Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Image privacy decision recommendation system and method under social network on the basis of privacy rule and perceptual Hash

A social network and perceptual hash technology, applied in the field of privacy protection of social network images, can solve the problems of cumbersome process, error-prone, additional semantic information to the content to be protected by image privacy protection technology, etc., and achieve the effect of reducing privacy leakage.

Active Publication Date: 2016-01-20
HEFEI UNIV OF TECH
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. The current image privacy protection method is manually selected by the user. The process is cumbersome and error-prone. The system cannot provide intelligent privacy decisions when users upload images, and cannot help users with low self-protection awareness such as teenagers or when they are drunk Delicious users provide privacy decision support
[0006] 3. The existing image privacy protection technology does not attach semantic information to the content to be protected
[0007] 4. Some large social network companies abroad, such as Facebook, try to use machine learning (Deep Learning, Deep Learning) to solve social network privacy protection and decision-making recommendation problems, but machine learning-based methods require a large number of sample learning in advance. There are deficiencies in efficiency, personalization, etc. At present, deep learning technology has not been developed enough, and it cannot meet the real-time needs of social network digital image privacy decision-making.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image privacy decision recommendation system and method under social network on the basis of privacy rule and perceptual Hash
  • Image privacy decision recommendation system and method under social network on the basis of privacy rule and perceptual Hash
  • Image privacy decision recommendation system and method under social network on the basis of privacy rule and perceptual Hash

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In this example, if figure 1 As shown, an image privacy decision-making recommendation system based on privacy rules and perceptual hashing social network, the decision-making recommendation system includes: privacy object registration module, privacy rule definition module, privacy decision recommendation module, privacy object hash fingerprint library and privacy rule base;

[0031] The privacy object registration module receives the pictures containing the protected objects submitted by the user and the semantic tags set by the user, and performs image recognition on the pictures to obtain the hash fingerprints of the protected objects in the pictures; then compares the hash fingerprints with the set semantic tags Store them together in the privacy object hash fingerprint database;

[0032] The privacy rule definition module is used to select the semantic tags stored in the privacy object hash fingerprint library, obtain the tag set, and set the corresponding privac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image privacy decision recommendation system and method under a social network on the basis of a privacy rule and perceptual Hash. The invention is characterized in that the system comprises a privacy object registration module, a privacy rule definition module and a privacy decision recommendation module, wherein the privacy object registration module provides a registration function of an object to be protected for a user; the privacy rule definition module defines a privacy security level for a to-be-protected objet of the user; and the privacy decision recommendation module identifies a to-be-uploaded object of the user, compares the to-be-uploaded object of the user with a protected object in a Hash fingerprint database and a privacy rule in a privacy rule base, and finally submits the privacy security level of the to-be-uploaded object to the privacy decision recommendation module of the user. The quick and convenient automatic calculation of the privacy level and decision recommendation can be realized, and the leakage risks of individuals and the families of the individual can be effectively lowered so as to greatly improve the protection safety of user individual image privacy.

Description

technical field [0001] The invention belongs to the field of privacy protection of social network images, in particular to a method for making privacy decision-making recommendations for social network images in combination with semantic rules. Background technique [0002] The rapid development of the mobile Internet has made it very common for people to log in to social networks on mobile terminals. At the same time, the use of digital images in the Internet is becoming more and more extensive. Text-based social networking has evolved into image-based social networking, and the rich amount of information brought by images more satisfies people's needs for information sharing and obtaining. However, because images carry richer information, it is easier to leak user privacy. For example, in daily life, a picture randomly uploaded by a social network user is likely to reveal an item he owns or his relationship with another person in the photo, and this information can provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30G06Q50/00
CPCG06F16/951G06F21/6263G06F2221/2107G06Q50/01
Inventor 胡东辉陈帆郝海彤戴立胡晓霞
Owner HEFEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products