Privacy-aware image classification and search

S Zerr, S Siersdorfer, J Hare, E Demidova - Proceedings of the 35th …, 2012 - dl.acm.org
Modern content sharing environments such as Flickr or YouTube contain a large amount of
private resources such as photos showing weddings, family holidays, and private parties …

Ontology based image retrieval by utilizing model annotations and content

JF Banu, P Muneeshwari, K Raja… - … on Cloud Computing …, 2022 - ieeexplore.ieee.org
Study on image indexing and retrieval concepts have evolved the research further on
Content Based Image Retrieval (CBIR). The CBIR system analyses the image content …

Lifelogging: Privacy and empowerment with memories for life

K O'hara, MM Tuffield, N Shadbolt - Identity in the Information Society, 2008 - Springer
The growth of information acquisition, storage and retrieval capacity has led to the
development of the practice of lifelogging, the undiscriminating collection of information …

Image annotation: Then and now

PK Bhagat, P Choudhary - Image and Vision Computing, 2018 - Elsevier
Automatic image annotation (AIA) plays a vital role in dealing with the exponentially growing
digital images. Image annotation helps in effective retrieval, organization, classification, auto …

Automatic label suggestions for albums based on machine learning

PR Sanketi, H Aradhye, R Carceroni - US Patent 8,886,576, 2014 - Google Patents
Methods and apparatus for Suggesting image, video, and image album titles are presented.
A machine-learning service executing on a mobile platform receives feature-related data …

Ratsnake: A Versatile Image Annotation Tool with Application to Computer‐Aided Diagnosis

DK Iakovidis, T Goudas, C Smailis… - The Scientific World …, 2014 - Wiley Online Library
Image segmentation and annotation are key components of image‐based medical computer‐
aided diagnosis (CAD) systems. In this paper we present Ratsnake, a publicly available …

Attribute based proxy re-encryption for data confidentiality in cloud computing environments

JM Do, YJ Song, N Park - 2011 First ACIS/JNU International …, 2011 - ieeexplore.ieee.org
To ensure data confidentiality and fine-grained access control in cloud computing
environments, a recent study proposed system model using Key Policy-Attribute Based …

Exploring the Importance of Themes in Narrative Systems

C Hargood - 2009 - eprints.soton.ac.uk
The problem of presenting information surrounds the need to make information relevant,
personalised and engaging. As a prevalent form of presenting information narratives can be …

Towards the semantic and context-aware management of mobile multimedia

W Viana, AD Miron, B Moisuc, J Gensel… - Multimedia Tools and …, 2011 - Springer
Users of mobile devices can nowadays easily create large quantities of mobile multimedia
documents tracing significant events attended, places visited or, simply, moments of their …

Semi-automatic photo annotation strategies using event based clustering and clothing based person recognition

B Suh, BB Bederson - Interacting with Computers, 2007 - academic.oup.com
Managing a large number of digital photos is a challenging task for casual users. Personal
photos often don't have rich metadata, or additional information associated with them …