Abstract
Due to the propagation of devices with imaging capabilities, the amount of pictures taken in public spaces has risen. Due to this, unintentionally photographed bystanders are often represented in pictures without being aware of it. Social networks and search engines make these images easier accessible due to the available meta-data and the tagging and linking functionality provided by these services. Facial recognition amplifies the privacy implications for the individuals in these pictures. Overall there exist three main classes of wearable picture-related Privacy Enhancing Technologies (PETs). As they need different prerequisites to operate and become effective they have unique time frames in the future where they can be effective even if introduced today. The group of face pattern destroying picture PETs work directly against current face detection algorithms and is the choice for immediate usage. These PETs destroy face patterns and inhibit the detection and automated processing and meta-data enrichment of individuals. This unconditionally visual destructive behavior can be a major obstacle in transition to other PETs. In this paper, we describe how to master a smooth transition between these classes including the restoration of the visual damage some of these methods entail. Furthermore, we propose the Smart Privacy Visor, a PET which combines the previously published Privacy Visor and the Picture Privacy Policy Framework. The overall goal of this transition is to create a PET that avoids identifiable and linkable properties which contradicts the goals of picture PETs in the first place and offer a visually appealing photographic result at the same time.
References
Harvey, A.: CV Dazzle (2010–2012) http://cvdazzle.com/ and http://ahprojects.com/projects/cv-dazzle. Accessed 2 November 2014
Yamada, T., Gohshi, S., Echizen, I.: Use of invisible noise signals to prevent privacy invasion through face recognition from camera images. In: Proceedings of the 20th ACM International Conference on Multimedia, MM 2012, pp. 1315–1316. ACM (2012)
Yamada, T., Gohshi, S., Echizen, I.: Privacy visor: method for preventing face image detection by using differences in human and device sensitivity. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 152–161. Springer, Heidelberg (2013)
Yamada, T., Gohshi, S., Echizen, I.: Privacy visor: method based on light absorbing and reflecting properties for preventing face image detection. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2013)
Patel, S.N., Summet, J.W., Truong, K.N.: Blindspot: creating capture-resistant spaces. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 185–201. Springer, London (2009)
Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65–89. Springer, London (2009)
Dabrowski, A., Weippl, E.R., Echizen, I.: Framework based on privacy policy hiding for preventing unauthorized face image processing. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2013)
Pallas, F., Ulbricht, M.R., Jaume-PalasÃ, L., Höppner, U.: Offlinetags: a novel privacy approach to online photo sharing. In: CHI 2014 Extended Abstracts on Human Factors in Computing Systems, pp. 2179–2184. ACM (2014)
Barhm, M.S., Qwasmi, N., Qureshi, F.Z., El-Khatib, K.: Negotiating privacy preferences in video surveillance systems. In: Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K., Ali, M. (eds.) IEA/AIE 2011, Part II. LNCS, vol. 6704, pp. 511–521. Springer, Heidelberg (2011)
Henne, B., Szongott, C., Smith, M.: Snapme if you can: privacy threats of other peoples’ geo-tagged media and what we can do about it. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 95–106. ACM (2013)
Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, p. 8. IEEE (2005)
Yus, R., Pappachan, P., Das, P.K., Mena, E., Joshi, A., Finin, T.: Demo: Faceblock: privacy-aware pictures for google glass. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services. ACM (2014)
Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48–55. ACM (2004)
Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. In: Satoh, S., Nack, F., Etoh, M. (eds.) MMM 2008. LNCS, vol. 4903, pp. 144–154. Springer, Heidelberg (2008)
Moon, H.M., Seo, C.H., Chung, Y., Pan, S.B.: Privacy protection technology in video surveillance system. In: 4th International Conference on Embedded and Multimedia Computing, EM-Com 2009, pp. 1–6. IEEE (2009)
Ashok, A., Nguyen, V., Gruteser, M., Mandayam, N., Yuan, W., Dana, K.: Do not share! invisible light beacons for signaling preferences to privacy-respecting cameras. In: Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, pp. 39–44. ACM (2014)
Koster, M.: A Standard for Robot Exclusion. http://www.robotstxt.org/orig.html. Accessed 15 July 2015
Lin, D., Tang, X.: Quality-driven face occlusion detection and recovery. In: Computer Vision and Pattern Recognition, CVPR 2007, pp. 1–7. IEEE (2007)
Mo, Z., Lewis, J.P., Neumann, U.: Face inpainting with local linear representations. In: BMVC, pp. 1–10 (2004)
Hwang, B.-W., Lee, S.-W.: Reconstructing a whole face image from a partially damaged or occluded image by multiple matching. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 692–701. Springer, Heidelberg (2007)
Jimenez, A.E., Dabrowski, A., Sonehara, N., Martinez, J.M.M., Echizen, I.: Tag detection for preventing unauthorized face image processing. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 513–524. Springer, Heidelberg (2015)
Acknowledgment
This work is supported by the National Institute of Informatics’ internship program, a netidee grant by the Internet Foundation Austria (IPA), and the Comet K1 program of the Austrian Research Promotion Agency (FFG).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Dabrowski, A., Krombholz, K., Weippl, E.R., Echizen, I. (2015). Smart Privacy Visor: Bridging the Privacy Gap. In: Abramowicz, W. (eds) Business Information Systems Workshops. BIS 2015. Lecture Notes in Business Information Processing, vol 228. Springer, Cham. https://doi.org/10.1007/978-3-319-26762-3_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-26762-3_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26761-6
Online ISBN: 978-3-319-26762-3
eBook Packages: Computer ScienceComputer Science (R0)