Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing

被引:8
|
作者
Dabrowski, Adrian [1 ]
Weippl, Edgar R. [1 ]
Echizen, Isao [2 ]
机构
[1] Vienna Univ Technol, SBA Res, A-1040 Vienna, Austria
[2] Natl Inst Informat, Tokyo, Japan
关键词
privacy invasion; involuntary photographs; unintentional photographs; DRM;
D O I
10.1109/SMC.2013.83
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We put forward a framework to address a problem created by the rapidly spreading use of imaging devices and related to involuntarily or unintentionally photographed individuals: their pictures can accumulate additional meta information via face recognition systems and can be manually tagged via social networks and publishing platforms. With this framework a user can express his/her picture privacy policy in a machine readable format and (to some extent) automatically enforce it. An easily understandable flag system is used to define restrictions on picture usage and linkability. This policy is encoded in an unobtrusive way into wardrobe patterns and accessory designs with almost no impact on apparel appearance or social interaction.
引用
收藏
页码:455 / 461
页数:7
相关论文
共 50 条
  • [1] Tag Detection for Preventing Unauthorized Face Image Processing
    Escalada Jimenez, Alberto
    Dabrowski, Adrian
    Sonehara, Noburu
    Montero Martinez, Juan M.
    Echizen, Isao
    [J]. DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 513 - 524
  • [2] Privacy Visor: Method based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection
    Yamada, Takayuki
    Gohshi, Seiichi
    Echizen, Isao
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 1572 - 1577
  • [3] Face Image Publication Based on Differential Privacy
    Liu, Chao
    Yang, Jing
    Zhao, Weinan
    Zhang, Yining
    Li, Jingyou
    Mu, Chunmiao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [4] Hiding Among Your Neighbors: Face Image Privacy Protection with Differential Private k-anonymity
    Cao, Jingyi
    Liu, Bo
    Wen, Yunqian
    Zhu, Yunhui
    Xie, Rong
    Song, Li
    Li, Lin
    Yin, Yaoyao
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2022,
  • [5] Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding
    Sun, Jianglin
    Liao, Xiaofeng
    Chen, Xin
    Guo, Shangwei
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2017, 27 (05):
  • [6] Reversible data hiding based compressible privacy preserving system for color image
    Joshi, Vaibhav B.
    Raval, Mehul S.
    Kuribayashi, Minoru
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (13) : 16597 - 16622
  • [7] Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity
    Yamada, Takayuki
    Gohshi, Seiichi
    Echizen, Isao
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 152 - 161
  • [8] Face Recognition Technology Based On Image Processing
    Xin, Chen
    Li, Yajuan
    Tian, Zhimin
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 341 - 345
  • [9] Reversible data hiding based compressible privacy preserving system for color image
    Vaibhav B. Joshi
    Mehul S. Raval
    Minoru Kuribayashi
    [J]. Multimedia Tools and Applications, 2018, 77 : 16597 - 16622
  • [10] A Real Sense based multilevel security in cloud framework using Face recognition and Image processing
    Warke, K. S.
    Suralkar, Rupali
    Pawar, Snehal
    Sonawane, Priya
    Wani, Shraddha
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 531 - 533