38 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
Predicting Privacy Policy Automatically To
the User Uploaded Images on Content Sharing
Sites
Rashmi T.M1
| V. Chetan Kumar2
1PG Scholar, Department of Computer Science and Engineering, P.E.S. College of Engineering, Mandya,
Karnataka, India.
2Assistant Professor, Department of Computer Science and Engineering, P.E.S. College of Engineering,
Mandya, Karnataka, India.
Nowadays sharing of images is increasing through social networking sites but maintaining privacy is a
major problem. While sharing images users knowingly or unknowingly share their personal information. Due
to these incidents, there is a need of tool for setting privacy for their images. To address this need we propose
an adaptive privacy policy prediction (A3P) to set privacy for their images. We are considering the metadata
for predicting the privacy. Our Solution depends on image classification for image categories and predicting
privacy.
KEYWORDS: Online information services, web-based services.
Copyright © 2015 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
Images are the main key enablers for user to
connect in social networking sites. Sharing of
images takes place not only for known person or
group but also for social circles e.g., Google+, Face
book etc. However images may expose sensitive
information of user and they may lead to
unwanted risks and personal information
violations[2],[6].Due to persistent nature of social
media , it allows others to collect information of
owner of published content.[2],[5],[6]. This may
lead to expose of one’s personal information.
Therefore, in this paper we are implementing
adaptive privacy policy prediction(A3P) system
which provides risk free privacy settings
automatically by generating policies[1].
Existing System
 Most social networking sites allow user to enter
their privacy preferences but users struggle to
maintain these types of policies.
 Because user share lot of information on social
media putting privacy policies for each and
everything is difficult task and error-prone.
Disadvantage of Existing System
 Images may expose sensitive information of user
and they may lead to unwanted risks and personal
information violations
 Due to persistent nature of social media, it allows
others to collect information of owner of published
content.
 This may lead to expose of one’s personal
information.
Proposed System
We propose an Adaptive Privacy Policy Prediction
(A3P) system, which aims to provide users a hassle
free privacy settings experience by automatically
generating personalized policies.
Advantages of Proposed System
 The A3P-core focuses on analyzing each individual
user’s own image’s metadata.
 User can set policies automatically by generated
policies.
II. LITERATURE SURVEY
Some studies are carried out to set policies
automatically. Bonneau et al.[3] proposed the
concept of privacy suites which recommend to users
a suite of privacy settings that “expert” users or
ABSTRACT
39 International Journal for Modern Trends in Science and Technology
Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites
other trusted friends have already set, so that normal
users can either directly choose a setting or only
need to do minor modifications. Similarly,
Ravichandran et al.[7] studied how to predict a user’s
privacy preferences for location-based data based on
location and time of day. More recently, Klemperer et
al.[5] studied whether the keywords and captions
with which users tag their photos can be used to help
users more intuitively create and maintain
access-control policies.
III. SYSTEM ARCHITECTURE
3.1 A3P Framework
Privacy policies are privacy preferences
expressed by the user to protect their information
from unwanted disclosure. We define the privacy
policies as follows:
Definition: A privacy policy p of user u consists of the
following components:
 Subject (S):A set of users socially connected
to user U
 Data(D):A set of data items shared by u
 Action(A):A set of action granted by u to S on D
 Condition(C):A Boolean expression which must be
satisfied in order to perform the granted actions.
3.2 A3P Architecture
A3P stands for adaptive privacy policy prediction
system which helps users to derive the privacy
settings for their images. The A3P architecture
consists of the following blocks as shown in the
figure1:
1. Metadata based image classification
2. Adaptive policy prediction
3. Look-up privacy policies
4. Database.
A3P core classifies the images based on the
metadata and predict the policies depending on the
metadata. The look-up privacy policy looks if the
image or similar type of image already exists which
can be given with the similar privacy policies. If
similar type of image doesn’t exist then it looks for all
the policies and lets user choose the policies.
Fig 1: System architecture
3.3 A3P CORE
There are two major components in A3PCore:
1. Image classification
2. Adaptive policy prediction
3.3.1 Metadata-based image classification:
The Metadata-based image classification groups
images into sub-categories. The process consists of
following 3 steps:
Step 1: Extract keywords from the metadata
associated with an image. The metadata
considered are tags, caption and comments.
Identify all the nouns, verbs and adjectives in the
metadata and store them as metadata vectors.
where i, j and k are the total number of nouns,
verbs and adjectives respectively.
Step 2: Derive a representative hypernym ( h) from
each metadata vector. Retrieve the hypernym for
each in a metadata vector based on the Word net
classification and obtain a list of hypernym
where v: hypernym and f :frequency.
Step 3: Find a subcategory that an image belongs
to. At the beginning, the first image forms a
subcategory as itself and the representative
hypernyms of the image becomes the subcategory’s
representative hypernyms. We compute the
distance between representative hypernyms of a
new incoming image and each existing subcategory
[4].
3.3.2 Adaptive policy prediction
There are two major components in the Adaptive
policy prediction process.
1. Policy mining
2. Policy prediction
Policy mining is a process of mining policies for
similar categorized images and policy prediction
process for predicting the policy for user uploaded
images.
Policy mining: Privacy policies are privacy
preferences expressed by the user to protect their
information from unwanted disclosure. Policy
mining process deals with mining of policies by
applying various association rules and steps. This
hierarchical approach considers subject, action
and conditions. It includes following steps:
Step1: apply association rule mining on subject
component of the policies of the new image. Then
40 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
select the best rule by considering the two
measures like support and confidence.
Step 2 : similar to the first step apply association
rule mining on action component . Then select the
best rule.
Step 3: mine the condition component in each
policy set. The best rules are selected which gives
us a set of attributes which often appear in policies.
Policy prediction: the policy mining process may
give us many number of policies, but our system
needs to show the best one to the user thus, this
approach is to choose the best policy for the user
by obtaining the strictness level. The strictness
level describes how strict a policy is. The strictness
can be discovered by two metrics: major level and
coverage rate. The major level is determined with
the help of combinations of subject and action in
policy and coverage rate is determined using the
condition component statement.
IV. CONCLUSION
We have proposed an Adaptive privacy policy
prediction (A3P) system to automate the privacy
policy settings for user uploaded images. And it
provides hassle free policies for user information
on social networking site.
REFERENCES
[1] Anna cinziz squicciarini, member,IEEE, Dan
Lin,Smith Sundareswaran and Joshua
Wede,“Privacy policy inference of user-uploaded
images on content sharing sites”.IEEE
TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING,VOL 27,NO.1, JANUARY 2015
[2] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman,
and R. Nair, “Over-exposed?: Privacy patterns and
considerations in online and mobile photo sharing,”
in Proc. Conf. Human Factors Comput. Syst., 2007,
pp. 357–366.
[3] J. Bonneau, J. Anderson, and L. Church, “Privacy
suites: Shared privacy for social networks,” in Proc.
Symp. Usable Privacy Security, 2009.
[4] L. Geng and H. J. Hamilton, “Interestingness
measures for data mining: A survey,” ACM Comput.
Surv., vol. 38, no. 3, p. 9, 2006.
[5] P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B.
Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter,
“Tag, you can see it!: Using tags for access control in
photo sharing,” in Proc. ACM Annu. Conf. Human
Factors Comput. Syst., 2012, pp. 377–386.
[6] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and
A. Mislove, “Analyzing facebook privacy settings:
User expectations vs. reality,” in Proc.
ACMSIGCOMMConf. Internet Meas. Conf., 2011, pp.
61–70.
[7] R. Ravichandran, M. Benisch, P. Kelley, and N.
Sadeh, “Capturing social networking privacy
preferences,” in Proc. Symp. Usable Privacy Security,
2009.
[8] R. A. Wagner and M. J. Fischer, “The string-to-string
correction problem,” J. ACM, vol. 21, no. 1, pp.
168–173, 1974.

More Related Content

PDF
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
DOCX
Privacy policy inference of user uploaded
PDF
Privacy policy inference of user uploaded images on content sharing sites
DOCX
Privacy policy inference of user uploaded
PPT
Privacy presentation
PDF
iaetsd Adaptive privacy policy prediction for user uploaded images on
PDF
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DOCX
IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded
Privacy presentation
iaetsd Adaptive privacy policy prediction for user uploaded images on
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
IEEE Projects 2015 | Privacy policy inference of user uploaded images on cont...

What's hot (7)

PDF
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
PDF
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
PDF
Social Event Detection using Multimodal Clustering and Integrating Supervisor...
PDF
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
PPTX
Comparison of Articles on Content Based Image Retrieval
PDF
A Survey of Various Intrusion Detection Systems
PDF
Utilizing Noise Addition For Data Privacy, an Overview
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing...
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Social Event Detection using Multimodal Clustering and Integrating Supervisor...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Comparison of Articles on Content Based Image Retrieval
A Survey of Various Intrusion Detection Systems
Utilizing Noise Addition For Data Privacy, an Overview
Ad

Viewers also liked (19)

PDF
Correlation Analysis of Electromyogram Signals
PDF
ANFIS Based UPQC for Power Quality Improvement
PDF
Cut Detection in Wireless Sensor Network
PDF
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
PDF
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
PDF
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
PDF
Reliable and Efficient Data Acquisition in Wireless Sensor Network
PDF
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
PDF
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
PDF
Garden Environmental Monitoring & Automatic Control System Using Sensors
PDF
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
PDF
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
PDF
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
PDF
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
PDF
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
PDF
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
PDF
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
PDF
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
PDF
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Correlation Analysis of Electromyogram Signals
ANFIS Based UPQC for Power Quality Improvement
Cut Detection in Wireless Sensor Network
Applications of Smart Grid through Harmonic Current & Reactive Power Compensa...
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
A New Framework for Kmeans Algorithm by Combining the Dispersions of Clusters
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Analysis of Fuel Cell Based Multilevel DC-DC Boost Converter for Induction Motor
Garden Environmental Monitoring & Automatic Control System Using Sensors
An Efficient Model to Identify A Vehicle by Recognizing the Alphanumeric Char...
Bioanalytical Validated LC-MS Method for Determination of Naproxen in Human P...
An Isolated 3 Phase Multilevel Inverter for PV Cell Applications
Shadow Removal of Individual Tree Crowns in a High Resolution Satellite Imagery
Implementation of Three phase SPWM Inverter with Minimum Number of Power Elec...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Vehicle Monitoring and Tracking System based on ARM7 and Android Application
Modified CSKA Application in the Floating Point Adder using Carry Skip Adder ...
Grid Interfaced 3-phase Solar Inverter with MPPT by using Boost Converter
Ad

Similar to Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites (20)

PDF
A Survey On Privacy Policy Inference for Social Images
PDF
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DOCX
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
DOCX
Privacy policy inference of user uploaded
DOCX
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PDF
My Privacy My decision: Control of Photo Sharing on Online Social Networks
PDF
Optimization of Image Search from Photo Sharing Websites
PDF
Socially Shared Images with Automated Annotation Process by Using Improved Us...
PDF
Ijcatr04041017
DOCX
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PDF
C043109012
PDF
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
PDF
Novel Hybrid Approach to Visual Concept Detection Using Image Annotation
PDF
Attribute Based Image Duplication Alert Message Using Big Data
PDF
Personalized geo tag recommendation for community contributed images
PDF
Implementation of Privacy Policy Specification System for User Uploaded Image...
PDF
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
PDF
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
PDF
Image based search engine
PDF
Privacy Protection Using Formal Logics in Onlne Social Networks
A Survey On Privacy Policy Inference for Social Images
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Privacy policy inference of user uploaded
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
My Privacy My decision: Control of Photo Sharing on Online Social Networks
Optimization of Image Search from Photo Sharing Websites
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Ijcatr04041017
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
C043109012
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Novel Hybrid Approach to Visual Concept Detection Using Image Annotation
Attribute Based Image Duplication Alert Message Using Big Data
Personalized geo tag recommendation for community contributed images
Implementation of Privacy Policy Specification System for User Uploaded Image...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
Image based search engine
Privacy Protection Using Formal Logics in Onlne Social Networks

Recently uploaded (20)

PPTX
quantum theory on the next future in.pptx
PDF
August 2025 Top read articles in International Journal of Database Managemen...
PPTX
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
PPTX
Electric vehicle very important for detailed information.pptx
PDF
ITEC 1010 - Information and Organizations Database System and Big data
PDF
PhD defense presentation in field of Computer Science
PPTX
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
PDF
Operating systems-POS-U1.2.pdf cse gghhu
PDF
Snapchat product teardown product management
PDF
Disaster Management_Lecture_ PPT_Dr. Kunjari Mog, NITH.pdf
PPTX
Embedded Systems Microcontrollers and Microprocessors.pptx
PDF
Manual variador de corriente directa parker.pdf
PDF
Application of smart robotics in the supply chain
PPTX
Ingredients of concrete technology .pptx
PDF
LAST 3 MONTH VOCABULARY MAGAZINE 2025 . (1).pdf
PPTX
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
PDF
Water Supply and Sanitary Engineering Textbook
PDF
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
PPTX
Downstream processing_in Module1_25.pptx
PDF
August 2025 Top Read Articles in - Bioscience & Engineering Recent Research T...
quantum theory on the next future in.pptx
August 2025 Top read articles in International Journal of Database Managemen...
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
Electric vehicle very important for detailed information.pptx
ITEC 1010 - Information and Organizations Database System and Big data
PhD defense presentation in field of Computer Science
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
Operating systems-POS-U1.2.pdf cse gghhu
Snapchat product teardown product management
Disaster Management_Lecture_ PPT_Dr. Kunjari Mog, NITH.pdf
Embedded Systems Microcontrollers and Microprocessors.pptx
Manual variador de corriente directa parker.pdf
Application of smart robotics in the supply chain
Ingredients of concrete technology .pptx
LAST 3 MONTH VOCABULARY MAGAZINE 2025 . (1).pdf
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
Water Supply and Sanitary Engineering Textbook
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
Downstream processing_in Module1_25.pptx
August 2025 Top Read Articles in - Bioscience & Engineering Recent Research T...

Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites

  • 1. 38 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites Rashmi T.M1 | V. Chetan Kumar2 1PG Scholar, Department of Computer Science and Engineering, P.E.S. College of Engineering, Mandya, Karnataka, India. 2Assistant Professor, Department of Computer Science and Engineering, P.E.S. College of Engineering, Mandya, Karnataka, India. Nowadays sharing of images is increasing through social networking sites but maintaining privacy is a major problem. While sharing images users knowingly or unknowingly share their personal information. Due to these incidents, there is a need of tool for setting privacy for their images. To address this need we propose an adaptive privacy policy prediction (A3P) to set privacy for their images. We are considering the metadata for predicting the privacy. Our Solution depends on image classification for image categories and predicting privacy. KEYWORDS: Online information services, web-based services. Copyright © 2015 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION Images are the main key enablers for user to connect in social networking sites. Sharing of images takes place not only for known person or group but also for social circles e.g., Google+, Face book etc. However images may expose sensitive information of user and they may lead to unwanted risks and personal information violations[2],[6].Due to persistent nature of social media , it allows others to collect information of owner of published content.[2],[5],[6]. This may lead to expose of one’s personal information. Therefore, in this paper we are implementing adaptive privacy policy prediction(A3P) system which provides risk free privacy settings automatically by generating policies[1]. Existing System  Most social networking sites allow user to enter their privacy preferences but users struggle to maintain these types of policies.  Because user share lot of information on social media putting privacy policies for each and everything is difficult task and error-prone. Disadvantage of Existing System  Images may expose sensitive information of user and they may lead to unwanted risks and personal information violations  Due to persistent nature of social media, it allows others to collect information of owner of published content.  This may lead to expose of one’s personal information. Proposed System We propose an Adaptive Privacy Policy Prediction (A3P) system, which aims to provide users a hassle free privacy settings experience by automatically generating personalized policies. Advantages of Proposed System  The A3P-core focuses on analyzing each individual user’s own image’s metadata.  User can set policies automatically by generated policies. II. LITERATURE SURVEY Some studies are carried out to set policies automatically. Bonneau et al.[3] proposed the concept of privacy suites which recommend to users a suite of privacy settings that “expert” users or ABSTRACT
  • 2. 39 International Journal for Modern Trends in Science and Technology Predicting Privacy Policy Automatically To the User Uploaded Images on Content Sharing Sites other trusted friends have already set, so that normal users can either directly choose a setting or only need to do minor modifications. Similarly, Ravichandran et al.[7] studied how to predict a user’s privacy preferences for location-based data based on location and time of day. More recently, Klemperer et al.[5] studied whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. III. SYSTEM ARCHITECTURE 3.1 A3P Framework Privacy policies are privacy preferences expressed by the user to protect their information from unwanted disclosure. We define the privacy policies as follows: Definition: A privacy policy p of user u consists of the following components:  Subject (S):A set of users socially connected to user U  Data(D):A set of data items shared by u  Action(A):A set of action granted by u to S on D  Condition(C):A Boolean expression which must be satisfied in order to perform the granted actions. 3.2 A3P Architecture A3P stands for adaptive privacy policy prediction system which helps users to derive the privacy settings for their images. The A3P architecture consists of the following blocks as shown in the figure1: 1. Metadata based image classification 2. Adaptive policy prediction 3. Look-up privacy policies 4. Database. A3P core classifies the images based on the metadata and predict the policies depending on the metadata. The look-up privacy policy looks if the image or similar type of image already exists which can be given with the similar privacy policies. If similar type of image doesn’t exist then it looks for all the policies and lets user choose the policies. Fig 1: System architecture 3.3 A3P CORE There are two major components in A3PCore: 1. Image classification 2. Adaptive policy prediction 3.3.1 Metadata-based image classification: The Metadata-based image classification groups images into sub-categories. The process consists of following 3 steps: Step 1: Extract keywords from the metadata associated with an image. The metadata considered are tags, caption and comments. Identify all the nouns, verbs and adjectives in the metadata and store them as metadata vectors. where i, j and k are the total number of nouns, verbs and adjectives respectively. Step 2: Derive a representative hypernym ( h) from each metadata vector. Retrieve the hypernym for each in a metadata vector based on the Word net classification and obtain a list of hypernym where v: hypernym and f :frequency. Step 3: Find a subcategory that an image belongs to. At the beginning, the first image forms a subcategory as itself and the representative hypernyms of the image becomes the subcategory’s representative hypernyms. We compute the distance between representative hypernyms of a new incoming image and each existing subcategory [4]. 3.3.2 Adaptive policy prediction There are two major components in the Adaptive policy prediction process. 1. Policy mining 2. Policy prediction Policy mining is a process of mining policies for similar categorized images and policy prediction process for predicting the policy for user uploaded images. Policy mining: Privacy policies are privacy preferences expressed by the user to protect their information from unwanted disclosure. Policy mining process deals with mining of policies by applying various association rules and steps. This hierarchical approach considers subject, action and conditions. It includes following steps: Step1: apply association rule mining on subject component of the policies of the new image. Then
  • 3. 40 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST select the best rule by considering the two measures like support and confidence. Step 2 : similar to the first step apply association rule mining on action component . Then select the best rule. Step 3: mine the condition component in each policy set. The best rules are selected which gives us a set of attributes which often appear in policies. Policy prediction: the policy mining process may give us many number of policies, but our system needs to show the best one to the user thus, this approach is to choose the best policy for the user by obtaining the strictness level. The strictness level describes how strict a policy is. The strictness can be discovered by two metrics: major level and coverage rate. The major level is determined with the help of combinations of subject and action in policy and coverage rate is determined using the condition component statement. IV. CONCLUSION We have proposed an Adaptive privacy policy prediction (A3P) system to automate the privacy policy settings for user uploaded images. And it provides hassle free policies for user information on social networking site. REFERENCES [1] Anna cinziz squicciarini, member,IEEE, Dan Lin,Smith Sundareswaran and Joshua Wede,“Privacy policy inference of user-uploaded images on content sharing sites”.IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,VOL 27,NO.1, JANUARY 2015 [2] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, “Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 357–366. [3] J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security, 2009. [4] L. Geng and H. J. Hamilton, “Interestingness measures for data mining: A survey,” ACM Comput. Surv., vol. 38, no. 3, p. 9, 2006. [5] P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386. [6] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing facebook privacy settings: User expectations vs. reality,” in Proc. ACMSIGCOMMConf. Internet Meas. Conf., 2011, pp. 61–70. [7] R. Ravichandran, M. Benisch, P. Kelley, and N. Sadeh, “Capturing social networking privacy preferences,” in Proc. Symp. Usable Privacy Security, 2009. [8] R. A. Wagner and M. J. Fischer, “The string-to-string correction problem,” J. ACM, vol. 21, no. 1, pp. 168–173, 1974.