A3P approach towards secure and time confined for images sharing on Social Networks

Praveen S R Konduri

Abstract


Social sharing websites are progressively designed, as Flickr and YouTube, enable users to make, share, explain and remark Medias. The expansive scale user produced meta-information not just encourage users in sharing and sorting out sight and multimedia content, however give valuable data to enhance media recovery and administration. Customized search fills in as one of such illustrations where the web search encounter is enhanced by creating the returned list as per the altered user search plans. In this paper, we misuse the social comments and propose a novel structure at the same time considering the user and question importance to figure out how to customized image search. The fundamental preface is to install the user inclination and inquiry related search aim into user particular subject spaces. Since the users' unique explanation is excessively meager for theme displaying, we have to advance users' comment pool before user particular point spaces development.


Keywords


Secure sharing, Access Control, Grouping, Meta data, Content sharing sites, Social media, Privacy Policy, Security.

References


A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy Enhancing Technologies Workshop, 2006.

R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In J. B. Bocca, M. Jarke, and C. Zaniolo, editors, 20th International Conference on Very Large Data Bases, September 12-15, pages 487–499. Morgan Kaufmann, 1994.

S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Conference on Human factors in computing systems, pages 357–366. ACM, 2007.

M. Ames and M. Naaman. Why we tag: motivations for annotation in mobile and online media. In Conference on Human factors in computing systems, CHI’ 07, pages 971– 980. ACM, 2007.

A. Besmer and H. Lipford. Tagged photos: concerns, perceptions, and protections. In CHI ’09: 27th international conference extended abstracts on Human factors in computing systems, pages 4585–4590. ACM, 2009.

A. D. Bland JM. Multiple significance tests: the bonferroni method. BMJ, 310(6973), 1995.

J. Bonneau, J. Anderson, and L. Church. Privacy suites: shared privacy for social networks. In Symposium on Usable Privacy and Security, 2009.

J. Bonneau, J. Anderson, and G. Danezis. Prying data out of a social network. In ASONAM: International Conference on Advances in Social Network Analysis and Mining, pages 249– 254, 2009.

O. Chapelle, P. Haffner, and V. Vapnik. Support vector machines for histogram-based image classification. Neural Networks, IEEE Transactions on, 10(5):1055–1064, 1999.

H.-M. Chen, M.-H. Chang, P.-C. Chang, M.-C. Tien, W. H. Hsu, and J.-L. Wu. Sheepdog: group and tag recommendation for flickr photos by automatic search-based learning. In 16th ACM international conference on multimedia, pages 737–740. ACM, 2008.


Full Text: PDF[Full Text]

Refbacks

  • There are currently no refbacks.



Copyright © 2012, All rights reserved.| ijmca.org

Creative Commons License
International Journal of Mechanical Engineering and Computer Applications by chief editor is licensed under a Creative Commons Attribution 3.0 Unported License.Permissions beyond the scope of this license may be available at www.ijmca.org.