Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Open access

Image Privacy Prediction Using Deep Neural Networks

Published: 09 April 2020 Publication History

Abstract

Images today are increasingly shared online on social networking sites such as Facebook, Flickr, and Instagram. Image sharing occurs not only within a group of friends but also more and more outside a user’s social circles for purposes of social discovery. Despite that current social networking sites allow users to change their privacy preferences, this is often a cumbersome task for the vast majority of users on the Web, who face difficulties in assigning and managing privacy settings. When these privacy settings are used inappropriately, online image sharing can potentially lead to unwanted disclosures and privacy violations. Thus, automatically predicting images’ privacy to warn users about private or sensitive content before uploading these images on social networking sites has become a necessity in our current interconnected world.
In this article, we explore learning models to automatically predict appropriate images’ privacy as private or public using carefully identified image-specific features. We study deep visual semantic features that are derived from various layers of Convolutional Neural Networks (CNNs) as well as textual features such as user tags and deep tags generated from deep CNNs. Particularly, we extract deep (visual and tag) features from four pre-trained CNN architectures for object recognition, i.e., AlexNet, GoogLeNet, VGG-16, and ResNet, and compare their performance for image privacy prediction. The results of our experiments obtained on a Flickr dataset of 32,000 images show that ResNet yeilds the best results for this task among all four networks. We also fine-tune the pre-trained CNN architectures on our privacy dataset and compare their performance with the models trained on pre-trained features. The results show that even though the overall performance obtained using the fine-tuned networks is comparable to that of pre-trained networks, the fine-tuned networks provide an improved performance for the private class. The results also show that the learning models trained on features extracted from ResNet outperform the state-of-the-art models for image privacy prediction. We further investigate the combination of user tags and deep tags derived from CNN architectures using two settings: (1) Support Vector Machines trained on the bag-of-tags features and (2) text-based CNN. We compare these models with the models trained on ResNet visual features and show that, even though the models trained on the visual features perform better than those trained on the tag features, the combination of deep visual features with image tags shows improvements in performance over the individual feature sets. We also compare our models with prior privacy prediction approaches and show that for private class, we achieve an improvement of ≈ 10% over prior CNN-based privacy prediction approaches. Our code, features, and the dataset used in experiments are available at https://github.com/ashwinitonge/deepprivate.git.

References

[1]
Fabeah Adu-Oppong, Casey K. Gardiner, Apu Kapadia, and Patrick P. Tsang. 2008. Social circles: Tackling privacy in social networks. In Proceedings of the Symposium on Usable Privacy andSecurity (SOUPS’08).
[2]
Shane Ahern, Dean Eckles, Nathaniel S. Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the Special Interest Group on Computer–Human Interaction Conference (CHI’07). ACM, New York, NY, 357--366.
[3]
Emilia Apostolova and Dina Demner-Fushman. 2009. Towards automatic image region annotation - image region textual coreference resolution. In Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics, Companion Volume: Short Papers. Association for Computational Linguistics, 41--44.
[4]
Arjun Baokar. 2016. A contextually-aware, privacy-preserving android permission model. In Technical Report No. UCB/EECS-2016-69, University of California, Berkeley.
[5]
Yoshua Bengio. 2012. Deep learning of representations for unsupervised and transfer learning. In Proceedings of the International Conference on Machine Learning (ICML’12), Isabelle Guyon, Gideon Dror, Vincent Lemaire, Graham W. Taylor, and Daniel L. Silver (Eds.), Vol. 27, 17--36.
[6]
Andrew Besmer and Heather Lipford. 2009. Tagged photos: Concerns, perceptions, and protections. In Proceedings of the Special Interest Group on Computer--Human Interaction Conference (CHI’09). ACM, New York, NY, 4585--4590.
[7]
Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Maria Gazaki, and Jean-Pierre Hubaux. 2016. A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Perv. Mobile Comput. 25 (2016), 125--142. https://doi.org/10.1016/j.pmcj.2015.01.006
[8]
Kerstin Bischoff, Claudiu S. Firan, Wolfgang Nejdl, and Raluca Paiu. 2008. Can all tags be used for search? In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM’08). ACM, New York, NY, 193--202.
[9]
Joseph Bonneau, Jonathan Anderson, and Luke Church. 2009a. Privacy suites: Shared privacy for social networks. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS’09). ACM, New York, NY.
[10]
Joseph Bonneau, Jonathan Anderson, and George Danezis. 2009b. Prying data out of a social network. In Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining (ASONAM’09). IEEE Computer Society, Washington, DC, 249--254.
[11]
Daniel Buschek, Moritz Bader, Emanuel von Zezschwitz, and Alexander De Luca. 2015. Automatic privacy classification of personal photos. In Proceedings of the Conference on Human Computer Interaction (INTERACT’15), Julio Abascal, Simone Barbosa, Mirko Fetter, Tom Gross, Philippe Palanque, and Marco Winckler (Eds.). Vol. 9297. 428--435.
[12]
Jaeyoung Choi, Martha Larson, Xinchao Li, Kevin Li, Gerald Friedland, and Alan Hanjalic. 2017. The geo-privacy bonus of popular photo enhancements. In Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval (ICMR’17). ACM, New York, NY, 84--92.
[13]
Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, and Michaela Kauer. 2013. Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications. Inf. Secur. Tech. Rep. 17, 3 (Feb. 2013), 105--116.
[14]
Ronan Collobert, Jason Weston, Léon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. 2011. Natural language processing (almost) from scratch. J. Mach. Learn. Res. 12 (Nov. 2011), 2493--2537.
[15]
George Danezis. 2009. Inferring privacy policies for social networking services. In Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence (AISec’09). ACM, New York, NY, 5--10.
[16]
Munmun De Choudhury, Hari Sundaram, Yu-Ru Lin, Ajita John, and Doree Duncan Seligmann. 2009. Connecting content to community in social media via image content, user tags and user communication. In Proceedings of the 2009 IEEE International Conference on Multimedia and Expo (ICME’09). IEEE Press, Piscataway, NJ, 1238--1241.
[17]
Jeff Donahue, Yangqing Jia, Oriol Vinyals, Judy Hoffman, Ning Zhang, Eric Tzeng, and Trevor Darrell. 2013. DeCAF: A deep convolutional activation feature for generic visual recognition. CoRR abs/1310.1531 (2013).
[18]
F. Dufaux and T. Ebrahimi. 2008. Scrambling for privacy protection in video surveillance systems. IEEE Trans. Circ. Sys. Vid. Technol. 18, 8 (Aug. 2008), 1168--1174.
[19]
Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, NY, 351--360.
[20]
Clement Farabet, Camille Couprie, Laurent Najman, and Yann LeCun. 2013. Learning hierarchical features for scene labeling. IEEE Trans. Pattern Anal. Mach. Intell. 35, 8 (2013), 1915--1929.
[21]
Drew Fisher, Leah Dorner, and David Wagner. 2012. Short paper: Location privacy: User behavior in the field. In Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM’12). ACM, New York, NY, 51--56.
[22]
Julien Freudiger, Reza Shokri, and Jean-Pierre Hubaux. 2012. Evaluating the privacy risk of location-based services. In Financial Cryptography and Data Security, George Danezis (Ed.). Springer, Berlin, 31--46.
[23]
Gerald Friedland and Robin Sommer. 2010. Cybercasing the joint: On the privacy implications of geo-tagging. In Proceedings of the USENIX Summit on Hot Topeics in Security (HotSec’10). USENIX Association.
[24]
Yue Gao, Meng Wang, Huanbo Luan, Jialie Shen, Shuicheng Yan, and Dacheng Tao. 2011. Tag-based social image search with visual-text joint hypergraph learning. In Proceedings of the 19th ACM International Conference on Multimedia (MM’11). ACM, New York, NY, 1517--1520.
[25]
Kambiz Ghazinour, Stan Matwin, and Marina Sokolova. 2013. Monitoring and recommending privacy settings in social networks. In Proceedings of the Joint EDBT/ICDT 2013 Workshops (EDBT’13). ACM, New York, NY, 164--168.
[26]
Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. 71--80.
[27]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016a. Deep residual learning for image recognition. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 770--778.
[28]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016b. Identity mappings in deep residual networks. In Proceedings of the European Conference on Computer Vision (ECCV’16).
[29]
Benjamin Henne, Christian Szongott, and Matthew Smith. 2013. SnapMe if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In Proceedings of the ACM Conference on Wireless Network Security (WiSec’13). 12.
[30]
Livia Hollenstein and Ross Purves. 2010. Exploring place through user-generated content: Using Flickr tags to describe city cores. J. Spatial Inf. Sci. 1, 1 (2010), 21--48.
[31]
D. Hu, F. Chen, X. Wu, and Z. Zhao. 2016. A framework of privacy decision recommendation for image sharing in online social networks. In Proceedings of the 2016 IEEE 1st International Conference on Data Science in Cyberspace (DSC’16). 243--251.
[32]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, New York, NY, 781--792.
[33]
Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. 2014. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the ACM International Conference on Multimedia. 675--678.
[34]
Simon Jones and Eamonn O’Neill. 2011. Contextual dynamics of group-based sharing decisions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’11). ACM, 1777--1786.
[35]
James B. D. Joshi and Tao Zhang (Eds.). 2009. Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’09). ICST/IEEE.
[36]
Nal Kalchbrenner, Edward Grefenstette, and Phil Blunsom. 2014. A convolutional neural network for modelling sentences. CoRR abs/1404.2188 (2014).
[37]
Berkant Kepez and Pinar Yolum. 2016. Learning privacy rules cooperatively in online social networks. In Proceedings of the 1st International Workshop on AI for Privacy and Security (PrAISe’16). ACM, New York, NY, Article 3, 4 pages.
[38]
Yoon Kim. 2014. Convolutional neural networks for sentence classification. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP’14). ACL, 1746--1751.
[39]
Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael K. Reiter. 2012. Tag, you can see it! Using tags for access control in photo sharing. In Proceedings of the Conference on Human Factors in Computing Systems (CHI’12). ACM.
[40]
Balachander Krishnamurthy and Craig E. Wills. 2008. Characterizing privacy in online social networks. In Proceedings of the 1st Workshop on Online Social Networks (WOSN’08). ACM, New York, NY, 37--42.
[41]
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 1097--1105.
[42]
Zhenzhong Kuang, Zongmin Li, Dan Lin, and Jianping Fan. 2017. Automatic privacy prediction to accelerate social image sharing. In Proceedings of the 3rd IEEE International Conference on Multimedia Big Data (BigMM’17). 197--200.
[43]
Abdurrahman Can Kurtan and Pinar Yolum. 2018. PELTE: Privacy estimation of images from tags. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS’18). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 1989--1991.
[44]
Benjamin Laxton, Kai Wang, and Stefan Savage. 2008. Reconsidering physical key secrecy: Teleduplication via optical decoding. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS’08). ACM, 469--478.
[45]
Quoc V. Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In Proceedings of the International Conference on Machine Learning (ICML’14) (JMLR Workshop and Conference Proceedings), Vol. 32. 1188--1196.
[46]
Yann LeCun. 2017. Facebook Envisions AI That Keeps You From Uploading Embarrassing Pics. Retrieved April 12, 2017 from https://www.wired.com/2014/12/fb/all/1.
[47]
Yifang Li, Wyatt Troutman, Bart P. Knijnenburg, and Kelly Caine. 2018. Human perceptions of sensitive content in photos. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18) Workshops.
[48]
Heather Richter Lipford, Andrew Besmer, and Jason Watson. 2008. Understanding privacy settings in facebook with an audience view. In Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSEC’08). 2:1--2:8.
[49]
David G. Lowe. 2004. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 2 (Nov. 2004), 91--110.
[50]
Mary Madden. 2012. Privacy Management on Social Media Sites. Retrieved November 12, 2017 from http://www.pewinternet.org/2012/02/24/privacy-management-on-social-media-sites.
[51]
Mohammad Mannan and Paul C. van Oorschot. 2008. Privacy-enhanced sharing of personal content on the web. In Proceedings of the 17th International Conference on World Wide Web. 487--496.
[52]
Erika McCallister, Timothy Grance, and Karen A. Scarfone. 2010. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Technical Report. Gaithersburg, MD.
[53]
Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2011. Automatic generation of privacy-protected videos using background estimation. In Proceedings of the 2011 IEEE International Conference on Multimedia and Expo (ICME’11). 1--6.
[54]
Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2012. Intended human object detection for automatically protecting privacy in mobile video surveillance. Multimedia Syst. 18, 2 (2012), 157--173.
[55]
Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2016. Privacy protection for social video via background estimation and CRF-based videographer’s intention modeling. IEICE Trans. 99-D, 4 (2016), 1221--1233.
[56]
Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford, CA.
[57]
Katarzyna Olejnik, Italo Dacosta, Joana Soares Machado, Kévin Huguenin, Mohammad Emtiyaz Khan, and Jean-Pierre Hubaux. 2017. SmarPer: Context-aware and automatic runtime-permissions for mobile devices. In Proceedings of the 38th IEEE Symposium on Security and Privacy (S8P). IEEE, 1058--1076.
[58]
Aude Oliva and Antonio Torralba. 2001. Modeling the shape of the scene: A holistic representation of the spatial envelope. Int. J. Comput. Vis. 42, 3 (May 2001), 145--175.
[59]
Tribhuvanesh Orekondy, Mario Fritz, and Bernt Schiele. 2018. Connecting pixels to privacy and utility: Automatic redaction of private information in images. In Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR’18).
[60]
Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2017. Towards a visual privacy advisor: Understanding and predicting privacy risks in images. In Proceedings of the IEEE International Conference on Computer Vision (ICCV’17). 3706--3715.
[61]
J. Parra-Arnau, A. Perego, E. Ferrari, J. Forné, and D. Rebollo-Monedero. 2014. Privacy-preserving enhanced collaborative tagging. IEEE Trans. Knowl. Data Eng. 26, 1 (Jan. 2014), 180--193.
[62]
Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné, Jose L. Muñoz, and Oscar Esparza. 2012. Optimal tag suppression for privacy protection in the semantic Web. Data Knowl. Eng. 81--82 (2012), 46--66. https://doi.org/10.1016/j.datak.2012.07.004
[63]
João Paulo Pesce, Diego Las Casas, Gustavo Rauber, and Virgílio Almeida. 2012. Privacy attacks in social media using photo tagging networks: A case study with facebook. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM’12). ACM, New York, NY.
[64]
Georgios Petkos, Symeon Papadopoulos, and Yiannis Kompatsiaris. 2015. Social circle discovery in ego-networks by mining the latent structure of user connections and profile attributes. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 (ASONAM’15). ACM, New York, NY, 880--887.
[65]
Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward privacy-preserving photo sharing. In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI’13). USENIX Association, Berkeley, CA, 515--528. http://dl.acm.org/citation.cfm?id=2482626.2482675
[66]
Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, and Norman M. Sadeh. 2009. Capturing Social Networking Privacy Preferences. Springer, Berlin, 1--18.
[67]
Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. 2015. ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115, 3 (2015), 211--252. https://doi.org/10.1007/s11263-015-0816-y
[68]
Pierre Sermanet, David Eigen, Xiang Zhang, Michael Mathieu, Rob Fergus, and Yann LeCun. 2014. OverFeat: Integrated recognition, localization and detection using convolutional networks. In Proceedings of the International Conference on Learning Representations (ICLR’14). CBLS.
[69]
Pierre Sermanet, Koray Kavukcuoglu, Soumith Chintala, and Yann Lecun. 2013. Pedestrian detection with unsupervised multi-stage feature learning. In Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition. 3626--3633.
[70]
S. Shamma and M. Y. S. Uddin. 2014. Towards privacy-aware photo sharing using mobile phones. In Proceedings of the 8th International Conference on Electrical and Computer Engineering. 449--452.
[71]
Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. 2011. Quantifying location privacy. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 247--262.
[72]
Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. CoRR abs/1409.1556 (2014).
[73]
Andrew Simpson. 2008. On the need for user-defined fine-grained access control policies for social networking applications. In Proceedings of the Workshop on Security in Opportunistic and Social Networks (SOSOC’08). ACM, New York.
[74]
Eleftherios Spyromitros-Xioufis, Symeon Papadopoulos, Adrian Popescu, and Yiannis Kompatsiaris. 2016. Personalized privacy-aware image classification. In Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval (ICMR’16). ACM, New York, NY, 71--78.
[75]
Anna Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2014. Analyzing images’ privacy for the modern web. In Proceedings of the 25th ACM Conference on Hypertext and Social Media (HT’14). ACM, New York, NY, 136--147.
[76]
Anna Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2017a. Toward automated online photo privacy. ACM Trans. Web 11, 1, Article 2 (Apr. 2017), 29 pages.
[77]
Anna Squicciarini, D. Lin, S. Karumanchi, and N. DeSisto. 2012. Automatic social group organization and privacy management. In Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’12). 89--96.
[78]
Anna Squicciarini, Dan Lin, Smitha Sundareswaran, and Joshua Wede. 2015. Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans. Knowl. Data Eng. 27, 1 (2015), 193--206.
[79]
Anna Squicciarini, Andrea Novelli, Dan Lin, Cornelia Caragea, and Haoti Zhong. 2017b. From tag to protect: A tag-driven PolicyRecommender system for image sharing. In Proceedings of the International Conference on Privacy, Security and Trust (PST’17).
[80]
Anna Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, New York, NY, 521--530.
[81]
H. Sundaram, L. Xie, M. De Choudhury, Y. R. Lin, and A. Natsev. 2012. Multimedia semantics: Interactions between content and community. Proc. IEEE 100, 9 (2012), 2737--2758.
[82]
Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2014. Going deeper with convolutions. CoRR abs/1409.4842 (2014).
[83]
Monika Taddicken. 2014. The ’privacy paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. J. Comp.-Med. Commun. 19, 2 (Jan. 2014), 248--273.
[84]
Jinhui Tang, Shuicheng Yan, Richang Hong, Guo-Jun Qi, and Tat-Seng Chua. 2009. Inferring semantic concepts from community-contributed images and noisy tags. In Proceedings of the 17th ACM International Conference on Multimedia (MM’09). ACM, New York, NY, 223--232.
[85]
Eran Toch. 2014. Crowdsourcing privacy preferences in context-aware applications. Pers. Ubiq. Comput. 18, 1 (Jan. 2014), 129--141.
[86]
Ashwini Tonge and Cornelia Caragea. 2016. Image privacy prediction using deep features. In Proceedings of the 30th AAAI Conference on Artificial Intelligence 4266--4267.
[87]
Ashwini Tonge and Cornelia Caragea. 2018. On the use of “Deep” features for online image sharing. In The Web Conference Companion.
[88]
Ashwini Tonge, Cornelia Caragea, and Anna Squicciarini. 2018a. Privacy-aware tag recommendation for image sharing. In Proceedings of the 29th Conference on Hypertext and Social Media (HT’18). ACM, New York, NY, 52--56.
[89]
Ashwini Tonge, Cornelia Caragea, and Anna Squicciarini. 2018b. Uncovering scene context for predicting privacy of online shared images. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18).
[90]
Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI’16). 1317--1323.
[91]
Paul Viola and Michael Jones. 2002. Robust real-time object detection. International Journal of Computer Vision 57, 2 (2002), 137--154.
[92]
Emanuel von Zezschwitz, Sigrid Ebbinghaus, Heinrich Hussmann, and Alexander De Luca. 2016. You can’t watch this!: Privacy-respectful photo browsing on smartphones. In Proceedings of the 2016 Conference on Human Factors in Computing Systems (CHI’16). ACM, New York, NY, 4320--4324.
[93]
Nitya Vyas, Anna Squicciarini, Chih-Cheng Chang, and Danfeng Yao. 2009. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. In Proceedings of the International Conference on Collaborative Computing (CollaborateCom’09). 1--10.
[94]
Susan Waters and James Ackerman. 2011. Exploring privacy management on facebook: Motivations and perceived consequences of voluntary disclosure. J. Comput.-Med. Commun. 17, 1 (2011), 101--115.
[95]
Jason Watson, Heather Richter Lipford, and Andrew Besmer. 2015. Mapping user preference to privacy default settings. ACM Trans. Comput.-Hum. Interact. 22, 6, Article 32 (Nov. 2015), 20 pages.
[96]
Zhenyu Wu, Zhangyang Wang, Zhaowen Wang, and Hailin Jin. 2018. Towards privacy-preserving visual recognition via adversarial training: A pilot study. In Proceedings of the European Conference on Computer Vision (ECCV’18), Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss (Eds.), Lecture Notes in Computer Science,Vol. 11220. Springer, 627--645.
[97]
Haitao Xu, Haining Wang, and Angelos Stavrou. 2015. Privacy risk assessment on online photos. In Proceedings of the Conference on Robotics, Artificial Intelligence, Internet of Things 8 Data (RAID’15), Herbert Bos, Fabian Monrose, and Gregory Blanc (Eds.), Vol. 9404. 427--447.
[98]
Ching Man Au Yeung, Lalana Kagal, Nicholas Gibbins, and Nigel Shadbolt. 2009. Providing access control to online photo albums based on tags and linked data. In AAAI Spring Symposium on Social Semantic Web: Where Web 2.0 Meets Web 3.0. https://eprints.soton.ac.uk/267203/.
[99]
Wen-tau Yih, Xiaodong He, and Christopher Meek. 2014. Semantic parsing for single-relation question answering. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). Association for Computational Linguistics, Baltimore, MD, 643--648.
[100]
Jun Yu, Zhenzhong Kuang, Zhou Yu, Dan Lin, and Jianping Fan. 2017a. Privacy setting recommendation for image sharing. In Proceedings of the 16th IEEE International Conference on Machine Learning and Applications (ICMLA’17). 726--730.
[101]
Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE Trans. Inf. Forens. Secur. 13, 5 (2018), 1317--1332.
[102]
Jun Yu, Baopeng Zhang, Zhengzhong Kuang, Dan Lin, and Jianping Fan. 2017b. iPrivacy: Image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans. Inf. Forens. Secur. 12, 5 (2017), 1005--1016.
[103]
Lin Yuan, Joel Regis Theytaz, and Touradj Ebrahimi. 2017. Context-dependent privacy-aware photo sharing based on machine learning. Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC’17).
[104]
X. Yuan, X. Wang, C. Wang, Anna Squicciarini, and K. Ren. 2018. Towards privacy-preserving and practical image-centric social discovery. IEEE Trans. Depend. Sec. Comput. 15, 5 (Sep. 2018), 868--882.
[105]
Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, and Elena Demidova. 2012b. Privacy-aware image classification and search. In Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, New York, NY.
[106]
Sergej Zerr, Stefan Siersdorfer, and Jonathon S. Hare. 2012a. PicAlert!: A system for privacy-aware image classification and retrieval. In Proceedings of the Conference on Information and Knowledge Management (CIKM’12), Xue wen Chen, Guy Lebanon, Haixun Wang, and Mohammed J. Zaki (Eds.). ACM, 2710--2712.
[107]
Wei Zhang, S. S. Cheung, and Minghua Chen. 2005. Hiding privacy information in video surveillance system. In Proceedings of the IEEE International Conference on Image Processing 2005, Vol. 3. II--868.
[108]
Yuchen Zhao, Juan Ye, and Tristan Henderson. 2014. Privacy-aware location privacy preference recommendations. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS’14). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Brussels, Belgium, 120--129.
[109]
Elena Zheleva and Lise Getoor. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). 531--540.
[110]
Haoti Zhong, Anna Squicciarini, and David Miller. 2018. Toward automated multiparty privacy conflict detection. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM’18). ACM, New York, NY, 1811--1814.
[111]
Haoti Zhong, Anna Squicciarini, David Miller, and Cornelia Caragea. 2017. A group-based personalized model for image privacy classification and labeling. In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI’17). 3952--3958.

Cited By

View all
  • (2024)A Dual-channel Semi-supervised Learning Framework on Graphs via Knowledge Transfer and Meta-learningACM Transactions on the Web10.1145/357703318:2(1-26)Online publication date: 8-Jan-2024
  • (2024)Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN ModelIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.336780834:7(6391-6402)Online publication date: 1-Jul-2024
  • (2024)Privacy-Protected Contactless Sleep Parameters Measurement Using a Defocused CameraIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2024.339639728:8(4660-4673)Online publication date: Aug-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on the Web
ACM Transactions on the Web  Volume 14, Issue 2
May 2020
149 pages
ISSN:1559-1131
EISSN:1559-114X
DOI:10.1145/3382502
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 April 2020
Accepted: 01 January 2020
Revised: 01 December 2019
Received: 01 December 2018
Published in TWEB Volume 14, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Social networks
  2. deep learning<?pgbrk?>
  3. image analysis
  4. image privacy prediction

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • NSF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)485
  • Downloads (Last 6 weeks)36
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Dual-channel Semi-supervised Learning Framework on Graphs via Knowledge Transfer and Meta-learningACM Transactions on the Web10.1145/357703318:2(1-26)Online publication date: 8-Jan-2024
  • (2024)Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN ModelIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.336780834:7(6391-6402)Online publication date: 1-Jul-2024
  • (2024)Privacy-Protected Contactless Sleep Parameters Measurement Using a Defocused CameraIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2024.339639728:8(4660-4673)Online publication date: Aug-2024
  • (2024)Reversible Adversarial Examples based on Self-Embedding Watermark for Image Privacy Protection2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10650535(1-8)Online publication date: 30-Jun-2024
  • (2024)Privacy Protection for Image Sharing Using Reversible Adversarial ExamplesICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10623090(1170-1175)Online publication date: 9-Jun-2024
  • (2024)Object detection under the lens of privacy: A critical survey of methods, challenges, and future directionsICT Express10.1016/j.icte.2024.07.00510:5(1124-1144)Online publication date: Oct-2024
  • (2024)C-privacy: a social relationship-driven image customization sharing method in cyber-physical networksDigital Communications and Networks10.1016/j.dcan.2024.03.009Online publication date: Mar-2024
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • (2023)Uncertainty-aware Personal Assistant and Explanation Method for Privacy DecisionsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599148(2991-2992)Online publication date: 30-May-2023
  • (2023)PACCART: Reinforcing Trust in Multiuser Privacy Agreement SystemsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599078(2787-2789)Online publication date: 30-May-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media