skip to main content
10.1145/2631775.2631803acmconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

Analyzing images' privacy for the modern web

Published:01 September 2014Publication History

ABSTRACT

Images are now one of the most common form of content shared in online user-contributed sites and social Web 2.0 applications. In this paper, we present an extensive study exploring privacy and sharing needs of users' uploaded images. We develop learning models to estimate adequate privacy settings for newly uploaded images, based on carefully selected image-specific features. We focus on a set of visual-content features and on tags. We identify the smallest set of features, that by themselves or combined together with others, can perform well in properly predicting the degree of sensitivity of users' images. We consider both the case of binary privacy settings (i.e. public, private), as well as the case of more complex privacy options, characterized by multiple sharing options. Our results show that with few carefully selected features, one may achieve extremely high accuracy, especially when high-quality tags are available.

References

  1. Java content based image retrieval, 2011. https://code.google.com/p/jcbir/.Google ScholarGoogle Scholar
  2. S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 357--366, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. A. Alessandra Mazzia, Kristen LeFevre, April 2011. UM Tech Report#CSE-TR-570--11.Google ScholarGoogle Scholar
  4. M. Ames and M. Naaman. Why we tag: motivations for annotation in mobile and online media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '07, pages 971--980, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Besmer and H. Lipford. Tagged photos: concerns, perceptions, and protections. In CHI '09: 27th international conference extended abstracts on Human factors in computing systems, pages 4585--4590, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. D. Blog. Pin or not to pin: An inside look, 2012. http://blog.socialdiscovery.org/tag/statistics/.Google ScholarGoogle Scholar
  7. J. Bonneau, J. Anderson, and L. Church. Privacy suites: shared privacy for social networks. In Symposium on Usable Privacy and Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Bonneau, J. Anderson, and G. Danezis. Prying data out of a social network. In ASONAM: International Conference on Advances in Social Network Analysis and Mining, pages 249--254, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Borth, R. Ji, T. Chen, T. Breuel, and S.-F. Chang. Large-scale visual sentiment ontology and detectors using adjective noun pairs, 2013. http://www.ee.columbia.edu/ln/dvmm/vso/download/sentibank.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bullguard. Privacy violations, the dark side of social media. http://www.bullguard.com/bullguard-security-center/internet-security/social-media-dangers/privacy-violations-in-social-media.aspx.Google ScholarGoogle Scholar
  11. O. Chapelle, P. Haffner, and V. Vapnik. Support vector machines for histogram-based image classification. Neural Networks, IEEE Transactions on, 10(5):1055--1064, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Chatzichristofis, Y. Boutalis, and M. Lux. Img(rummager): An interactive content based image retrieval system. In Similarity Search and Applications, 2009. SISAP '09. Second International Workshop on, pages 151 --153, aug. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. P. Cheek and M. Shehab. Policy-by-example for online social networks. In 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, pages 23--32, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H.-M. Chen, M.-H. Chang, P.-C. Chang, M.-C. Tien, W. H. Hsu, and J.-L. Wu. Sheepdog: group and tag recommendation for flickr photos by automatic search-based learning. In MM '08: Proceeding of the 16th ACM international conference on Multimedia, pages 737--740, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. D. Choudhury, H. Sundaram, Y.-R. Lin, A. John, and D. D. Seligmann. Connecting content to community in social media via image content, user tags and user communication. In Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, ICME 2009, pages 1238--1241. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. da Silva Torres and A. Falcao. Content-based image retrieval: Theory and applications. Revista de Informática Teórica e Aplicada, 2(13):161--185, 2006.Google ScholarGoogle Scholar
  17. R. Datta, D. Joshi, J. Li, and J. Wang. Image retrieval: Ideas, influences, and trends of the new age. ACM Computing Surveys (CSUR), 40(2):5, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Deng, A. C. Berg, K. Li, and L. Fei-Fei. What does classifying more than 10,000 image categories tell us? In Proceedings of the 11th European conference on Computer vision: Part V, ECCV'10, pages 71--84, Berlin, Heidelberg, 2010. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Fang and K. LeFevre. Privacy wizards for social networking sites. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 351--360, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. He, W. W. Chu, and Z. Liu. Inferring privacy information from social networks. In IEEE International Conference on Intelligence and Security Informatics, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. X. He, W. Ma, O. King, M. Li, and H. Zhang. Learning and inferring a semantic space from user's relevance feedback for image retrieval. In Proceedings of the tenth ACM international conference on Multimedia, pages 343--346. ACM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. K. J. Higgins. Social networks for patients stir privacy, security worries, 2010. Online at http://www.darkreading.com/authentication/167901072/security/privacy/227500908/social-networks-for-patients-stir-privacy-security-worries.html.Google ScholarGoogle Scholar
  23. S. Jones and E. O'Neill. Contextual dynamics of group-based sharing decisions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 1777--1786. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. P. F. Klemperer, Y. Liang, M. L. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. K. Reiter. Tag, you can see it! Using tags for access control in photo sharing. In CHI 2012: Conference on Human Factors in Computing Systems. ACM, May 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. Liu and E. Terzi. A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data, 5:6:1--6:30, December 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Lowe. Distinctive image features from scale-invariant keypoints. International journal of computer vision, 60(2):91--110, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. G. Lowe. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision, 60(2):91--110, Nov. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. D. Miller and W. K. Edwards. Give and take: a study of consumer photo-sharing culture and practice. In CHI '07: SIGCHI conference on Human factors in computing systems, pages 347--356, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. W. W. Ng, A. Dorado, D. S. Yeung, W. Pedrycz, and E. Izquierdo. Image classification with the use of radial basis function neural networks and the minimization of the localized generalization error. Pattern Recognition, 40(1):19 -- 32, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. A. Plangprasopchok and K. Lerman. Exploiting social annotation for automatic resource discovery. CoRR, abs/0704.1675, 2007.Google ScholarGoogle Scholar
  31. M. Rabbath, P. Sandhaus, and S. Boll. Automatic creation of photo books from stories in social media. ACM Trans. Multimedia Comput. Commun. Appl., 7S(1):27:1--27:18, Nov. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. Rabbath, P. Sandhaus, and S. Boll. Analysing facebook features to support event detection for photo-based facebook applications. In Proceedings of the 2nd ACM International Conference on Multimedia Retrieval, ICMR '12, pages 11:1--11:8, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. Read, B. Pfahringer, G. Holmes, and E. Frank. Classifier chains for multi-label classification, 2011.Google ScholarGoogle Scholar
  34. J. San Pedro and S. Siersdorfer. Ranking and classifying attractiveness of photos in folksonomies. In Proceedings of the 18th international conference on World wide web, WWW '09, pages 771--780, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. N. Sawant. Modeling tagged photos for automatic image annotation. In Proceedings of the 19th ACM international conference on Multimedia, MM '11, pages 865--866, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. N. Sawant, J. Li, and J. Z. Wang. Automatic image semantic interpretation using social action and tagging data. Multimedia Tools Appl., 51(1):213--246, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. J. Sivic and A. Zisserman. Video google: A text retrieval approach to object matching in videos. In Proc. of ICCV, pages 1470--1477, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. A. C. Squicciarini, S. Sundareswaran, D. Lin, and J. Wede. A3P: adaptive policy prediction for shared images over popular content sharing sites. In 22nd ACM Conference on Hypertext and Hypermedia, pages 261--270. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. X. Sun, H. Yao, R. Ji, and S. Liu. Photo assessment based on computational visual attention model. In Proceedings of the 17th ACM international conference on Multimedia, MM '09, pages 541--544, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. H. Sundaram, L. Xie, M. De Choudhury, Y. Lin, and A. Natsev. Multimedia semantics: Interactions between content and community. Proceedings of the IEEE, 100(9):2737--2758, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  41. A. Vailaya, A. Jain, and H. J. Zhang. On image classification: City images vs. landscapes. Pattern Recognition, 31(12):1921 -- 1935, 1998.Google ScholarGoogle Scholar
  42. N. Vyas, A. C. Squicciarini, C.-C. Chang, and D. Yao. Towards automatic privacy management in web 2.0 with semantic analysis on annotations. In CollaborateCom, pages 1--10, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  43. C. Wang, D. M. Blei, and F.-F. Li. Simultaneous image classification and annotation. In Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009), pages 1903--1910. IEEE, 2009.Google ScholarGoogle Scholar
  44. J. Yang, Y.-G. Jiang, A. G. Hauptmann, and C.-W. Ngo. Evaluating bag-of-visual-words representations in scene classification. In Proc. of ACM Workshop on Multimedia Information Retrieval, pages 197--206, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. C.-H. Yeh, Y.-C. Ho, B. A. Barsky, and M. Ouhyoung. Personalized photograph ranking and selection system. In Proceedings of the international conference on Multimedia, MM '10, pages 211--220, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. C. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt. Providing access control to online photo albums based on tags and linked data. Social Semantic Web: Where Web, 2, 2009.Google ScholarGoogle Scholar
  47. J. Yu, X. Jin, J. Han, and J. Luo. Social group suggestion from user image collections. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 1215--1216, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. J. Yu, D. Joshi, and J. Luo. Connecting people in photo-sharing sites by photo content and user annotations. In Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on, pages 1464--1467. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova. Privacy-aware image classification and search. In Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, SIGIR '12, pages 35--44, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. N. Zheng, Q. Li, S. Liao, and L. Zhang. Which photo groups should I choose? a comparative study of recommendation algorithms in flickr. J. Inf. Sci., 36:733--750, December 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. J. Zhuang and S. C. H. Hoi. Non-parametric kernel ranking approach for social image retrieval. In Proceedings of the ACM International Conference on Image and Video Retrieval, CIVR '10, pages 26--33, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Analyzing images' privacy for the modern web

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      HT '14: Proceedings of the 25th ACM conference on Hypertext and social media
      September 2014
      346 pages
      ISBN:9781450329545
      DOI:10.1145/2631775

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 September 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      HT '14 Paper Acceptance Rate49of86submissions,57%Overall Acceptance Rate378of1,158submissions,33%

      Upcoming Conference

      HT '24
      35th ACM Conference on Hypertext and Social Media
      September 10 - 13, 2024
      Poznan , Poland

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader