. 9404. 427--447.Google Scholar
Digital Library
- Ching Man Au Yeung, Lalana Kagal, Nicholas Gibbins, and Nigel Shadbolt. 2009. Providing access control to online photo albums based on tags and linked data. In AAAI Spring Symposium on Social Semantic Web: Where Web 2.0 Meets Web 3.0. https://eprints.soton.ac.uk/267203/.Google Scholar
- Wen-tau Yih, Xiaodong He, and Christopher Meek. 2014. Semantic parsing for single-relation question answering. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). Association for Computational Linguistics, Baltimore, MD, 643--648.Google Scholar
- Jun Yu, Zhenzhong Kuang, Zhou Yu, Dan Lin, and Jianping Fan. 2017a. Privacy setting recommendation for image sharing. In Proceedings of the 16th IEEE International Conference on Machine Learning and Applications (ICMLA’17). 726--730. DOI:https://doi.org/10.1109/ICMLA.2017.00-73Google Scholar
Cross Ref
- Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE Trans. Inf. Forens. Secur. 13, 5 (2018), 1317--1332. DOI:https://doi.org/10.1109/TIFS.2017.2787986Google Scholar
Digital Library
- Jun Yu, Baopeng Zhang, Zhengzhong Kuang, Dan Lin, and Jianping Fan. 2017b. iPrivacy: Image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans. Inf. Forens. Secur. 12, 5 (2017), 1005--1016.Google Scholar
Digital Library
- Lin Yuan, Joel Regis Theytaz, and Touradj Ebrahimi. 2017. Context-dependent privacy-aware photo sharing based on machine learning. Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC’17).Google Scholar
Cross Ref
- X. Yuan, X. Wang, C. Wang, Anna Squicciarini, and K. Ren. 2018. Towards privacy-preserving and practical image-centric social discovery. IEEE Trans. Depend. Sec. Comput. 15, 5 (Sep. 2018), 868--882.Google Scholar
Cross Ref
- Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, and Elena Demidova. 2012b. Privacy-aware image classification and search. In Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, New York, NY.Google Scholar
Digital Library
- Sergej Zerr, Stefan Siersdorfer, and Jonathon S. Hare. 2012a. PicAlert!: A system for privacy-aware image classification and retrieval. In Proceedings of the Conference on Information and Knowledge Management (CIKM’12), Xue wen Chen, Guy Lebanon, Haixun Wang, and Mohammed J. Zaki (Eds.). ACM, 2710--2712.Google Scholar
- Wei Zhang, S. S. Cheung, and Minghua Chen. 2005. Hiding privacy information in video surveillance system. In Proceedings of the IEEE International Conference on Image Processing 2005, Vol. 3. II--868. DOI:https://doi.org/10.1109/ICIP.2005.1530530Google Scholar
Cross Ref
- Yuchen Zhao, Juan Ye, and Tristan Henderson. 2014. Privacy-aware location privacy preference recommendations. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS’14). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Brussels, Belgium, 120--129. DOI:https://doi.org/10.4108/icst.mobiquitous.2014.258017Google Scholar
Digital Library
- Elena Zheleva and Lise Getoor. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). 531--540.Google Scholar
Digital Library
- Haoti Zhong, Anna Squicciarini, and David Miller. 2018. Toward automated multiparty privacy conflict detection. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM’18). ACM, New York, NY, 1811--1814. DOI:https://doi.org/10.1145/3269206.3269329Google Scholar
Digital Library
- Haoti Zhong, Anna Squicciarini, David Miller, and Cornelia Caragea. 2017. A group-based personalized model for image privacy classification and labeling. In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI’17). 3952--3958.Google Scholar
Cross Ref
Index Terms
Image Privacy Prediction Using Deep Neural Networks
Recommendations
Dynamic Deep Multi-modal Fusion for Image Privacy Prediction
WWW '19: The World Wide Web ConferenceWith millions of images that are shared online on social networking sites, effective methods for image privacy prediction are highly needed. In this paper, we propose an approach for fusing object, scene context, and image tags modalities derived from ...
Privacy-aware Tag Recommendation for Accurate Image Privacy Prediction
Survey Papers and Regular PapersOnline images’ tags are very important for indexing, sharing, and searching of images, as well as surfacing images with private or sensitive content, which needs to be protected. Social media sites such as Flickr generate these metadata from user-...
On the Use of "Deep" Features for Online Image Sharing
WWW '18: Companion Proceedings of the The Web Conference 2018Online image sharing in social networking sites such as Facebook, Flickr, and Instagram can lead to unwanted disclosure and privacy violations, when privacy settings are used inappropriately. Despite that social networking sites allow users to set their ...






Comments