skip to main content
10.1145/2638728.2641707acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

MarkIt: privacy markers for protecting visual secrets

Published: 13 September 2014 Publication History

Abstract

The increasing popularity of wearable devices that continuously capture video, and the prevalence of third-party applications that utilize these feeds have resulted in a new threat to privacy. In many situations, sensitive objects/regions are maliciously (or accidentally) captured in a video frame by third-party applications. However, current solutions do not allow users to specify and enforce fine grained access control over video feeds.
In this paper, we describe MarkIt, a computer vision based privacy marker framework, that allows users to specify and enforce fine grained access control over video feeds. We present two example privacy marker systems -- PrivateEye and WaveOff. We conclude with a discussion of the computer vision, privacy and systems challenges in building a comprehensive system for fine grained access control over video feeds.

References

[1]
Belussi, L. F., and Hirata, N. S. Fast component-based qr code detection in arbitrarily acquired images. J. Math. Imaging Vis. (2013).
[2]
Chaudhari, J., Cheung, S., and Venkatesh, M. Privacy protection for life-log video. In SAFE (2007).
[3]
Enev, M., Jung, J., Bo, L., Ren, X., and Kohno, T. Sensorsift: Balancing sensor data privacy and utility in automated face understanding. ACSAC (2012).
[4]
Everingham, M., Van Gool, L., Williams, C. K. I., Winn, J., and Zisserman, A. The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results. http://www.pascal-network.org/challenges/VOC/voc2012/workshop/index.html.
[5]
Ha, K., Chen, Z., Hu, W., Richter, W., Pillai, P., and Satyanarayanan, M. Towards wearable cognitive assistance. MobiSys (2014).
[6]
Hodges, S., Williams, L., Berry, E., Izadi, S., Srinivasan, J., Butler, A., Smyth, G., Kapur, N., and Wood, K. Sensecam: A retrospective memory aid. UbiComp (2006).
[7]
Jana, S., Molnar, D., Moshchuk, A., Dunn, A., Livshits, B., Wang, H. J., and Ofek, E. Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers. In USENIX Security (2013).
[8]
Jana, S., Narayanan, A., and Shmatikov, V. A Scanner Darkly: Protecting User Privacy from Perceptual Applications. In S & P (2013).
[9]
Juels, A. Rfid security and privacy: a research survey. Selected Areas in Communications, IEEE Journal on (2006).
[10]
Kalal, Z., Mikolajczyk, K., and Matas, J. Tracking-learning-detection. PAMI (2012).
[11]
Metz, R. More connected homes, more problems. MIT Technology Review (2013).
[12]
Ra, M.-R., Sheth, A., Mummert, L., Pillai, P., Wetherall, D., and Govindan, R. Odessa: Enabling interactive perception applications on mobile devices. MobiSys (2011).
[13]
Rastogi, V., Suciu, D., and Welbourne, E. Access control over uncertain data. VLDB (2008).
[14]
Roesner, F., Kohno, T., and Molnar, D. Security and privacy for augmented reality systems. Commun. ACM (2014).
[15]
Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., and Wang, H. J. World-driven access control for continuous sensing. Tech. Rep. MSR-TR-2014-67, 2014.
[16]
Sample, A., Macomber, C., Jiang, L.-T., and Smith, J. Optical localization of passive uhf rfid tags with integrated leds. In RFID (2012).
[17]
Schiff, J., Meingast, M., Mulligan, D., Sastry, S., and Goldberg, K. Respectful cameras: detecting visual markers in real-time to address privacy concerns. In IROS (2007).
[18]
Templeman, R., Korayem, M., Crandall, D., and Kapadia, A. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In NDSS (2014).

Cited By

View all
  • (2024)Getting it Just Right: Towards Balanced Utility, Privacy, and Equity in Shared Space SensingACM Transactions on Internet of Things10.1145/36484795:2(1-26)Online publication date: 29-Feb-2024
  • (2024)Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive ExposureProceedings of the ACM on Human-Computer Interaction10.1145/36374328:CSCW1(1-32)Online publication date: 26-Apr-2024
  • (2023)LocInProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620287(877-894)Online publication date: 9-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
September 2014
1409 pages
ISBN:9781450330473
DOI:10.1145/2638728
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 September 2014

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

UbiComp '14
UbiComp '14: The 2014 ACM Conference on Ubiquitous Computing
September 13 - 17, 2014
Washington, Seattle

Acceptance Rates

Overall Acceptance Rate 764 of 2,912 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)36
  • Downloads (Last 6 weeks)4
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Getting it Just Right: Towards Balanced Utility, Privacy, and Equity in Shared Space SensingACM Transactions on Internet of Things10.1145/36484795:2(1-26)Online publication date: 29-Feb-2024
  • (2024)Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive ExposureProceedings of the ACM on Human-Computer Interaction10.1145/36374328:CSCW1(1-32)Online publication date: 26-Apr-2024
  • (2023)LocInProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620287(877-894)Online publication date: 9-Aug-2023
  • (2023)BystandAR: Protecting Bystander Visual Data in Augmented Reality SystemsProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596830(370-382)Online publication date: 18-Jun-2023
  • (2023)Mobile Diminished Reality for Preserving 3D Visual Privacy2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA)10.1109/iMETA59369.2023.10294436(01-07)Online publication date: 18-Sep-2023
  • (2023)Robots as AI Double Agents: Privacy in Motion Planning2023 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)10.1109/IROS55552.2023.10341460(2861-2868)Online publication date: 1-Oct-2023
  • (2023)Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality2023 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICNC57223.2023.10074372(188-194)Online publication date: 20-Feb-2023
  • (2023)Extreme Low-Resolution Action Recognition with Confident Spatial-Temporal Attention TransferInternational Journal of Computer Vision10.1007/s11263-023-01771-4131:6(1550-1565)Online publication date: 8-Mar-2023
  • (2023)Privacy and Security Issues and Solutions for Mixed Reality ApplicationsSpringer Handbook of Augmented Reality10.1007/978-3-030-67822-7_7(157-183)Online publication date: 1-Jan-2023
  • (2022)ARSpy: Breaking Location-Based Multi-Player Augmented Reality Application for User Location TrackingIEEE Transactions on Mobile Computing10.1109/TMC.2020.300774021:2(433-447)Online publication date: 1-Feb-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media