Privacy Intelligence: A Survey on Image Privacy in Online Social Networks

Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also increased the risk of privacy invasion. An online image can reveal various types of sensitive information, prompting the public to rethink individual privacy needs in OSN image sharing critically. However, the interaction of images and OSN makes the privacy issues significantly complicated. The current real-world solutions for privacy management fail to provide adequate personalized, accurate, and flexible privacy protection. Constructing a more intelligent environment for privacy-friendly OSN image sharing is urgent in the near future. Meanwhile, given the dynamics in both users’ privacy needs and OSN context, a comprehensive understanding of OSN image privacy throughout the entire sharing process is preferable to any views from a single side, dimension, or level. To fill this gap, we contribute a survey of “privacy intelligence” that targets modern privacy issues in dynamic OSN image sharing from a user-centric perspective. Specifically, we present the important properties and a taxonomy of OSN image privacy, along with a high-level privacy analysis framework based on the lifecycle of OSN image sharing. The framework consists of three stages with different principles of privacy by design. At each stage, we identify typical user behaviors in OSN image sharing and their associated privacy issues. Then a systematic review of representative intelligent solutions to those privacy issues is conducted, also in a stage-based manner. The analysis results in an intelligent “privacy firewall” for closed-loop privacy management. Challenges and future directions in this area are also discussed.

[1]  Tianqing Zhu,et al.  Privacy Data Diffusion Modeling and Preserving in Online Social Network , 2023, IEEE Transactions on Knowledge and Data Engineering.

[2]  K. Palaniappan,et al.  “Do You Know You Are Tracked by Photos That You Didn’t Take”: Large-Scale Location-Aware Multi-Party Image Privacy Protection , 2023, IEEE Transactions on Dependable and Secure Computing.

[3]  Yonghe Liu,et al.  Gender-Adversarial Networks for Face Privacy Preserving , 2022, IEEE Internet of Things Journal.

[4]  M. Dong,et al.  BPT: A Blockchain-Based Privacy Information Preserving System for Trust Data Collection Over Distributed Mobile-Edge Network , 2022, IEEE Internet of Things Journal.

[5]  Tianqing Zhu,et al.  Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack , 2022, IEEE Transactions on Dependable and Secure Computing.

[6]  Xirong Li,et al.  DRAG: Dynamic Region-Aware GCN for Privacy-Leaking Image Detection , 2022, AAAI.

[7]  Wanlei Zhou,et al.  Visual privacy attacks and defenses in deep learning: a survey , 2022, Artificial Intelligence Review.

[8]  M. He,et al.  A Label Uncertainty-Guided Multi-Stream Model for Disease Screening , 2022, 2022 IEEE 19th International Symposium on Biomedical Imaging (ISBI).

[9]  E. D. Val,et al.  A Review of Privacy Decision-making Mechanisms in Online Social Networks , 2022, ACM Computing Surveys.

[10]  Christoph Meinel,et al.  Enabling Co-owned Image Privacy on Social Media via Agent Negotiation , 2021, iiWAS.

[11]  Yu Zheng,et al.  Learning multi-level and multi-scale deep representations for privacy image classification , 2021, Multim. Tools Appl..

[12]  Yonggang Huang,et al.  Learning multi-level and multi-scale deep representations for privacy image classification , 2021, Multimedia Tools and Applications.

[13]  Jinpeng Chen,et al.  Automatic Tagging by Leveraging Visual and Annotated Features in Social Media , 2021, IEEE Transactions on Multimedia.

[14]  Micah Goldblum,et al.  LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition , 2021, ICLR.

[15]  Jian Weng,et al.  A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing , 2021, IEEE Transactions on Network Science and Engineering.

[16]  Yu Wang,et al.  GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things , 2020, Sensors.

[17]  Abdurrahman Can Kurtan,et al.  Assisting humans in privacy management: an agent-based approach , 2020, Autonomous Agents and Multi-Agent Systems.

[18]  Jintao Li,et al.  Graph-based neural networks for explainable image privacy inference , 2020, Pattern Recognit..

[19]  Philip S. Yu,et al.  More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence , 2020, IEEE Transactions on Knowledge and Data Engineering.

[20]  Apu Kapadia,et al.  Privacy Norms and Preferences for Photos Posted Online , 2020, ACM Trans. Comput. Hum. Interact..

[21]  Laurence T. Yang,et al.  An Extended Framework of Privacy-Preserving Computation With Flexible Access Control , 2020, IEEE Transactions on Network and Service Management.

[22]  Mario Fritz,et al.  Automatically Detecting Bystanders in Photos to Reduce Privacy Risks , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[23]  Yisroel Mirsky,et al.  The Creation and Detection of Deepfakes , 2020, ACM Comput. Surv..

[24]  Florian Alt,et al.  The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions , 2020, CHI.

[25]  Dorothea Kolossa,et al.  Leveraging Frequency Analysis for Deep Fake Image Recognition , 2020, ICML.

[26]  Jun Zhu,et al.  Towards Face Encryption by Generating Adversarial Identity Masks , 2020, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).

[27]  Ben Y. Zhao,et al.  Fawkes: Protecting Privacy against Unauthorized Deep Learning Models , 2020, USENIX Security Symposium.

[28]  John Wojewidka,et al.  The deepfake threat to face biometrics , 2020 .

[29]  Philip H. S. Torr,et al.  Global Texture Enhancement for Fake Face Detection in the Wild , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[30]  Chen Change Loy,et al.  DeeperForensics-1.0: A Large-Scale Dataset for Real-World Face Forgery Detection , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[31]  Arun Ross,et al.  PrivacyNet: Semi-Adversarial Networks for Multi-Attribute Face Privacy , 2020, IEEE Transactions on Image Processing.

[32]  A. Morales,et al.  DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection , 2020, Inf. Fusion.

[33]  Fang Wen,et al.  Face X-Ray for More General Face Forgery Detection , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[34]  Alexei A. Efros,et al.  CNN-Generated Images Are Surprisingly Easy to Spot… for Now , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[35]  Samuel Greengard,et al.  Will deepfakes do deep damage? , 2019, Commun. ACM.

[36]  Yevgeniy Vorobeychik,et al.  Protecting Geolocation Privacy of Photo Collections , 2019, AAAI.

[37]  H. B. McMahan,et al.  Generative Models for Effective ML on Private, Decentralized Datasets , 2019, ICLR.

[38]  Camille Marini,et al.  Substra: a framework for privacy-preserving, traceable and collaborative Machine Learning , 2019, ArXiv.

[39]  Cristian Canton-Ferrer,et al.  The Deepfake Detection Challenge (DFDC) Preview Dataset , 2019, ArXiv.

[40]  Yongkang Wong,et al.  Human-imperceptible Privacy Protection Against Machines , 2019, ACM Multimedia.

[41]  Kai Kunze,et al.  Private Reader: Using Eye Tracking to Improve Reading Privacy in Public Spaces , 2019, MobileHCI.

[42]  Siwei Lyu,et al.  Celeb-DF: A Large-Scale Challenging Dataset for DeepFake Forensics , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[43]  Saeid Nahavandi,et al.  Deep Learning for Deepfakes Creation and Detection , 2019, ArXiv.

[44]  Sunil Aryal,et al.  Unsupervised Deep Features for Privacy Image Classification , 2019, PSIVT.

[45]  Tao Mei,et al.  Deep Collaborative Embedding for Social Image Understanding , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[46]  Sudipta N. Sinha,et al.  Privacy Preserving Image Queries for Camera Localization , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[47]  Chuan Qin,et al.  Effective reversible data hiding in encrypted image with adaptive encoding strategy , 2019, Inf. Sci..

[48]  Di Niu,et al.  FDML: A Collaborative Machine Learning Framework for Distributed Features , 2019, KDD.

[49]  Liyue Fan,et al.  Practical Image Obfuscation with Provable Privacy , 2019, 2019 IEEE International Conference on Multimedia and Expo (ICME).

[50]  Chitta Baral,et al.  Integrating Knowledge and Reasoning in Image Understanding , 2019, IJCAI.

[51]  Chi Lin,et al.  VizWiz-Priv: A Dataset for Recognizing the Presence and Purpose of Private Visual Information in Images Taken by Blind People , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[52]  David J. Crandall,et al.  Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms , 2019, CHI.

[53]  Noboru Babaguchi,et al.  Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services , 2019, IEEE Transactions on Information Forensics and Security.

[54]  Xiao Liu,et al.  STGAN: A Unified Selective Transfer Network for Arbitrary Image Attribute Editing , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[55]  Tao Li,et al.  AnonymousNet: Natural Face De-Identification With Measurable Privacy , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[56]  Sing Bing Kang,et al.  Revealing Scenes by Inverting Structure From Motion Reconstructions , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[57]  Ang Li,et al.  HideMe: Privacy-Preserving Photo Sharing on Social Networks , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[58]  Linke Guo,et al.  If You Do Not Care About It, Sell It: Trading Location Privacy in Mobile Crowd Sensing , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[59]  Dariu Gavrila,et al.  Privacy Protection in Street-View Panoramas Using Depth and Multi-View Imagery , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[60]  K. Balaji,et al.  Towards privacy preserving content based image retrieval in cloud computing , 2019 .

[61]  Marc Pollefeys,et al.  Privacy Preserving Image-Based Localization , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[62]  Jacob Whitehill,et al.  Privacy-Preserving Annotation of Face Images Through Attribute-Preserving Face Synthesis , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[63]  Yan Zhang,et al.  Trust-Based Privacy-Preserving Photo Sharing in Online Social Networks , 2019, IEEE Transactions on Multimedia.

[64]  Cornelia Caragea,et al.  Dynamic Deep Multi-modal Fusion for Image Privacy Prediction , 2019, WWW.

[65]  Tianjian Chen,et al.  Federated Machine Learning: Concept and Applications , 2019 .

[66]  Andreas Rössler,et al.  FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[67]  Wei Xiong,et al.  Foreground-Aware Image Inpainting , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[68]  Sébastien Marcel,et al.  DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.

[69]  Osamah M. Al-Omair,et al.  A Comparative Study on Detection Accuracy of Cloud-Based Emotion Recognition Services , 2018, SPML '18.

[70]  Mario Fritz,et al.  Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[71]  Veton Kepuska,et al.  Automated Facial Expression and Speech Emotion Recognition App Development on Smart Phones using Cloud Computing , 2018, 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[72]  Wai-tian Tan,et al.  Learning Sensitive Images Using Generative Models , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[73]  Zhenyu Wu,et al.  Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.

[74]  Cornelia Caragea,et al.  Privacy-Aware Tag Recommendation for Image Sharing , 2018, HT.

[75]  Pan Hui,et al.  Cardea: context-aware visual privacy protection for photo taking and sharing , 2018, MMSys.

[76]  Siwei Lyu,et al.  In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking , 2018, ArXiv.

[77]  Bernt Schiele,et al.  Adversarial Scene Editing: Automatic Object Removal from Weak Supervision , 2018, NeurIPS.

[78]  Mthulisi Velempini,et al.  Privacy and user awareness on Facebook , 2018, South African Journal of Science.

[79]  Richa Singh,et al.  Anonymizing k-Facial Attributes via Adversarial Perturbations , 2018, IJCAI.

[80]  Larry S. Davis,et al.  Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[81]  Andrew Owens,et al.  Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.

[82]  Jianping Fan,et al.  Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing , 2018, IEEE Transactions on Information Forensics and Security.

[83]  Cornelia Caragea,et al.  On the Use of "Deep" Features for Online Image Sharing , 2018, WWW.

[84]  David J. Crandall,et al.  Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy , 2018, CHI.

[85]  Bernt Schiele,et al.  A Hybrid Model for Identity Obfuscation by Face Replacement , 2018, ECCV.

[86]  Yong Jae Lee,et al.  Learning to Anonymize Faces for Privacy Preserving Action Detection , 2018, ECCV.

[87]  M. Kosinski,et al.  Deep Neural Networks Are More Accurate Than Humans at Detecting Sexual Orientation From Facial Images , 2018, Journal of personality and social psychology.

[88]  Xiaofeng Chen,et al.  Blockchain-based publicly verifiable data deletion scheme for cloud storage , 2018, J. Netw. Comput. Appl..

[89]  Chuan Qin,et al.  Visible watermark removal scheme based on reversible data hiding and image inpainting , 2018, Signal Process. Image Commun..

[90]  William Puech,et al.  An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.

[91]  Thomas S. Huang,et al.  Generative Image Inpainting with Contextual Attention , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[92]  Weiwei Sun,et al.  Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs) , 2018, ACM Trans. Multim. Comput. Commun. Appl..

[93]  Bo Wang,et al.  Deep Regression Forests for Age Estimation , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[94]  Hongxin Hu,et al.  Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos , 2017, Proc. ACM Hum. Comput. Interact..

[95]  Tribhuvanesh Orekondy,et al.  Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[96]  Jian Yang,et al.  FSRNet: End-to-End Learning Face Super-Resolution with Facial Priors , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[97]  G. Miklau,et al.  A theory of pricing private data , 2017 .

[98]  Luc Van Gool,et al.  Natural and Effective Obfuscation by Head Inpainting , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[99]  Chao Yang,et al.  Contextual-Based Image Inpainting: Infer, Match, and Translate , 2017, ECCV.

[100]  Landon P. Cox,et al.  CamForensics: Understanding Visual Privacy Leaks in the Wild , 2017, SenSys.

[101]  Junjun Jiang,et al.  Noise Robust Face Image Super-Resolution Through Smooth Sparse Representation , 2017, IEEE Transactions on Cybernetics.

[102]  Yao Lu,et al.  An automatic visible watermark removal technique using image inpainting algorithms , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).

[103]  Arun Ross,et al.  Soft biometric privacy: Retaining biometric utility of face images while perturbing gender , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[104]  B. S. Manjunath,et al.  Exploiting Spatial Structure for Localizing Manipulated Image Regions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[105]  Yutao Ma,et al.  Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey , 2017, IEEE Network.

[106]  Torsten Sattler,et al.  Efficient & Effective Prioritized Matching for Large-Scale Image-Based Localization , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[107]  Christos Anagnostopoulos,et al.  Leveraging Edge Computing through Collaborative Machine Learning , 2017, 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[108]  Ming Dong,et al.  Using Ranking-CNN for Age Estimation , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[109]  Nina Narodytska,et al.  Simple Black-Box Adversarial Attacks on Deep Neural Networks , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[110]  Hiroshi Ishikawa,et al.  Globally and locally consistent image completion , 2017, ACM Trans. Graph..

[111]  Paolo Bestagini,et al.  Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[112]  Meng Wang,et al.  Facial Age Estimation With Age Difference , 2017, IEEE Transactions on Image Processing.

[113]  Ashwin Machanavajjhala,et al.  Protecting Visual Secrets Using Adversarial Nets , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[114]  Hongxin Hu,et al.  Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[115]  Qingguo Zhou,et al.  Intelligent monitor system based on cloud and convolutional neural networks , 2017, The Journal of Supercomputing.

[116]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[117]  Jose M. Such,et al.  Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study , 2017, CHI.

[118]  Naixue Xiong,et al.  EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..

[119]  Jianping Fan,et al.  iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , 2017, IEEE Transactions on Information Forensics and Security.

[120]  Muttukrishnan Rajarajan,et al.  Efficient Privacy-Preserving Facial Expression Classification , 2017, IEEE Transactions on Dependable and Secure Computing.

[121]  Shi-Jinn Horng,et al.  Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs , 2017, IEEE Transactions on Vehicular Technology.

[122]  Patrick Pérez,et al.  MoFA: Model-Based Deep Convolutional Face Autoencoder for Unsupervised Monocular Reconstruction , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[123]  Tribhuvanesh Orekondy,et al.  Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[124]  Seong Joon Oh,et al.  Adversarial Image Perturbation for Privacy Protection A Game Theory Perspective , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[125]  Hyunsoo Kim,et al.  Learning to Discover Cross-Domain Relations with Generative Adversarial Networks , 2017, ICML.

[126]  Yuguang Fang,et al.  My Privacy My Decision: Control of Photo Sharing on Online Social Networks , 2017, IEEE Transactions on Dependable and Secure Computing.

[127]  Wei-Ta Chu,et al.  Predicting Occupation from Images by Combining Face and Body Context Information , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[128]  Alexander Gude,et al.  Sampled Image Tagging and Retrieval Methods on User Generated Content , 2016, BMVC.

[129]  Alexei A. Efros,et al.  Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[130]  Cong Wang,et al.  SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[131]  Dawn Xiaodong Song,et al.  Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.

[132]  Seyed-Mohsen Moosavi-Dezfooli,et al.  Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[133]  Ahmed Ahmim,et al.  Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[134]  Christian Ledig,et al.  Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[135]  Oisin Mac Aodha,et al.  Unsupervised Monocular Depth Estimation with Left-Right Consistency , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[136]  Vitaly Shmatikov,et al.  Defeating Image Obfuscation with Deep Learning , 2016, ArXiv.

[137]  Nikola Pavesic,et al.  De-identification for privacy protection in multimedia content: A survey , 2016, Signal Process. Image Commun..

[138]  Kien A. Hua,et al.  Field Effect Deep Networks for Image Recognition with Incomplete Data , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[139]  Seong Joon Oh,et al.  Faceless Person Recognition: Privacy Implications in Social Media , 2016, ECCV.

[140]  Justus Thies,et al.  Face2Face: Real-Time Face Capture and Reenactment of RGB Videos , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[141]  Qinghua Li,et al.  PrivacyCamera: Cooperative Privacy-Aware Photographing with Mobile Phones , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[142]  Seong Joon Oh,et al.  I-Pic: A Platform for Privacy-Compliant Image Capture , 2016, MobiSys.

[143]  Ashwin Machanavajjhala,et al.  What You Mark is What Apps See , 2016, MobiSys.

[144]  Yiannis Kompatsiaris,et al.  Personalized Privacy-aware Image Classification , 2016, ICMR.

[145]  Bin Liu,et al.  PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[146]  Gang Hua,et al.  Ordinal Regression with Multiple Output CNN for Age Estimation , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[147]  Patrick D. McDaniel,et al.  Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.

[148]  Heinrich Hußmann,et al.  You Can't Watch This!: Privacy-Respectful Photo Browsing on Smartphones , 2016, CHI.

[149]  Kirstie Hawkey,et al.  Enhancing Mobile Content Privacy with Proxemics Aware Notifications and Protection , 2016, CHI.

[150]  Alexei A. Efros,et al.  Context Encoders: Feature Learning by Inpainting , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[151]  Li Fei-Fei,et al.  Perceptual Losses for Real-Time Style Transfer and Super-Resolution , 2016, ECCV.

[152]  Gustavo Carneiro,et al.  Unsupervised CNN for Single View Depth Estimation: Geometry to the Rescue , 2016, ECCV.

[153]  Jemal H. Abawajy,et al.  Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.

[154]  Vitaly Shmatikov,et al.  Can we still avoid automatic face detection? , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).

[155]  Hongxia Jin,et al.  Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features , 2016, AAAI.

[156]  Qingming Huang,et al.  Joint Multi-View Representation Learning and Image Tagging , 2016, AAAI.

[157]  Ananthram Swami,et al.  Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.

[158]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[159]  Torsten Sattler,et al.  Camera Pose Voting for Large-Scale Image-Based Localization , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[160]  Sotiris Ioannidis,et al.  Face/Off: Preventing Privacy Leakage From Photos in Social Networks , 2015, CCS.

[161]  Xian Wang,et al.  An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..

[162]  In-So Kweon,et al.  Accurate depth map estimation from a lenslet light field camera , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[163]  Sanjeev J. Koppal,et al.  Privacy preserving optics for miniature vision sensors , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[164]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[165]  Alexandros André Chaaraoui,et al.  Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..

[166]  M. Shamim Hossain,et al.  Cloud-Assisted Speech and Face Recognition Framework for Health Monitoring , 2015, Mobile Networks and Applications.

[167]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[168]  Christopher Krügel,et al.  Portrait of a Privacy Invasion , 2015, Proc. Priv. Enhancing Technol..

[169]  H. Jin Kim,et al.  Real-time monocular image-based 6-DoF localization , 2015, Int. J. Robotics Res..

[170]  Agusti Solanas,et al.  Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures , 2015, Comput. J..

[171]  K. Ramanjaneyulu,et al.  Literature Review on Digital Image Watermarking , 2015, ICARCSET '15.

[172]  Joseph K. Liu,et al.  Privacy Concerns for Photo Sharing in Online Social Networks , 2015, IEEE Internet Computing.

[173]  Dacheng Tao,et al.  A Comprehensive Survey on Pose-Invariant Face Recognition , 2015, ACM Trans. Intell. Syst. Technol..

[174]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[175]  Xiaoou Tang,et al.  Image Super-Resolution Using Deep Convolutional Networks , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[176]  Rajeev Kumar Singh,et al.  A Survey: Digital Image Watermarking Techniques , 2014 .

[177]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[178]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[179]  Guosheng Lin,et al.  Deep convolutional neural fields for depth estimation from a single image , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[180]  Xiang-Yang Li,et al.  Privacy.tag: privacy concern expressed and respected , 2014, SenSys.

[181]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[182]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[183]  Cornelia Caragea,et al.  Analyzing images' privacy for the modern web , 2014, HT.

[184]  Frank Pallas,et al.  Offlinetags: a novel privacy approach to online photo sharing , 2014, CHI Extended Abstracts.

[185]  Jose M. Such,et al.  BFF: A tool for eliciting tie strength and user communities in social networking services , 2013, Information Systems Frontiers.

[186]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[187]  Ahmed N. Abdalla,et al.  Robust Image Watermarking Theories and Techniques: A Review , 2014 .

[188]  Sarah Spiekermann,et al.  Oblivion on the Web: An Inquiry of User Needs and Technologies , 2014, ECIS.

[189]  Alfred Kobsa,et al.  Dimensionality of information disclosure behavior , 2013, Int. J. Hum. Comput. Stud..

[190]  Jacob M. Victor The EU General Data Protection Regulation: Toward a Property Regime for Protecting Data Privacy , 2013 .

[191]  Lakshminarayanan Subramanian,et al.  Cryptagram: photo privacy for online social media , 2013, COSN '13.

[192]  Cheryl Brown,et al.  An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites , 2013 .

[193]  Niklas Carlsson,et al.  A peer-to-peer agent community for digital oblivion in online social networks , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[194]  Catuscia Palamidessi,et al.  Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.

[195]  Matthew Smith,et al.  Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help , 2013, Financial Cryptography Workshops.

[196]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[197]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[198]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[199]  Jonathon S. Hare,et al.  PicAlert!: a system for privacy-aware image classification and retrieval , 2012, CIKM.

[200]  Jonathon S. Hare,et al.  Privacy-aware image classification and search , 2012, SIGIR '12.

[201]  Aaron Roth,et al.  Buying private data at auction: the sensitive surveyor's problem , 2012, SECO.

[202]  Blase Ur,et al.  Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.

[203]  João Paulo Pesce,et al.  Privacy attacks in social media using photo tagging networks: a case study with Facebook , 2012, PSOSM '12.

[204]  Michael Backes,et al.  X-pire! - A digital expiration date for images in social networks , 2011, ArXiv.

[205]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[206]  Josep Domingo-Ferrer,et al.  Rational enforcement of digital oblivion , 2011, PAIS '11.

[207]  Dan Feng,et al.  SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[208]  Rui Li,et al.  Survey on social tagging techniques , 2010, SKDD.

[209]  Aaron Roth,et al.  Selling privacy at auction , 2010, EC '11.

[210]  Jennifer Neville,et al.  Modeling relationship strength in online social networks , 2010, WWW '10.

[211]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[212]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[213]  Evimaria Terzi,et al.  A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[214]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[215]  Helen Nissenbaum,et al.  Privacy in Context , 2009 .

[216]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[217]  Nigel Shadbolt,et al.  Providing Access Control to Online Photo Albums Based on Tags and Linked Data , 2009, AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0.

[218]  Heather Richter Lipford,et al.  Strategies and struggles with privacy in an online social networking community , 2008, BCS HCI.

[219]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[220]  John G. Breslin,et al.  The State of the Art in Tag Ontologies: A Semantic Model for Tagging and Folksonomies , 2008, Dublin Core Conference.

[221]  Chris Hanson,et al.  Using Dependency Tracking to Provide Explanations for Policy Management , 2008, 2008 IEEE Workshop on Policies for Distributed Systems and Networks.

[222]  Heather Richter Lipford,et al.  Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.

[223]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[224]  Deirdre K. Mulligan,et al.  Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[225]  Ankur Chattopadhyay,et al.  PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[226]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[227]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[228]  Ray Bernard,et al.  Information Lifecycle Security Risk Assessment: A tool for closing security gaps , 2007, Comput. Secur..

[229]  Drummond Reed,et al.  OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.

[230]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[231]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[232]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[233]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[234]  T.E. Boult,et al.  PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).

[235]  Tom Petrocelli,et al.  Data Protection and Information Lifecycle Management , 2005 .

[236]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[237]  Peter Carey,et al.  Data Protection: A Practical Guide to UK and EU Law , 2004 .

[238]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[239]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[240]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[241]  R. Gregory,et al.  Knowledge in perception and illusion. , 1997, Philosophical transactions of the Royal Society of London. Series B, Biological sciences.

[242]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[243]  J. Neumann Zur Theorie der Gesellschaftsspiele , 1928 .

[244]  Noboru Babaguchi,et al.  Unnoticeable synthetic face replacement for image privacy protection , 2021, Neurocomputing.

[245]  Anna Cinzia Squicciarini,et al.  REMIND: Risk Estimation Mechanism for Images in Network Distribution , 2020, IEEE Transactions on Information Forensics and Security.

[246]  H. Jahankhani,et al.  Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity , 2020 .

[247]  Zifeng Xu,et al.  Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications , 2020, IEEE Access.

[248]  Sheng Wen,et al.  Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media , 2019, IEEE Access.

[249]  Wu-chi Feng,et al.  Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption , 2019, IACR Cryptol. ePrint Arch..

[250]  Jose L. Hernandez-Ramos,et al.  User-Centric Privacy , 2019, Internet of Things Security and Data Protection.

[251]  Kelsey Farish Do deepfakes pose a golden opportunity? Considering whether English law should adopt California's publicity right in the age of the deepfake , 2019, Journal of Intellectual Property Law & Practice.

[252]  Cornelia Caragea,et al.  A Group-Based Personalized Model for Image Privacy Classification and Labeling , 2017, IJCAI.

[253]  Jinhui Tang,et al.  Weakly Supervised Deep Matrix Factorization for Social Image Understanding , 2017, IEEE Transactions on Image Processing.

[254]  Spyros Kokolakis,et al.  Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..

[255]  Sanjay Kumar,et al.  Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites , 2016 .

[256]  Dan Lin,et al.  Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites , 2015, IEEE Transactions on Knowledge and Data Engineering.

[257]  Lynn M. Marvin,et al.  Conducting U.S. Discovery in Asia: An Overview of E-Discovery and Asian Privacy Laws , 2015 .

[258]  Ajith Abraham,et al.  Computational Social Networks: Security and Privacy , 2012 .

[259]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[260]  Olli Pitkänen,et al.  Users' Awareness of Privacy on Online Social Networking Sites - Case Facebook , 2009, Bled eConference.

[261]  Lydia B. Chilton,et al.  Tabulator: Exploring and Analyzing linked data on the Semantic Web , 2006 .

[262]  R. Lagendijk,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000, IEEE Signal Process. Mag..

[263]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[264]  Matthew Turk,et al.  A Morphable Model For The Synthesis Of 3D Faces , 1999, SIGGRAPH.