Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy

With the rise of digital photography and social networking, people are sharing personal photos online at an unprecedented rate. In addition to their main subject matter, photographs often capture various incidental information that could harm people's privacy. While blurring and other image filters may help obscure private content, they also often affect the utility and aesthetics of the photos, which is important since images shared in social media are mainly for human consumption. Existing studies of privacy-enhancing image filters either primarily focus on obscuring faces, or do not systematically study how filters affect image utility. To understand the trade-offs when obscuring various sensitive aspects of images, we study eleven filters applied to obfuscate twenty different objects and attributes, and evaluate how effectively they protect privacy and preserve image quality for human viewers.

[1]  Ieee Xplore,et al.  IEEE Transactions on Pattern Analysis and Machine Intelligence Information for Authors , 2022, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  Mario Fritz,et al.  Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[3]  Laura A. Dabbish,et al.  Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.

[4]  Jiasen Lu,et al.  Hierarchical Question-Image Co-Attention for Visual Question Answering , 2016, NIPS.

[5]  Wei Shen,et al.  Learning Residual Images for Face Attribute Manipulation , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[6]  Milena M. Head,et al.  Exploring human images in website design: a multi-method approach , 2009 .

[7]  Matthew Lease,et al.  Crowdsourcing for Usability Testing , 2012, ASIST.

[8]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[9]  Hovav Shacham,et al.  On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction , 2016, Proc. Priv. Enhancing Technol..

[10]  M. Khan,et al.  SOCIOLINGVISTIKA/ SOCIOLINGUISTICS Academic Sojourners, Culture Shock and Intercultural Adaptation: a Trend Analysis , 2007 .

[11]  Carman Neustaedter,et al.  You are Being Watched: Bystanders' Perspective on the Use of Camera Devices in Public Spaces , 2016, CHI Extended Abstracts.

[12]  Shengcai Liao,et al.  A Fast and Accurate Unconstrained Face Detector , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  David J. Crandall,et al.  Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.

[14]  Masood Masoodian,et al.  Sharing, privacy and trust issues for photo collections , 2007 .

[15]  Shree K. Nayar,et al.  Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.

[16]  Ralph Gross,et al.  Face De-identification , 2009, Protecting Privacy in Video Surveillance.

[17]  Ivan Sikiric,et al.  I Know That Person: Generative Full Body and Face De-identification of People in Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[18]  David J. Crandall,et al.  Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[19]  William J. Doll,et al.  The Measurement of End-User Computing Satisfaction , 1988, MIS Q..

[20]  Alfred Kobsa,et al.  Privacy preference modeling and prediction in a simulated campuswide IoT environment , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[21]  Touradj Ebrahimi,et al.  Using face morphing to protect privacy , 2013, 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance.

[22]  Ali Farhadi,et al.  YOLO9000: Better, Faster, Stronger , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[23]  Bill Tomlinson,et al.  Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.

[24]  Sunny Consolvo,et al.  Living in a glass house: a survey of private moments in the home , 2011, UbiComp '11.

[25]  Noboru Babaguchi,et al.  Facial expression preserving privacy protection using image melding , 2015, 2015 IEEE International Conference on Multimedia and Expo (ICME).

[26]  Bernard J. Jansen,et al.  Almighty Twitter, what are people asking for? , 2012, ASIST.

[27]  Ruimin Hu,et al.  Face Super-Resolution via Multilayer Locality-Constrained Iterative Neighbor Embedding and Intermediate Dictionary Learning , 2014, IEEE Transactions on Image Processing.

[28]  Wei Liu,et al.  SSD: Single Shot MultiBox Detector , 2015, ECCV.

[29]  Serge J. Belongie,et al.  Removing pedestrians from Google street view images , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.

[30]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[31]  Hongxin Hu,et al.  Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos , 2017, Proc. ACM Hum. Comput. Interact..

[32]  Hongxia Jin,et al.  Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features , 2016, AAAI.

[33]  Carman Neustaedter,et al.  Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.

[34]  Gail-Joon Ahn,et al.  Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks , 2017, SACMAT.

[35]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[36]  Andrew Senior Protecting Privacy in Video Surveillance , 2009 .

[37]  Ming-Hsuan Yang,et al.  Generative Face Completion , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[38]  Hongxin Hu,et al.  Effectiveness and Users’ Experience of Face Blurring as a Privacy Protection for Sharing Photos via Online Social Networks , 2017 .

[39]  Bin Liu,et al.  PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[40]  Xiaoming Liu,et al.  Disentangled Representation Learning GAN for Pose-Invariant Face Recognition , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[41]  Vitaly Shmatikov,et al.  Defeating Image Obfuscation with Deep Learning , 2016, ArXiv.

[42]  Peter B. Seddon,et al.  A Partial Test and Development of Delone and Mclean's Model of IS Success , 1996, Australas. J. Inf. Syst..

[43]  Hongxin Hu,et al.  Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[44]  Jeffrey P. Bigham,et al.  VizWiz: nearly real-time answers to visual questions , 2010, W4A.

[45]  Xiaoming Liu,et al.  Attribute preserved face de-identification , 2015, 2015 International Conference on Biometrics (ICB).

[46]  Li Zhang,et al.  Controllable Face Privacy , 2015, 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).

[47]  Edoardo M. Airoldi,et al.  Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.

[48]  Margaret Mitchell,et al.  VQA: Visual Question Answering , 2015, International Journal of Computer Vision.

[49]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[50]  Yunhao Liu,et al.  POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[51]  A. Meade,et al.  Identifying careless responses in survey data. , 2012, Psychological methods.