Tag Detection for Preventing Unauthorized Face Image Processing

被引:0
|
作者
Escalada Jimenez, Alberto [1 ]
Dabrowski, Adrian [2 ]
Sonehara, Noburu [3 ]
Montero Martinez, Juan M. [1 ]
Echizen, Isao [3 ]
机构
[1] Univ Politcn Madrid, ETS Ingn Telecomunicacin, Madrid, Spain
[2] Univ Technol, SBA Res, Vienna, Austria
[3] Natl Inst Informat, Tokyo, Japan
关键词
Privacy; Face detection; Tag detection; Unauthorized face processing;
D O I
10.1007/978-3-319-19321-2_39
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A new technology is being proposed as a solution to the problem of unintentional facial detection and recognition in pictures in which the individuals appearing want to express their privacy preferences, through the use of different tags. The existing methods for face de-identification were mostly ad hoc solutions that only provided an absolute binary solution in a privacy context such as pixelation, or a bar mask. As the number and users of social networks are increasing, our preferences regarding our privacy may become more complex, leaving these absolute binary solutions as something obsolete. The proposed technology overcomes this problem by embedding information in a tag which will be placed close to the face without being disruptive. Through a decoding method the tag will provide the preferences that will be applied to the images in further stages.
引用
收藏
页码:513 / 524
页数:12
相关论文
共 50 条
  • [1] Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing
    Dabrowski, Adrian
    Weippl, Edgar R.
    Echizen, Isao
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 455 - 461
  • [2] Use of Face Detection to Qualify Image Processing Algorithms
    Simske, Steven
    Li, Datong
    Greig, Darryl
    [J]. NIP28: 28TH INTERNATIONAL CONFERENCE ON DIGITAL PRINTING TECHNOLOGIES / DIGITAL FABRICATION 2012, 2012, : 234 - 235
  • [3] Novel Technique for Face Spoof Detection in Image Processing
    Yadav, Mayank
    Gupta, Kunal
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1989 - 1992
  • [4] Preventing unauthorized entry
    Rachel David
    [J]. Nature Reviews Molecular Cell Biology, 2012, 13 : 539 - 539
  • [5] PREVENTING UNAUTHORIZED ENTRY
    COHN, BM
    [J]. SPECIFYING ENGINEER, 1985, 53 (06): : 92 - 96
  • [6] An Effective and Robust Method for Unauthorized Reader Detection Based on Tag's Energy
    Cao, Ziwen
    Xie, Jinxing
    Wang, Siye
    Zhang, Yanfang
    Cui, Yue
    Jiang, Shang
    Jin, Biao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [7] TELOMERES Preventing unauthorized entry
    David, Rachel
    [J]. NATURE REVIEWS MOLECULAR CELL BIOLOGY, 2012, 13 (09) : 539 - 539
  • [8] PREVENTING UNAUTHORIZED USE OF SYSTEMS
    MEISSNER, P
    [J]. DATA PROCESSING, 1977, 19 (07): : 42 - 43
  • [9] Preventing Unauthorized Data Flows
    Uzun, Emre
    Parlato, Gennaro
    Atluri, Vijayalakshmi
    Ferrara, Anna Lisa
    Vaidya, Jaideep
    Sural, Shamik
    Lorenzi, David
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 41 - 62
  • [10] Hadoop Optimization for Massive Image Processing: Case Study Face Detection
    Demir, I.
    Sayar, A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2014, 9 (06) : 664 - 671