[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2911996.2912018acmconferencesArticle/Chapter ViewAbstractPublication PagesicmrConference Proceedingsconference-collections
research-article

Personalized Privacy-aware Image Classification

Published: 06 June 2016 Publication History

Abstract

Information sharing in online social networks is a daily practice for billions of users. The sharing process facilitates the maintenance of users' social ties but also entails privacy disclosure in relation to other users and third parties. Depending on the intentions of the latter, this disclosure can become a risk. It is thus important to propose tools that empower the users in their relations to social networks and third parties connected to them. As part of USEMP, a coordinated research effort aimed at user empowerment, we introduce a system that performs privacy-aware classification of images. We show that generic privacy models perform badly with real-life datasets in which images are contributed by individuals because they ignore the subjective nature of privacy. Motivated by this, we develop personalized privacy classification models that, utilizing small amounts of user feedback, provide significantly better performance than generic models. The proposed semi-personalized models lead to performance improvements for the best generic model ranging from 4%, when 5 user-specific examples are provided, to 18% with 35 examples. Furthermore, by using a semantic representation space for these models we manage to provide intuitive explanations of their decisions and to gain novel insights with respect to individuals' privacy concerns stemming from image sharing. We hope that the results reported here will motivate other researchers and practitioners to propose new methods of exploiting user feedback and of explaining privacy classifications to users.

References

[1]
M. A. Álvarez, L. Rosasco, and N. D. Lawrence. Kernels for vector-valued functions: A review. Foundations and Trends in Machine Learning, 4(3):195--266, 2012.
[2]
A. Bergamo and L. Torresani. Meta-class features for large-scale object categorization on a budget. In CVPR, 2012.
[3]
D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. JMLR, 3:993--1022, 2003.
[4]
D. Buschek, M. Bader, E. von Zezschwitz, and A. D. Luca. Automatic privacy classification of personal photos. In Human-Computer Interaction - INTERACT, 2015.
[5]
R. Caruana. Multitask learning. Machine Learning, 28(1):41--75, 1997.
[6]
C. Elkan. The foundations of cost-sensitive learning. In IJCAI, 2001.
[7]
R. Fan, K. Chang, C. Hsieh, X. Wang, and C. Lin. LIBLINEAR: A library for large linear classification. JMLR, 9:1871--1874, 2008.
[8]
Y. Freund and R. E. Schapire. Experiments with a new boosting algorithm. In ICML, 1996.
[9]
A. Gınsca, A. Popescu, H. L. Borgne, N. Ballas, P. Vo, and I. Kanellos. Large-scale image mining with flickr groups. In MultiMedia Modeling Conf., 2015.
[10]
T. Hastie, R. Tibshirani, J. Friedman, T. Hastie, J. Friedman, and R. Tibshirani. The elements of statistical learning. Springer, 2009.
[11]
Y. Liu, P. K. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing facebook privacy settings: user expectations vs. reality. In Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011.
[12]
M. Madejski, M. L. Johnson, and S. M. Bellovin. A study of privacy settings errors in an online social network. In Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012.
[13]
A. K. McCallum. Mallet: A machine learning for language toolkit. http://mallet.cs.umass.edu, 2002.
[14]
K. D. Naini, I. S. Altingovde, R. Kawase, E. Herder, and C. Niederée. Analyzing and predicting privacy settings in the social web. In User Modeling, Adaptation and Personalization, 2015.
[15]
P. A. Norberg, D. R. Horne, and D. A. Horne. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. J. of Consumer Affairs, 41(1):100--126, 2007.
[16]
C. Paine, U. Reips, S. Stieger, A. N. Joinson, and T. Buchanan. Internet users' perceptions of 'privacy concerns' and 'privacy actions'. Int. J. Hum.-Comput. Stud., 65(6):526--536, 2007.
[17]
L. Y. Pratt. Discriminability-based transfer between neural networks. In NIPS, 1992.
[18]
O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, and L. Fei-Fei. Imagenet large scale visual recognition challenge. IJCV, 2015.
[19]
K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. CoRR, 2014.
[20]
E. Spyromitros-Xioufis, S. Papadopoulos, I. Kompatsiaris, G. Tsoumakas, and I. Vlahavas. A comprehensive study over vlad and product quantization in large-scale image retrieval. IEEE Transactions on Multimedia, 2014.
[21]
A. C. Squicciarini, C. Caragea, and R. Balakavi. Analyzing images' privacy for the modern web. In In ACM Hypertext, pages 136--147, 2014.
[22]
A. Tonge and C. Caragea. Image privacy prediction using deep features. In AAAI Conference on Artificial Intelligence, 2016.
[23]
S. Zerr, S. Siersdorfer, and J. S. Hare. Picalert!: a system for privacy-aware image classification and retrieval. In ACM CIKM, pages 2710--2712, 2012.
[24]
S. Zerr, S. Siersdorfer, J. S. Hare, and E. Demidova. Privacy-aware image classification and search. In ACM SIGIR, 2012.

Cited By

View all
  • (2025)Connecting Visual Data to Privacy: Predicting and Measuring Privacy Risks in ImagesElectronics10.3390/electronics1404081114:4(811)Online publication date: 19-Feb-2025
  • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • Show More Cited By

Index Terms

  1. Personalized Privacy-aware Image Classification

                          Recommendations

                          Comments

                          Please enable JavaScript to view thecomments powered by Disqus.

                          Information & Contributors

                          Information

                          Published In

                          cover image ACM Conferences
                          ICMR '16: Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval
                          June 2016
                          452 pages
                          ISBN:9781450343596
                          DOI:10.1145/2911996
                          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                          Sponsors

                          Publisher

                          Association for Computing Machinery

                          New York, NY, United States

                          Publication History

                          Published: 06 June 2016

                          Permissions

                          Request permissions for this article.

                          Check for updates

                          Author Tags

                          1. image privacy
                          2. online social networks
                          3. personalization
                          4. privacy-aware image classification

                          Qualifiers

                          • Research-article

                          Funding Sources

                          Conference

                          ICMR'16
                          Sponsor:
                          ICMR'16: International Conference on Multimedia Retrieval
                          June 6 - 9, 2016
                          New York, New York, USA

                          Acceptance Rates

                          ICMR '16 Paper Acceptance Rate 20 of 120 submissions, 17%;
                          Overall Acceptance Rate 254 of 830 submissions, 31%

                          Contributors

                          Other Metrics

                          Bibliometrics & Citations

                          Bibliometrics

                          Article Metrics

                          • Downloads (Last 12 months)49
                          • Downloads (Last 6 weeks)2
                          Reflects downloads up to 02 Mar 2025

                          Other Metrics

                          Citations

                          Cited By

                          View all
                          • (2025)Connecting Visual Data to Privacy: Predicting and Measuring Privacy Risks in ImagesElectronics10.3390/electronics1404081114:4(811)Online publication date: 19-Feb-2025
                          • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
                          • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
                          • (2023)Deep Gated Multi-modal Fusion for Image Privacy PredictionACM Transactions on the Web10.1145/360844617:4(1-24)Online publication date: 10-Oct-2023
                          • (2023)Raising User Awareness about the Consequences of Online Photo SharingProceedings of the 2023 ACM International Conference on Multimedia Retrieval10.1145/3591106.3592290(10-19)Online publication date: 12-Jun-2023
                          • (2023)Investigating Tangible Privacy-Preserving Mechanisms for Future Smart HomesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581167(1-16)Online publication date: 19-Apr-2023
                          • (2023)Disability-First Design and Creation of A Dataset Showing Private Visual Information Collected With People Who Are BlindProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580922(1-15)Online publication date: 19-Apr-2023
                          • (2023)Understanding and Mitigating Technology-Facilitated Privacy Violations in the Physical WorldProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580909(1-16)Online publication date: 19-Apr-2023
                          • (2023)Modality Coupling for Privacy Image ClassificationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.330141418(4843-4853)Online publication date: 2023
                          • (2022)Privacy Intelligence: A Survey on Image Privacy in Online Social NetworksACM Computing Surveys10.1145/354729955:8(1-35)Online publication date: 23-Dec-2022
                          • Show More Cited By

                          View Options

                          Login options

                          View options

                          PDF

                          View or Download as a PDF file.

                          PDF

                          eReader

                          View online with eReader.

                          eReader

                          Figures

                          Tables

                          Media

                          Share

                          Share

                          Share this Publication link

                          Share on social media