Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Privacy-aware Tag Recommendation for Accurate Image Privacy Prediction

Published: 12 August 2019 Publication History

Abstract

Online images’ tags are very important for indexing, sharing, and searching of images, as well as surfacing images with private or sensitive content, which needs to be protected. Social media sites such as Flickr generate these metadata from user-contributed tags. However, as the tags are at the sole discretion of users, these tags tend to be noisy and incomplete. In this article, we present a privacy-aware approach to automatic image tagging, which aims at improving the quality of user annotations, while also preserving the images’ original privacy sharing patterns. Precisely, we recommend potential tags for each target image by mining privacy-aware tags from the most similar images of the target image, which are obtained from a large collection. Experimental results show that, although the user-input tags compose noise, our privacy-aware approach is able to predict accurate tags that can improve the performance of a downstream application on image privacy prediction and outperforms an existing privacy-oblivious approach to image tagging. The results also show that, even for images that do not have any user tags, our proposed approach can recommend accurate tags. Crowd-sourcing the predicted tags exhibits the quality of our privacy-aware recommended tags. Our code, features, and the dataset used in experiments are available at: https://github.com/ashwinitonge/privacy-aware-tag-rec.git.

References

[1]
Fabeah Adu-Oppong, Casey K. Gardiner, Apu Kapadia, and Patrick P. Tsang. 2008. Social circles: Tackling privacy in social networks. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS’08).
[2]
Shane Ahern, Dean Eckles, Nathaniel S. Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the International Conference on Human Factors in Computing Systems (CHI’07).
[3]
Emilia Apostolova and Dina Demner-Fushman. 2009. Towards automatic image region annotation—Image region textual coreference resolution. In Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics, Companion Volume: Short Papers. 41--44.
[4]
P. Bakliwal and C. V. Jawahar. 2015. Active learning based image annotation. In Proceedings of the 5th National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG’15). 1--4.
[5]
B. Bao, T. Li, and S. Yan. 2012. Hidden-concept driven multilabel image annotation and label ranking. IEEE Trans. Multimed. 14, 1 (Feb. 2012), 199--210.
[6]
Andrew Besmer and Heather Lipford. 2009. Tagged photos: Concerns, perceptions, and protections. In Proceedings of the International Conference on Human Factors in Computing Systems (CHI’09).
[7]
Kerstin Bischoff, Claudiu S. Firan, Wolfgang Nejdl, and Raluca Paiu. 2008. Can all tags be used for search? In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM’08). ACM, New York, NY, 193--202.
[8]
Joseph Bonneau, Jonathan Anderson, and Luke Church. 2009a. Privacy suites: Shared privacy for social networks. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS’09). ACM, New York, NY, Article 30.
[9]
Joseph Bonneau, Jonathan Anderson, and George Danezis. 2009b. Prying data out of a social network. In Proceedings of the International Conference on Advances in Social Network Analysis and Mining (ASONAM’09). IEEE Computer Society, 249--254.
[10]
Bullguard. 2018. Privacy violations, the dark side of social media. Retrieved from: http://www.bullguard.com/bullguard-security-center/internet-security/social-media-dangers/privacy-violations-in-social-media.aspx.
[11]
Daniel Buschek, Moritz Bader, Emanuel von Zezschwitz, and Alexander De Luca. 2015. Automatic privacy classification of personal photos. In Proceedings of the Conference on Human Computer Interaction (INTERACT 2015). Vol. 9297. 428--435.
[12]
D. Keerthi Chandra, W. Chowgule, Y. Fu, and D. Lin. 2018. RIPA: Real-time image privacy alert system. In Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC’18). 136--145.
[13]
Minmin Chen, Alice Zheng, and Kilian Q. Weinberger. 2013. Fast image tagging. In Proceedings of the 30th International Conference on Machine Learning. Retrieved from: https://www.microsoft.com/en-us/research/publication/fast-image-tagging/.
[14]
Qimin Cheng, Qian Zhang, Peng Fu, Conghuan Tu, and Sen Li. 2018. A survey and analysis on automatic image annotation. Pattern Recog. 79 (2018), 242--259.
[15]
Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, and Michaela Kauer. 2013. Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications. Inf. Secur. Tech. Rep. 17, 3 (Feb. 2013), 105--116.
[16]
Gianluigi Ciocca, Claudio Cusano, Simone Santini, and Raimondo Schettini. 2011. Halfway through the semantic gap: Prosemantic features for image retrieval. Inf. Sci. 181, 22 (Nov. 2011), 4943--4958.
[17]
George Danezis. 2009. Inferring privacy policies for social networking services. In Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence (AISec’09). ACM, New York, NY, 5--10.
[18]
Munmun De Choudhury, Hari Sundaram, Yu-Ru Lin, Ajita John, and Doree Duncan Seligmann. 2009. Connecting content to community in social media via image content, user tags and user communication. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME’09). IEEE Press, Piscataway, NJ, 1238--1241.
[19]
Ivica Dimitrovski, Dragi Kocev, Suzana Loskovska, and Saso Dzeroski. 2011. Hierarchical annotation of medical images. Pattern Recog. 44, 10 (2011), 2436--2449.
[20]
Jeff Donahue, Yangqing Jia, Oriol Vinyals, Judy Hoffman, Ning Zhang, Eric Tzeng, and Trevor Darrell. 2014. DeCAF: A deep convolutional activation feature for generic visual recognition. In Proceedings of the 31st International Conference on Machine Learning (ICML'14), Vol. 32. I--647--I--655. http://dl.acm.org/citation.cfm?id=3044805.3044879.
[21]
F. Dufaux and T. Ebrahimi. 2008. Scrambling for privacy protection in video surveillance systems. IEEE Trans. Cir. Sys. Video Technol. 18, 8 (Aug. 2008), 1168--1174.
[22]
Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, NY, 351--360.
[23]
Christiane Fellbaum (Ed.). 1998. WordNet: An electronic lexical database. The MIT Press, Cambridge, MA.
[24]
L. Feng and B. Bhanu. 2016. Semantic concept co-occurrence patterns for image annotation and retrieval. IEEE Trans. Pattern Anal. Machine Intell. 38, 4 (Apr. 2016), 785--799.
[25]
Shaolei Feng, Raghavan Manmatha, and Victor Lavrenko. 2004. Multiple Bernoulli relevance models for image and video annotation. In Proceedings of the Computer Vision and Pattern Recognition (CVPR’04). 1002--1009.
[26]
Yansong Feng and Mirella Lapata. 2008. Automatic image annotation using auxiliary text information. In Proceedings of the ACL-08: HLT.
[27]
Yansong Feng and Mirella Lapata. 2010. Topic models for image annotation and text illustration. In Proceedings of the Human Language Technology Conference (HLT’10). Association for Computational Linguistics, Stroudsburg, PA, 831--839.
[28]
Yue Gao, Meng Wang, Huanbo Luan, Jialie Shen, Shuicheng Yan, and Dacheng Tao. 2011. Tag-based social image search with visual-text joint hypergraph learning. In Proceedings of the 19th ACM International Conference on Multimedia (MM’11). ACM, New York, NY, 1517--1520.
[29]
Kambiz Ghazinour, Stan Matwin, and Marina Sokolova. 2013. Monitoring and recommending privacy settings in social networks. In Proceedings of the Joint EDBT/ICDT 2013 Workshops (EDBT’13). ACM, New York, NY, 164--168.
[30]
Arnab Ghoshal, Pavel Ircing, and Sanjeev Khudanpur. 2005. Hidden Markov models for automatic annotation and content-based retrieval of images and video. In Proceedings of the 28th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’05). ACM, New York, NY, 544--551.
[31]
Yunchao Gong, Yangqing Jia, Thomas Leung, Alexander Toshev, and Sergey Ioffe. 2013. Deep convolutional ranking for multilabel image annotation. Retrieved from: http://arxiv.org/abs/1312.4894
[32]
Yuyun Gong and Qi Zhang. 2016. Hashtag recommendation using attention-based convolutional neural network. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI’16). AAAI Press, 2782--2788.
[33]
D. Grangier and S. Bengio. 2008. A discriminative kernel-based approach to rank images from text queries. IEEE Trans. Pattern Anal. Machine Intell. 30, 8 (Aug. 2008), 1371--1384.
[34]
Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the ACM Workshop on Privacy in the Electronic Society. 71--80.
[35]
Matthieu Guillaumin, Thomas Mensink, Jakob Verbeek, and Cordelia Schmid. 2009. TagProp: Discriminative metric learning in nearest neighbor models for image auto-annotation. In Proceedings of the IEEE International Conference on Computer Vision (ICCV).
[36]
Benjamin Henne, Christian Szongott, and Matthew Smith. 2013. SnapMe if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In Proceedings of the Wireless Network Security Conference (WiSec’13). 12.
[37]
Livia Hollenstein and Ross Purves. 2010. Exploring place through user-generated content: Using Flickr tags to describe city cores. J. Spatial Inform. Sci. 1, 1 (2010), 21--48.
[38]
Y. Hou and X. Zhang. 2015. A geometric constrained HCRF for object recognition. In Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC’15). 1--4.
[39]
D. Hu, F. Chen, X. Wu, and Z. Zhao. 2016a. A framework of privacy decision recommendation for image sharing in online social networks. In Proceedings of the 1st IEEE International Conference on Data Science in Cyberspace (DSC’16). 243--251.
[40]
H. Hu, G. Zhou, Z. Deng, Z. Liao, and G. Mori. 2016b. Learning structured inference neural networks with label relations. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 2960--2968.
[41]
Sheng-Jun Huang and Zhi-Hua Zhou. 2012. Multi-label learning by exploiting label correlations locally. In Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI’12). AAAI Press, 949--955.
[42]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, New York, NY, 781--792.
[43]
Jiren Jin and H. Nakayama. 2016. Annotation order matters: Recurrent image annotator for arbitrary length image tagging. In Proceedings of the 23rd International Conference on Pattern Recognition (ICPR’16). 2452--2457.
[44]
X. Jing, F. Wu, Z. Li, R. Hu, and D. Zhang. 2016. Multi-label dictionary learning for image annotation. IEEE Trans. Image Proc. 25, 6 (June 2016), 2712--2725.
[45]
Simon Jones and Eamonn O’Neill. 2011. Contextual dynamics of group-based sharing decisions. In Proceedings of the International Conference on Human Factors in Computing Systems (CHI’11). 10.
[46]
James B. D. Joshi and Tao Zhang (Eds.). 2009. In Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’09). ICST/IEEE.
[47]
M. M. Kalayeh, H. Idrees, and M. Shah. 2014. NMF-KNN: Image annotation using weighted multi-view non-negative matrix factorization. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 184--191.
[48]
Berkant Kepez and Pinar Yolum. 2016. Learning privacy rules cooperatively in online social networks. In Proceedings of the 1st International Workshop on AI for Privacy and Security (PrAISe’16). ACM, New York, NY, Article 3, 4 pages.
[49]
Peter Klemperer, Yuan Liang, Michelle Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie F. Cranor, Nitin Gupta, and Michael Reiter. 2012. Tag, you can see it! Using tags for access control in photo sharing. In Proceedings of the International Conference on Human Factors in Computing Systems (CHI’12).
[50]
Balachander Krishnamurthy and Craig E. Wills. 2008. Characterizing privacy in online social networks. In Proceedings of the 1st Workshop on Online Social Networks (WOSN’08). ACM, New York, NY, 37--42.
[51]
Zhenzhong Kuang, Zongmin Li, Dan Lin, and Jianping Fan. 2017. Automatic privacy prediction to accelerate social image sharing. In Proceedings of the 3rd IEEE International Conference on Multimedia Big Data (BigMM’17). 197--200.
[52]
Abdurrahman Kurtan and Pinar Yolum. 2018. PELTE: Privacy estimation of images from tags. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS’18). 1989--1991.
[53]
Victor Lavrenko, R. Manmatha, and Jiwoon Jeon. 2004. A model for learning the semantics of pictures. In Proceedings of the Conference on Neural Information Processing Systems (NIPS’04).
[54]
X. Li, B. Shen, B. Liu, and Y. Zhang. 2016. A locality sensitive low-rank model for image tag completion. IEEE Trans. Multimed. 18, 3 (Mar. 2016), 474--483.
[55]
X. Li, Y. Zhang, B. Shen, and B. Liu. 2014. Image tag completion by low-rank factorization with dual reconstruction structure preserved. In Proceedings of the IEEE International Conference on Image Processing (ICIP’14). 3062--3066.
[56]
Rainer Lienhart, Stefan Romberg, and Eva Hörster. 2009. Multilayer pLSA for multimodal image retrieval. In Proceedings of the ACM International Conference on Image and Video Retrieval (CIVR’09). ACM, New York, NY, Article 9, 8 pages.
[57]
Zijia Lin, Guiguang Ding, Mingqing Hu, Yunzhen Lin, and Shuzhi Sam Ge. 2014. Image tag completion via dual-view linear sparse reconstructions. Comput. Vis. Image Und. 124 (2014), 42--60.
[58]
Zijia Lin, Guiguang Ding, Mingqing Hu, Jianmin Wang, and Jiaguang Sun. 2012. Automatic image annotation using tag-related random search over visual neighbors. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management (CIKM’12). ACM, New York, NY, 1784--1788.
[59]
Z. Lin, G. Ding, M. Hu, J. Wang, and X. Ye. 2013. Image tag completion via image-specific and tag-specific linear sparse reconstructions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1618--1625.
[60]
Jing Liu, Mingjing Li, Qingshan Liu, Hanqing Lu, and Songde Ma. 2009. Image annotation via graph learning. PatternRecogn. 42, 2 (Feb. 2009), 218--228.
[61]
J. Liu, Z. Li, J. Tang, Y. Jiang, and H. Lu. 2014. Personalized geo-specific tag recommendation for photos on social websites. IEEE Trans. Multimed. 16, 3 (Apr. 2014), 588--600.
[62]
Mary Madden. 2012. Privacy management on social media sites. Retrieved from: http://www.pewinternet.org/2012/02/24/privacy-management-on-social-media-sites.
[63]
Ameesh Makadia, Vladimir Pavlovic, and Sanjiv Kumar. 2008. A new baseline for image annotation. In Proceedings of the European Conference on Computer Vision (ECCV’08).
[64]
Mohammad Mannan and Paul C. van Oorschot. 2008. Privacy-enhanced sharing of personal content on the web. In Proceedings of the 17th International Conference on World Wide Web. 487--496.
[65]
M. B. Mayhew, B. Chen, and K. S. Ni. 2016. Assessing semantic information in convolutional neural network representations of images via image annotation. In Proceedings of the IEEE International Conference on Image Processing (ICIP’16). 2266--2270.
[66]
Venkatesh N. Murthy, Ethem F. Can, and R. Manmatha. 2014. A hybrid model for automatic image annotation. In Proceedings of International Conference on Multimedia Retrieval (ICMR’14). ACM, New York, NY, 369:369--369:376.
[67]
Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2011. Automatic generation of privacy-protected videos using background estimation. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME’11). 1--6.
[68]
Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2012. Intended human object detection for automatically protecting privacy in mobile video surveillance. Multimedia Syst. 18, 2 (2012), 157--173.
[69]
Yuta Nakashima, Noboru Babaguchi, and Jianping Fan. 2016. Privacy protection for social video via background estimation and CRF-based videographer’s intention modeling. IEICE Trans. 99-D, 4 (2016), 1221--1233.
[70]
Hanh T. H. Nguyen, Martin Wistuba, and Lars Schmidt-Thieme. 2017. Personalized tag recommendation for images using deep transfer learning. In Machine Learning and Knowledge Discovery in Databases. Cham, 705--720.
[71]
Yulei Niu, Zhiwu Lu, Ji-Rong Wen, Tao Xiang, and Shih-Fu Chang. 2019. Multi-modal multi-scale deep learning for large-scale image annotation. IEEE Trans. Image Proc. 28, 4 (2019), 1720--1731.
[72]
Aude Oliva and Antonio Torralba. 2001. Modeling the shape of the scene: A holistic representation of the spatial envelope. Int. J. Comput. Vis. 42, 3 (May 2001), 145--175.
[73]
Tribhuvanesh Orekondy, Mario Fritz, and Bernt Schiele. 2018. Connecting pixels to privacy and utility: Automatic redaction of private information in images. In Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR’18).
[74]
Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2017. Towards a visual privacy advisor: Understanding and predicting privacy risks in images. In Proceedings of the IEEE International Conference on Computer Vision, (ICCV ’17). 3706--3715.
[75]
J. Parra-Arnau, A. Perego, E. Ferrari, J. Forné, and D. Rebollo-Monedero. 2014. Privacy-preserving enhanced collaborative tagging. IEEE Trans. Knowl. Data Eng. 26, 1 (Jan. 2014), 180--193.
[76]
Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné, Jose L. Muñoz, and Oscar Esparza. 2012. Optimal tag suppression for privacy protection in the semantic Web. Data Knowl. Eng. 81-82 (2012), 46--66.
[77]
Jing Peng, Daniel Dajun Zeng, Huimin Zhao, and Fei-yue Wang. 2010. Collaborative filtering in social tagging systems based on joint item-tag recommendations. In Proceedings of the International Conference on Information and Knowledge Management (CIKM’10). ACM, 809--818.
[78]
Yuxin Peng, Zhiwu Lu, and Jianguo Xiao. 2009. Semantic concept annotation based on audio PLSA model. In Proceedings of the 17th ACM International Conference on Multimedia (MM’09). ACM, New York, NY, 841--844.
[79]
João Paulo Pesce, Diego Las Casas, Gustavo Rauber, and Virgílio Almeida. 2012. Privacy attacks in social media using photo tagging networks: A case study with Facebook. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM’12). ACM, New York, NY, Article 4, 8 pages.
[80]
Georgios Petkos, Symeon Papadopoulos, and Yiannis Kompatsiaris. 2015. Social circle discovery in ego-networks by mining the latent structure of user connections and profile attributes. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’15). ACM, New York, NY, 880--887.
[81]
Duangmanee Putthividhya, Hagai Attias, and Srikantan S. Nagarajan. 2010. Topic regression multi-modal Latent Dirichlet Allocation for image annotation. IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 3408--3415.
[82]
Z. Qin, C. Li, H. Zhang, and J. Guo. 2015. Improving tag matrix completion for image annotation and retrieval. In Proceedings of the Conference on Visual Communications and Image Processing (VCIP’15). 1--4.
[83]
Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward privacy-preserving photo sharing. In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI’13). 515--528.
[84]
Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. 2014. ImageNet large scale visual recognition challenge. Retrieved from: arXiv:1409.0575.
[85]
Boon-Siew Seah, Aixin Sun, and Sourav S. Bhowmick. 2018. Killing two birds with one stone: Concurrent ranking of tags and comments of social images. In Proceedings of the 41st International ACM SIGIR Conference on Research 8 Development in Information Retrieval (SIGIR’18). 937--940.
[86]
Paul Seitlinger, Dominik Kowald, Christoph Trattner, and Tobias Ley. 2013. Recommending tags with a model of human categorization. In Proceedings of the International Conference on Information and Knowledge Management (CIKM’13). ACM, New York, NY.
[87]
S. Shamma and M. Y. S. Uddin. 2014. Towards privacy-aware photo sharing using mobile phones. In Proceedings of the 8th International Conference on Electrical and Computer Engineering. 449--452.
[88]
Yue Shi, Martha Larson, and Alan Hanjalic. 2014. Collaborative filtering beyond the user-item matrix: A survey of the state of the art and future challenges. ACM Comput. Surv., Article 3 (May 2014), 45 pages.
[89]
Börkur Sigurbjörnsson and Roelof van Zwol. 2008. Flickr tag recommendation based on collective knowledge. In Proceedings of the International World Wide Web Conferences (WWW’08). ACM, New York, NY, 327--336.
[90]
Andrew Simpson. 2008. On the need for user-defined fine-grained access control policies for social networking applications. In Proceedings of the Workshop on Security in Opportunistic and SOCial Networks (SOSOC’08). ACM, 1:1--1:8.
[91]
Xuemeng Song, Xiang Wang, Liqiang Nie, Xiangnan He, Zhumin Chen, and Wei Liu. 2018. A personal privacy preserving framework: I let you know who can see what. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’18). ACM, 295--304.
[92]
Eleftherios Spyromitros-Xioufis, Symeon Papadopoulos, Adrian Popescu, and Yiannis Kompatsiaris. 2016. Personalized privacy-aware image classification. In Proceedings of the International Conference on Multimedia Retrieval (ICMR’16). ACM, New York, NY, 71--78.
[93]
Anna Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2014. Analyzing images’ privacy for the modern web. In Proceedings of the ACM Conference on Hypertext 8 Social Media (HT’14). ACM, New York, NY, 136--147.
[94]
Anna Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2017a. Toward automated online photo privacy. ACM Trans. Web 11, 1, Article 2 (Apr. 2017).
[95]
Anna Squicciarini, D. Lin, S. Karumanchi, and N. DeSisto. 2012. Automatic social group organization and privacy management. In Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. 89--96.
[96]
Anna Squicciarini, Dan Lin, Smitha Sundareswaran, and Joshua Wede. 2015. Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans. Knowl. Data Eng. 27, 1 (2015), 193--206.
[97]
Anna Squicciarini, Andrea Novelli, Dan Lin, Cornelia Caragea, and Haoti Zhong. 2017b. From tag to protect: A tag-driven policy recommender system for image sharing. In Proceedings of the Conference on Privacy, Security and Trust (PST’17).
[98]
Anna Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, New York, NY, 521--530.
[99]
Anna Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. 2011. A3p: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia. 261--270.
[100]
Xiaoyuan Su and Taghi M. Khoshgoftaar. 2009. A survey of collaborative filtering techniques. Advances in Artificial Intelligence 2009, Article 421425 (2009), 19 pages.
[101]
Hari Sundaram, Lexing Xie, Munmun De Choudhury, Yu-Ru Lin, and Apostol Natsev. 2012. Multimedia semantics: Interactions between content and community. Proc. IEEE 100, 9 (2012), 2737--2758.
[102]
Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2014. Going deeper with convolutions. Retrieved from: CoRR abs/1409.4842 (2014).
[103]
Jinhui Tang, Shuicheng Yan, Richang Hong, Guo-Jun Qi, and Tat-Seng Chua. 2009. Inferring semantic concepts from community-contributed images and noisy tags. In Proceedings of the 17th ACM International Conference on Multimedia (MM’09). ACM, New York, NY, 223--232.
[104]
F. Tian and X. Shen. 2014. Learning label set relevance for search based image annotation. In Proceedings of the International Conference on Virtual Reality and Visualization. 260--265.
[105]
G. Toderici, H. Aradhye, M. Pasca, L. Sbaiz, and J. Yagnik. 2010. Finding meaning on YouTube: Tag recommendation and category discovery. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 3447--3454.
[106]
Ashwini Tonge and Cornelia Caragea. 2016. Image privacy prediction using deep features. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’16).
[107]
Ashwini Tonge and Cornelia Caragea. 2018. On the use of “deep” features for online image sharing. In Companion Proceedings of the Web Conference. 1317--1321.
[108]
Ashwini Tonge, Cornelia Caragea, and Anna Squicciarini. 2018b. Privacy-aware tag recommendation for image sharing. In Proceedings of the 29th Conference on Hypertext and Social Media (HT’18). ACM, New York, NY, 52--56.
[109]
Ashwini Tonge, Cornelia Caragea, and Anna Squicciarini. 2018a. Uncovering scene context for predicting privacy of online shared images. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18).
[110]
Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’16). 7.
[111]
Emanuel von Zezschwitz, Sigrid Ebbinghaus, Heinrich Hussmann, and Alexander De Luca. 2016. You can’t watch this!: Privacy-respectful photo browsing on smartphones. In Proceedings of the Conference on Human Factors in Computing Systems (CHI’16). ACM, New York, NY, 4320--4324.
[112]
Nitya Vyas, Anna Squicciarini, Chih-Cheng Chang, and Danfeng Yao. 2009. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. In Proceedings of the International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’09). 1--10.
[113]
Chong Wang, David M. Blei, and Fei-Fei Li. 2009a. Simultaneous image classification and annotation. In Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR’09).
[114]
H. Wang and J. Hu. 2010. Multi-label image annotation via maximum consistency. In Proceedings of the IEEE International Conference on Image Processing. 2337--2340.
[115]
Hua Wang, Heng Huang, and C. Ding. 2009b. Image annotation using multi-label correlated Green’s function. In Proceedings of the 12th IEEE International Conference on Computer Vision. 2029--2034.
[116]
H. Wang, H. Huang, and C. Ding. 2011. Image annotation using bi-relational graph of images and semantic labels. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’11).
[117]
J. Wang, Y. Yang, J. Mao, Z. Huang, C. Huang, and W. Xu. 2016. CNN-RNN: A unified framework for multi-label image classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 2285--2294.
[118]
Ronggui Wang, Yunfei Xie, Juan Yang, Lixia Xue, Min Hu, and Qingyang Zhang. 2017. Large scale automatic image annotation based on convolutional neural network. J. Vis. Commun. Image Rep. 49, C (Nov. 2017), 213--224.
[119]
Jason Watson, Heather Richter Lipford, and Andrew Besmer. 2015. Mapping user preference to privacy default settings. ACM Trans. Comput.-Hum. Interact. 22, 6, Article 32 (Nov. 2015), 20 pages.
[120]
Baoyuan Wu, Siwei Lyu, Bao-Gang Hu, and Qiang Ji. 2015a. Multi-label learning with missing labels for image annotation and facial action unit recognition. Pattern Recog. 48, 7 (2015), 2279--2289.
[121]
J. Wu, Yinan Yu, Chang Huang, and Kai Yu. 2015b. Deep multiple instance learning for image classification and auto-annotation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’15). 3460--3469.
[122]
Lei Wu, Steven C.H. Hoi, Rong Jin, Jianke Zhu, and Nenghai Yu. 2009. Distance metric learning from uncertain side information with application to automated photo tagging. In Proceedings of the 17th ACM International Conference on Multimedia (MM’09). ACM, New York, NY, 135--144.
[123]
Lei Wu, Rong Jin, and Anil K. Jain. 2013. Tag completion for image retrieval. IEEE Trans. Pattern Anal. Machine Intell. 35, 3 (Mar. 2013).
[124]
Pengcheng Wu, Steven Chu-Hong Hoi, Peilin Zhao, and Ying He. 2011. Mining social images with distance metric learning for automated image tagging. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining (WSDM’11). ACM, New York, NY, 197--206.
[125]
Zhenyu Wu, Zhangyang Wang, Zhaowen Wang, and Hailin Jin. 2018. Towards privacy-preserving visual recognition via adversarial training: A pilot study. In Proceedings of the European Conference on Computer Vision (ECCV’18), Vol. 11220. Springer, 627--645.
[126]
Haitao Xu, Haining Wang, and Angelos Stavrou. 2015. Privacy risk assessment on online photos. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID’15). 427--447.
[127]
Zhichen Xu, Yun Fu, Jianchang Mao, and Difu Su. 2006. Towards the semantic web: Collaborative tag suggestions. In Proceedings of the Collaborative Web Tagging Workshop at the 15th International WWW Conference.
[128]
Yang Yang, Wensheng Zhang, and Yuan Xie. 2015. Image automatic annotation via multi-view deep representation. J. Vis. Commun. Image Rep. 33 (2015), 368--377.
[129]
Alexei Yavlinsky, Edward Schofield, and Stefan Rüger. 2005. Automated Image Annotation Using Global Features and Robust Nonparametric Density Estimation. Springer Berlin.
[130]
Ching-man Au Yeung, Lalana Kagal, Nicholas Gibbins, and Nigel Shadbolt. 2009. Providing access control to online photo albums based on tags and linked data. In Social Semantic Web: Where Web 2.0 Meets Web 3.0. Papers from the 2009 AAAI Spring Symposium, Technical Report SS-09-08, Stanford, California, USA, March 23-25, 2009. 9--14. http://www.aaai.org/Library/Symposia/Spring/2009/ss09-08-003.php.
[131]
F. Yu and H. H. S Ip. 2006. Automatic semantic annotation of images using spatial hidden Markov model. In Proceedings of the IEEE International Conference on Multimedia and Expo. 305--308.
[132]
Jun Yu, Zhenzhong Kuang, Zhou Yu, Dan Lin, and Jianping Fan. 2017. Privacy setting recommendation for image sharing. In Proceedings of the 16th IEEE International Conference on Machine Learning and Applications (ICMLA’17). 726--730.
[133]
Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE Trans. Inform. Foren. Sec. 13, 5 (2018), 1317--1332.
[134]
Lin Yuan, Joel Regis Theytaz, and Touradj Ebrahimi. 2017. Context-dependent privacy-aware photo sharing based on machine learning. In Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC’17).
[135]
X. Yuan, X. Wang, C. Wang, Anna Squicciarini, and K. Ren. 2018. Towards privacy-preserving and practical image-centric social discovery. IEEE Trans. Depend. Sec. Comput. 15, 5 (Sept. 2018), 868--882.
[136]
Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, and Elena Demidova. 2012. Privacy-aware image classification and search. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, NY.
[137]
Zheng-Jun Zha, Tao Mei, Jingdong Wang, Zengfu Wang, and Xian-Sheng Hua. 2009. Graph-based semi-supervised learning with multiple labels. J. Vis. Commun. Image Rep. 20, 2 (2009), 97--103.
[138]
Qi Zhang, Jiawen Wang, Haoran Huang, Xuanjing Huang, and Yeyun Gong. 2017. Hashtag recommendation for multimodal microblog using co-attention network. In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI’17). 3420--3426.
[139]
Wei Zhang, S. S. Cheung, and Minghua Chen. 2005. Hiding privacy information in video surveillance system. In Proceedings of the IEEE International Conference on Image Processing, Vol. 3. II--868.
[140]
Yufeng Zhao, Yao Zhao, and Zhenfeng Zhu. 2009. TSVM-HMM: Transductive SVM based hidden Markov model for automatic image annotation. Expert Syst. Appl. 36, 6 (2009), 9813--9818.
[141]
Haoti Zhong, Anna Squicciarini, and David Miller. 2018. Toward automated multiparty privacy conflict detection. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM’18). 1811--1814.
[142]
Haoti Zhong, Anna Squicciarini, David Miller, and Cornelia Caragea. 2017. A group-based personalized model for image privacy classification and labeling. In Proceedings of the 26th International Joint Conference on Artificial Intelligence. 3952--3958.
[143]
Bolei Zhou, Aditya Khosla, Agata Lapedriza, Antonio Torralba, and Aude Oliva. 2016. Places: An image database for deep scene understanding. Retrieved from: arXiv:1610.02055 (2016).

Cited By

View all
  • (2024)Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networksPeer-to-Peer Networking and Applications10.1007/s12083-024-01718-717:4(2523-2537)Online publication date: 22-May-2024
  • (2022)High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic systemJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2022.04.00134:6(2993-3010)Online publication date: Jun-2022

Index Terms

  1. Privacy-aware Tag Recommendation for Accurate Image Privacy Prediction

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Intelligent Systems and Technology
      ACM Transactions on Intelligent Systems and Technology  Volume 10, Issue 4
      Survey Papers and Regular Papers
      July 2019
      327 pages
      ISSN:2157-6904
      EISSN:2157-6912
      DOI:10.1145/3344873
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 August 2019
      Accepted: 01 May 2019
      Revised: 01 April 2019
      Received: 01 February 2019
      Published in TIST Volume 10, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Social networks
      2. deep learning
      3. image analysis
      4. image privacy prediction
      5. privacy-aware tags
      6. tag recommendation

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)164
      • Downloads (Last 6 weeks)32
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networksPeer-to-Peer Networking and Applications10.1007/s12083-024-01718-717:4(2523-2537)Online publication date: 22-May-2024
      • (2022)High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic systemJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2022.04.00134:6(2993-3010)Online publication date: Jun-2022

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Get Access

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media