Académique Documents
Professionnel Documents
Culture Documents
BACHELOR OF ENGINEERING
in
by
Gangaram Sreeya (160714733061)
Yeruva Sravya(160714733064)
Ch.Vatsalya Pooja(160714733084)
This is to certify that this Internship report entitled “Privacy Policy Inference of User-Uploaded
Images on Content Sharing Sites” being submitted by Gangaram Sreeya(160714733061), Yeruva
Sravya (160714733064) and Ch.Vatsalya Pooja (160714733084), submitted in partial fulfillment of
the requirements for the degree of Bachelor of Engineering in Computer Science and Engineering,
during the academic year 2019-2020, is a bonfide record of work carried out by them.
Mr. R. Sandeep
Assistant Professor,
Date:
Methodist College of Engineering and Technology,
King Koti , Abids , Hyderabad-500001.
This is to certify that this Internship report entitled “PRIVACY POLICY INFERENCE OF
USER-UPLOADED IMAGES ON CONTENT SHARING SITES“ BY Gangaram
Sreeya(160714733061), Yeruva Sravya(160714733064), Ch.Vatsalya Pooja(160714733084),
submitted in partial fulfillment of the requirements for the degree of Bachelor of Engineering in
Computer Science and Engineering of the Osmania University, Hyderabad, during the academic
year 2019-2020, is a bonafide record of work carried out by them.
Mrs. P. Lavanya
Associate Professor,
DATE
ACKNOWLEDGEMNTS
We would like to express our sincere gratitude to my Internship guide Mr. Sandeep R,
Assistant Professor, for giving us the opportunity to work on this topic. It would never be
possible for us to take this project to this level without his innovative ideas and his relentless
support and encouragement.
We would like to thank our Internship coordinator Mr. Sandeep R, Assistant Professor, who
helped us by being an example of high vision and pushing towards greater limits of achievement.
Our sincere thanks to Mrs. P. Lavanya, Associate Professor and Head of the Department of
Computer Science and Engineering, for her valuable guidance and encouragement which has
played a major role in the completion of the project and for helping us by being an example of
high vision and pushing towards greater limits of achievement.
We would like to express a deep sense of gratitude towards the Dr. G. Ravinder Reddy,
Principal, Methodist College of Engineering and Technology, for always being an inspiration
and for always encouraging us in every possible way.
We would like to express a deep sense of gratitude towards the Dr. Lakshmipathi Rao,
Director, Methodist College of Engineering and Technology, for always being an inspiration
and for always encouraging us in every possible way.
We are indebted to the Department of Computer Science & Engineering and Methodist College
of Engineering and Technology for providing us with all the required facility to carry our work
in a congenial environment. We extend our gratitude to the CSE Department staff for providing
us to the needful time to time whenever requested.
We would like to thank our parents for allowing us to realize our potential, all the support they
have provided us over the years was the greatest gift anyone has ever given us and also for
teaching us the value of hard work and education. Our parents has offered us with tremendous
support and encouragement, thanks to our parents for all the moral support and the amazing
opportunities they have given us over the years.
ABSTRACT
With the increasing volume of images users share through social sites, maintaining privacy has
become a major problem, as demonstrated by a recent wave of publicized incidents where users
inadvertently shared personal information. In light of these incidents, the need of tools to help
users control access to their shared content is apparent. Toward addressing this need, we propose
an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for
their images. We examine the role of social context, image content, and metadata as possible
indicators of user’s privacy preferences. We propose a two-level framework which according to
the user’s available history on the site, determines the available privacy policy for the user’s
images being uploaded. Our solution relies on an image classification framework for image
categories which may be associated with similar policies, and on a policy prediction algorithm to
automatically generate a policy for each newly uploaded image, also according to users’ social
features. Over time, the generated policies will follow the evolution of users’ privacy attitude.
Contents
Abstract
Introduction……………………………………………………………….…..01
Design Analysis………………………………………………………………...05
3.1 System architecture………………………………………………………………….05
3.2 Data flow diagram…………………………………………………………………..06
Implementation……………………………………………………………......14
4.1 Modules………………………………………………………………………………14
4.2 Modules Description…………………………………………………………………14
4.2.1 System Construction Module………………………………………………14
4.2.2 Content-Based Classification………………………………………...….....14
4.2.3 Metadata –Based Classification……………………………………………15
4.2.4 Adaptive Policy Prediction………………………………………………...15
7.3 Screenshots…………………………………………………………………………..23
Conclusion………………………………………………………………………..33
References………………………………………………………………………...34
Appendix A: Sample Code………………………………………………………36
Appendix C: Technologies Used………………………………………………...46
List of Figures
1
drastically different opinions even on the same type of images. For example, a privacy adverse
person may be willing to share all his personal images while a more conservative person may
just want to share personal images with his family members. In light of these considerations, it is
important to find the balancing point between the impact of social environment and users’
individual characteristics in order to predict the policies that match each individual’s needs.
Moreover, individuals may change their overall attitude toward privacy as time passes. In order
to develop a personalized policy recommendation system, such changes on privacy opinions
should be carefully considered.
The role of image’s content and metadata. In general, similar images often incur
similar privacy preferences, especially when people appear in the images. For example, one may
upload several photos of his kids and specify that only his family members are allowed to see
these photos. He may upload some other photos of landscapes which he took as a hobby and for
these photos, he may set privacy preference allowing anyone to view and comment the photos.
Analyzing the visual content may not be sufficient to capture users’ privacy preferences. Tags
and other metadata are indicative of the social context of the image, including where it was taken
and why and also provide a synthetic description of images, complementing the information
obtained from visual content analysis. Corresponding to the aforementioned two criteria, the
proposed A3P system is comprised of two main building blocks: A3P-Social and A3P-Core.
The A3P-core focuses on analyzing each individual user’s own images and
metadata, while the A3P-Social offers a community perspective of privacy setting
recommendations for a user’s potential privacy improvement. We design the interaction flows
between the two building blocks to balance the benefits from meeting personal characteristics
and obtaining community advice. To assess the practical value of our approach, we built a
system prototype and performed an extensive experimental evaluation. We collected and tested
over 5,500 real policies generated by more than 160 users. Our experimental results demonstrate
both efficiency and high prediction accuracy of our system. A preliminary discussion of the
A3P-core was presented in. In this work, we present an overhauled version of A3P, which
includes an extended policy prediction algorithm in A3P-core (that is now parameterized based
on user groups and also factors in possible outliers), and a new A3P-social module that develops
the notion of social context to refine and extend the prediction power of our system.
2
DESIGN ANALYSIS
• A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system, modelling its process aspects.
• A DFD is often used as a preliminary step to create an overview of the system without
going into great detail, which can later be elaborated.
6
3.3 E-R Diagram:
An Entity Relationship (ER) Diagram is a type of flowchart that illustrates how
“entities” such as people, objects or concepts relate to each other within a system. ER Diagrams
are most often used to design or debug relational databases in the fields of software engineering,
business information systems, education and research. Also known as ERDs or ER Models, they
use a defined set of symbols such as rectangles, diamonds, ovals and connecting lines to depict
the interconnectedness of entities, relationships and their attributes. They mirror grammatical
structure, with entities as nouns and relationships as verbs.
7
Implementation
4.1 MODULES
This project consists of the following modules:
System Construction Module
Content-Based Classification
Metadata-Based Classification
Adaptive Policy Prediction
14
possible that some images are included in multiple categories as long as they contain the typical
content features or metadata of those categories.
Our approach to content-based classification is based on an efficient and yet accurate image
similarity approach. Specifically, our classification algorithm compares image signatures defined
based on quantified and sanitized version of transformation. For each image, the wavelet
transform encodes frequency and spatial information related to image color, size, invariant
transform, shape, texture, symmetry, etc. Then, a small number of coefficients are selected to
form the signature of the image. The content similarity among images is then determined by the
distance among their image signatures.
Input Design plays a vital role in the life cycle of software development, it
requires very careful attention of developers. The input design is to feed data to the application
as accurate as possible. So inputs are supposed to be designed effectively so that the errors
occurring while feeding are minimized. According to Software Engineering Concepts, the input
forms or screens are designed to provide to have a validation control over the input limit, range
and other related validations.
This system has input screens in almost all the modules. Error messages are
developed to alert the user whenever he commits some mistakes and guides him in the right way
so that invalid entries are not made. Let us see deeply about this under module design.
Input design is the process of converting the user created input into a computer-
based format. The goal of the input design is to make the data entry logical and free from errors.
The error is in the input are controlled by the input design. The application has been developed in
user-friendly manner. The forms have been designed in such a way during the processing the
cursor is placed in the position where must be entered. The user is also provided with in an
option to select an appropriate input from various alternatives related to the field in certain cases.
Validations are required for each data entered. Whenever a user enters an
erroneous data, error message is displayed and the user can move on to the subsequent pages
after completing all the entries in the current page.
The Output from the computer is required to mainly create an efficient method of
communication within the company primarily among the project leader and his team members, in
other words, the administrator and the clients. The output of VPN is the system which allows the
project leader to manage his clients in terms of creating new clients and assigning new projects to
them, maintaining a record of the project validity and providing folder level access to each client
18
on the user side depending on the projects allotted to him. After completion of a project, a new
project may be assigned to the client. User authentication procedures are maintained at the initial
stages itself. A new user may be created by the administrator himself or a user can himself
register as a new user but the task of assigning projects and validating a new user rests with the
administrator only.
The application starts running when it is executed for the first time. The server
has to be started and then the internet explorer in used as the browser. The project will run on the
local area network so the server machine will serve as the administrator while the other
connected systems can act as the clients. The developed system is highly user friendly and can be
easily understood by anyone using it even for the first time.
19
TESTING
Unit testing focuses verification effort on the smallest unit of Software design that
is the module. Unit testing exercises specific paths in a module’s control structure to ensure
complete coverage and maximum error detection. This test focuses on each module individually,
ensuring that it functions properly as a unit. Hence, the naming is Unit Testing.
During this testing, each module is tested individually and the module interfaces
are verified for the consistency with design specification. All important processing path are
tested for the expected results. All error handling paths are also tested.
20
7.2.2 Integration Testing
Integration testing addresses the issues associated with the dual problems of
verification and program construction. After the software has been integrated a set of high order
tests are conducted. The main objective in this testing process is to take unit tested modules and
builds a program structure that has been dictated by design. The following are the types of
Integration Testing:
1. Top Down Integration
This method is an incremental approach to the construction of program structure.
Modules are integrated by moving downward through the control hierarchy, beginning with the
main program module. The module subordinates to the main program module are incorporated
into the structure in either a depth first or breadth first manner.
2. Bottom-up Integration
This method begins the construction and testing with the modules at the lowest
level in the program structure. Since the modules are integrated from the bottom up, processing
required for modules subordinate to a given level is always available and the need for stubs is
eliminated. The bottom up integration strategy may be implemented with the following steps:
• The low-level modules are combined into clusters into clusters that perform a specific
Software sub-function.
• A driver (i.e.) the control program for testing is written to coordinate test case input and
output.
• The cluster is tested.
User Acceptance of a system is the key factor for the success of any system. The
system under consideration is tested for user acceptance by constantly keeping in touch with the
prospective system users at the time of developing and making changes wherever required. The
system developed provides a friendly user interface that can easily be understood even by a
person who is new to the system.
21
7.3 Screenshots
Figure 7.3.1:HomePage
24
Figure 7.3.5:Admin images with Ranking
25
Figure 7.3.7:Admin-view all users
26
Figure 7.3.9: User-Add Image
CONCLUSION
We have proposed an Adaptive Privacy Policy Prediction (A3P) system that helps
users automate the privacy policy settings for their uploaded images. The A3P system provides a
comprehensive framework to infer privacy preferences based on the information available for a
given user. We also effectively tackled the issue of cold-start, leveraging social context
information. Our experimental study proves that our A3P is a practical tool that offers significant
Improvements over current approaches to privacy.
33
REFERENCES
[1] A. Acquisti and R. Gross, “Imagined communities: Awareness, information sharing, and
privacy on the facebook,” in Proc. 6th Int. Conf. Privacy Enhancing Technol. Workshop, 2006,
pp. 36–58.
[2] R. Agrawal and R. Srikant,“Fast algorithms for mining association rules in large databases,”
in Proc. 20th Int. Conf. Very Large Data Bases, 1994, pp. 487–499.
[3] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, “Over-exposed?: Privacy
patterns and considerations in online and mobile photo sharing,” in Proc. Conf. Human Factors
Comput. Syst., 2007, pp. 357–366.
[4] M. Ames and M. Naaman, “Why we tag: Motivations for annotation in mobile and online
media,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 971–980.
[5] A. Besmer and H. Lipford, “Tagged photos: Concerns, perceptions, and protections,” in Proc.
27th Int. Conf. Extended Abstracts Human Factors Comput. Syst., 2009, pp. 4585–4590.
[6] D. G. Altman and J. M. Bland ,“Multiple significance tests: The bonferroni method,” Brit.
Med. J., vol. 310, no. 6973, 1995.
[7] J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,”
in Proc. Symp. Usable Privacy Security, 2009.
[8] J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,” in Proc. Int.
Conf. Adv. Soc. Netw. Anal. Mining., 2009, pp.249–254.
[9] H.-M. Chen, M.-H. Chang, P.-C. Chang, M.-C. Tien, W. H. Hsu, and J.-L. Wu, “Sheepdog:
Group and tag recommendation for flickr photos by automatic search-based learning,” in Proc.
16th ACM Int. Conf. Multimedia, 2008, pp. 737–740.
[10] M. D. Choudhury, H. Sundaram, Y.-R. Lin, A. John, and D. D. Seligmann, “Connecting
content to community in social media via image content, user tags and user communication,” in
Proc. IEEE Int. Conf. Multimedia Expo, 2009, pp.1238–1241.
[11] L. Church, J. Anderson, J. Bonneau, and F. Stajano, “Privacy stories: Confidence on privacy
behaviors through end user programming,” in Proc. 5th Symp. Usable Privacy Security, 2009.
[12] R. da Silva Torres and A. Falc~ao, “Content-based image retrieval: Theory and
applications,” Revista de Inform_atica Te_orica e Aplicada, vol. 2, no. 13, pp. 161–185, 2006.
APPENDIX - A
Sample code
Add_image.jsp
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
36
<!--[if lt IE 9]>
<![endif]--></head>
<body id="page1">
<div class="bg">
<div class="main">
<header>
<div class="row-1">
<fieldset>
<div class="search-form">
</fieldset>
</form>
</div>
</header>
<div class="padding">
APPENDIX B
Software and Hardware Requirements
Software Requirements
Database : My SQL
Hardware Requirements
RAM : 1GB
Hard Disk : 40 GB
45
APPENDIX - C
Technology Used
JAVA
You can think of Java byte codes as the machine code instructions for the Java
Virtual Machine (Java VM). Every Java interpreter, whether it’s a development tool or a Web
browser that can run applets, is an implementation of the Java VM. Java byte codes help make
“write once, run anywhere” possible. You can compile your program into byte codes on any
platform that has a Java compiler. The byte codes can then be run on any implementation of the
46
Java VM. That means that as long as a computer has a Java VM, the same program written in the
Java programming language can run on Windows 2000, a Solaris workstation, or on an iMac.
Native code is code that after you compile it, the compiled code runs on a specific
hardware platform. As a platform-independent environment, the Java platform can be a bit slower
than native code. However, smart compilers, well-tuned interpreters, and just-in-time byte code
compilers can bring performance close to that of native code without threatening portability.
47
only web components while an application server supports web components as well as business
components (BEAs Weblogic, is one of the popular application server).To develop a web
application with jsp/servlet install any web server like JRun, Tomcat etc to run your application.
50