Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms

Pervasive photo sharing in online social media platforms can cause unintended privacy violations when elements of an image reveal sensitive information. Prior studies have identified image obfuscation methods (e.g., blurring) to enhance privacy, but many of these methods adversely affect viewers' satisfaction with the photo, which may cause people to avoid using them. In this paper, we study the novel hypothesis that it may be possible to restore viewers' satisfaction by 'boosting' or enhancing the aesthetics of an obscured image, thereby compensating for the negative effects of a privacy transform. Using a between-subjects online experiment, we studied the effects of three artistic transformations on images that had objects obscured using three popular obfuscation methods validated by prior research. Our findings suggest that using artistic transformations can mitigate some negative effects of obfuscation methods, but more exploration is needed to retain viewer satisfaction.

[1]  William J. Doll,et al.  The Measurement of End-User Computing Satisfaction , 1988, MIS Q..

[2]  Jacob Cohen,et al.  A power primer. , 1992, Psychological bulletin.

[3]  Roberto Manduchi,et al.  Bilateral filtering for gray and color images , 1998, Sixth International Conference on Computer Vision (IEEE Cat. No.98CH36271).

[4]  Margaret Bull Kovera,et al.  Double-blind photoarray administration as a safeguard against investigator bias. , 1999 .

[5]  Irfan A. Essa,et al.  Image and video based painterly animation , 2004, NPAR '04.

[6]  King-Sun Fu,et al.  IEEE Transactions on Pattern Analysis and Machine Intelligence Publication Information , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[7]  James Ze Wang,et al.  Studying Aesthetics in Photographic Images Using a Computational Approach , 2006, ECCV.

[8]  David Salesin,et al.  Video watercolorization using bidirectional texture advection , 2007, SIGGRAPH 2007.

[9]  M. Khan,et al.  SOCIOLINGVISTIKA/ SOCIOLINGUISTICS Academic Sojourners, Culture Shock and Intercultural Adaptation: a Trend Analysis , 2007 .

[10]  Jürgen Döllner,et al.  Image Abstraction by Structure Adaptive Filtering , 2008, TPCG.

[11]  Milena M. Head,et al.  Exploring human images in website design: a multi-method approach , 2009 .

[12]  A. Siibak Constructing the Self through the Photo selection - Visual Impression Management on Social Networking Websites , 2009 .

[13]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[14]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[15]  Steven M. Bellovin,et al.  The Failure of Online Social Network Privacy Settings , 2011 .

[16]  Michael S. Brown,et al.  Constructing image panoramas using dual-homography warping , 2011, CVPR 2011.

[17]  Masashi Nishiyama,et al.  Aesthetic quality classification of photographs based on color harmony , 2011, CVPR 2011.

[18]  A. Meade,et al.  Identifying careless responses in survey data. , 2012, Psychological methods.

[19]  Naila Murray,et al.  AVA: A large-scale database for aesthetic visual analysis , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[20]  Matthew Lease,et al.  Crowdsourcing for Usability Testing , 2012, ASIST.

[21]  Bernard J. Jansen,et al.  Almighty Twitter, what are people asking for? , 2012, ASIST.

[22]  Pamela J. Wisniewski,et al.  Fighting for my space: coping mechanisms for sns boundary regulation , 2012, CHI.

[23]  Leman Pinar Tosun Motives for Facebook use and expressing "true self" on the Internet , 2012, Comput. Hum. Behav..

[24]  Blase Ur,et al.  "i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets , 2013, CHI.

[25]  Lorrie Faith Cranor,et al.  The post that wasn't: exploring self-censorship on facebook , 2013, CSCW.

[26]  Jianxiong Xiao,et al.  What Makes a Photograph Memorable? , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[27]  Virgílio A. F. Almeida,et al.  The impact of visual attributes on online image diffusion , 2014, WebSci '14.

[28]  Aljoscha Smolic,et al.  Automated Aesthetic Analysis of Photographic Images , 2015, IEEE Transactions on Visualization and Computer Graphics.

[29]  Michal Mackiewicz,et al.  Color Correction Using Root-Polynomial Regression , 2015, IEEE Transactions on Image Processing.

[30]  Babak Saleh,et al.  Quantifying Creativity in Art Networks , 2015, ICCC.

[31]  Leon A. Gatys,et al.  A Neural Algorithm of Artistic Style , 2015, ArXiv.

[32]  Radomír Mech,et al.  Deep Multi-patch Aggregation Network for Image Style, Aesthetics, and Quality Estimation , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[33]  Sotiris Ioannidis,et al.  Face/Off: Preventing Privacy Leakage From Photos in Social Networks , 2015, CCS.

[34]  Anne Oeldorf-Hirsch,et al.  Social and Technological Motivations for Online Photo Sharing , 2016 .

[35]  David A. Shamma,et al.  Snap Decisions?: How Users, Content, and Aesthetics Interact to Shape Photo Sharing Behaviors , 2016, CHI.

[36]  Amandeep Dhir,et al.  Uses and Gratifications of digital photo sharing on Facebook , 2016, Telematics Informatics.

[37]  David J. Crandall,et al.  Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[38]  Ravi Ramamoorthi,et al.  Deep high dynamic range imaging of dynamic scenes , 2017, ACM Trans. Graph..

[39]  Hongxin Hu,et al.  Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos , 2017, Proc. ACM Hum. Comput. Interact..

[40]  Jose M. Such,et al.  Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study , 2017, CHI.

[41]  Ran He,et al.  Deep Aesthetic Quality Assessment With Semantic Information , 2016, IEEE Transactions on Image Processing.

[42]  Christena Nippert-Eng,et al.  "You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography , 2018, SOUPS @ USENIX Security Symposium.

[43]  David J. Crandall,et al.  Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy , 2018, CHI.

[44]  Hang Zhang,et al.  Multi-style Generative Network for Real-time Transfer , 2017, ECCV Workshops.

[45]  Elissa M. Redmiles,et al.  How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples , 2019, 2019 IEEE Symposium on Security and Privacy (SP).