Privacy-aware tag recommendation for image sharing

Ashwini Tonge, Cornelia Caragea, Anna Squicciarini

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Image tags are very important for indexing, sharing, searching, and surfacing images with private content that needs protection. As the tags are at the sole discretion of users, they tend to be noisy and incomplete. In this paper, we present a privacy-aware approach to automatic image tagging, which aims at improving the quality of user annotations, while also preserving the images' original privacy sharing patterns. Precisely, we recommend potential tags for each target image by mining privacy-aware tags from the most similar images of the target image obtained from a large collection. Experimental results show that privacy-aware approach is able to predict accurate tags that can improve the performance of a downstream application on image privacy prediction. Crowd-sourcing predicted tags exhibit the quality of the recommended tags.

Original languageEnglish (US)
Title of host publicationHT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media
PublisherAssociation for Computing Machinery, Inc
Pages52-56
Number of pages5
ISBN (Electronic)9781450354271
DOIs
StatePublished - Jul 3 2018
Event29th ACM International Conference on Hypertext and Social Media, HT 2018 - Baltimore, United States
Duration: Jul 9 2018Jul 12 2018

Publication series

NameHT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media

Other

Other29th ACM International Conference on Hypertext and Social Media, HT 2018
Country/TerritoryUnited States
CityBaltimore
Period7/9/187/12/18

All Science Journal Classification (ASJC) codes

  • Software
  • Artificial Intelligence
  • Human-Computer Interaction
  • Computer Graphics and Computer-Aided Design

Fingerprint

Dive into the research topics of 'Privacy-aware tag recommendation for image sharing'. Together they form a unique fingerprint.

Cite this