Skip to main content

Photo Tagging, And Sneaky Algorithms

A new algorithm designed at the University of Toronto could change the way we find photos among the billions on social media sites such as Facebook and Flickr.

Developed by Parham Aarabi, a professor in The Edward S. Rogers Sr. Department of Electrical & Computer Engineering, and his former Master’s student Ron Appel, the search tool uses the locations of tagged persons to quantify relationships between them, even those not tagged in any given photo.

Imagine you and your mother are pictured together, building a sandcastle at the beach. You’re both tagged in the photo quite close together. In the next photo, you and your father are eating watermelon. You’re both tagged. Because of your close ‘tagging’ relationship with both your mother in the first picture and your father in the second, the algorithm can determine that a relationship exists between those two and quantify how strong it may be.

In a third photo, you fly a kite with both parents, but only your mother is tagged. Given the strength of your “tagging” relationship with your parents, when you search for photos of your father the algorithm can return the untagged photo because of the very high likelihood he’s pictured.

“Two things are happening: we understand relationships, and we can search images better,” says Professor Aarabi.

The nimble algorithm, called relational social image search, achieves high reliability without using computationally intensive object- or facial-recognition software.

Read the rest of "New Algorithm Finds You, Even In Untagged Photos" at KurzweilAI.net


Comments

Popular posts from this blog

VPN Use Is Up, Up, Up

Since the repeal of the Broadband Consumer Privacy Rules, VPN use and traffic is rather predictably spiking, according to many VPN providers. VPNs are not the b-all and end-all of privacy though, and indeed the usual cretins have stepped in to provide shady VPN services that may actually sell on user data.

Also remember:
ISPs still track your location data and DNS records, even if you're using a VPN. Similarly, a VPN doesn't stop a company from using on-device snoopware to track you (remember Carrier IQ?). Neither will it stop ISPs from charging you a premium for privacy (something both AT&T and Comcast have already experimented with). Nor will a VPN stop a company from using your credit score to provide worse customer service (something CableONE has crowed about). DSL Reports

Microsoft's Mild Mea Culpa Over Windows 10 Obscure Upgrade "Choice"

In a cleansing act before the turn of the year, a Microsoft bigwig has admitted that they may have gotten a little carried away in their zeal to upgrade as many users as possible to Windows 10.
Specifically, Chief Marketing Officer Chris Capossela referred to the upgrade notification that appeared to be deliberately deceptive in the way it handled a users response. If a user clicked the red "X" at the top right of the notice, that closed the dialog box but went ahead and installed the upgrade anyway.
To actually not accept the upgrade, you had to click a link in the notification window itself. Not a few users would come back later and find their system upgraded to Windows 10, or in the process of doing so, when they thought they had expressed their wish not to do so. "Within a couple of hours of that hitting the world, with the listening systems we have, we knew that we had gone too far and then, of course, it takes some time to roll out the update that changes that …

pCloud Cloud Storage On Linux

As a cheapskate user of the Dropbox free plan, I was looking to see if there was another provider that offered a little more free storage than the 2GB from Dropbox (I actually have 2.5GB, due to a couple of bonus offers).
After a bit of research, I came up with Swiss-based pCloud: it has a client for Linux, as well as Windows, Mac, iOS and Android. The free tier offers 10GB of Cloud storage with no file size limits, which is fantastic for my (pretty basic) needs. You can set up your account first from the pCloud website, or during the client install process.