Skip to main content

Image Content Location Privacy Preserving in Social Network Travel Image Sharing

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12240))

Included in the following conference series:

  • 1196 Accesses

Abstract

It is a well-known truth that online image sharing can lead to privacy leakage. Although the privacy information may vary in forms, image contents only with private property will be concerned, while other contents that seems public but could reveal personal information are always ignored. In online image sharing, some images may contain labels or landmarks which could reveal the geographic positions where these photos were taken, in which the public content could disclose private location information. To handle such problem, we proposed a travel image location privacy protection system that aims at protecting travel images location. The key issue in this problem is which part of image content is related to the scene and to what extent. To determine such relevance, in our proposed system, several image process methods are utilized to find out potential objects and their belonging classes, and two proposed privacy strategies that respectively focus on quantity and relative position are further implemented to define initial privacy level of each classes. Finally, a privacy predict model is trained in online learning way so that it can be updated with future user feedbacks. We conducted experiment on travel image dataset that related to specific keyword, and the results have demonstrated the effectiveness of our proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bonneau, J., Anderson, J., Church, L.: Privacy suites: shared privacy for social networks. In: Proceedings of the 5th Symposium on Usable Privacy and Security. ACM (2009)

    Google Scholar 

  2. Adu-Oppong, F., Gardiner, C.K., Kapadia, A., et al.: Social circles: tackling privacy in social networks. In: Symposium on Usable Privacy and Security (SOUPS) (2008)

    Google Scholar 

  3. Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World Wide Web, Raleigh, North Carolina, USA, pp. 351–360. ACM (2010)

    Google Scholar 

  4. Klemperer, P., Liang, Y., Mazurek, M., et al.: Tag, you can see it!: using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 377–386. ACM (2012)

    Google Scholar 

  5. Squicciarini, A.C., Lin, D., Sundareswaran, S., et al.: Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans. Knowl. Data Eng. 27(1), 193–206 (2015)

    Article  Google Scholar 

  6. Yu, J., Zhang, B., Kuang, Z., et al.: iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans. Inf. Forensics Secur. 12(5), 1005–1016 (2017)

    Article  Google Scholar 

  7. Yu, J., Kuang, Z., Zhang, B., et al.: Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE Trans. Inf. Forensics Secur. 13(5), 1317–1332 (2018)

    Article  Google Scholar 

  8. Gallagher, A., Joshi, D., Yu, J., et al.: Geo-location inference from image content and user tags. In: 2009 IEEE Computer Society Conference on CVPR Workshops 2009 Computer Vision and Pattern Recognition Workshops, pp. 55–62. IEEE (2009)

    Google Scholar 

  9. Qian, X., Zhao, Y., Han, J.: Image location estimation by salient region matching. IEEE Trans. Image Process. 24(11), 4348–4358 (2015)

    Article  MathSciNet  Google Scholar 

  10. Cui, Q., McIntosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. Comput. Mater. Continua 055(2), 229–241 (2018)

    Google Scholar 

  11. Meng, R., Rice, S.G., Wang, J., Sun, X.: A fusion steganographic algorithm based on faster R-CNN. Comput. Mater. Continua 55(1), 001–016 (2018)

    Google Scholar 

  12. Liu, Z., Xiang, B., Yuqing Song, H.L., Liu, Q.: An improved unsupervised image segmentation method based on multi-objective particle, swarm optimization clustering algorithm. Comput. Mater. Continua 58(2), 451–461 (2019)

    Article  Google Scholar 

  13. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: ICLR (2015)

    Google Scholar 

  14. Frey, B.J., Dueck, D.: Clustering by passing messages between data points. Science 315(5814), 972–976 (2007)

    Google Scholar 

  15. Ren, S., He, K., Girshick, R., et al.: Faster R-CNN: towards real-time object detection with region proposal networks. In: Advances in Neural Information Processing Systems, pp. 91–99 (2015)

    Google Scholar 

  16. McCreath, E.: Partial matching of planar polygons under translation and rotation. In: CCCG (2008)

    Google Scholar 

  17. Breunig, M.M., Kriegel, H.P., Ng, R.T., et al.: LOF: identifying density-based local outliers. ACM SIGMOD Rec. 29(2), 93–104 (2000)

    Article  Google Scholar 

  18. Crammer, K., Dekel, O., Keshet, J., et al.: Online passive-aggressive algorithms. J. Mach. Learn. Res. 7(Mar), 551–585 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wang Xiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiang, W., Yang, C., Jiao, L., Pei, Q. (2020). Image Content Location Privacy Preserving in Social Network Travel Image Sharing. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics