Privacy-friendly photo capturing and sharing system

The wide adoption of smart devices with onboard cameras facilitates photo capturing and sharing, but greatly increases people's concern on privacy infringement. Here we seek a solution to respect the privacy of persons being photographed in a smarter way that they can be automatically erased from photos captured by smart devices according to their requirements. To make this work, we need to address three challenges: 1) how to enable users explicitly express their privacy protection intentions without wearing any visible specialized tag, and 2) how to associate the intentions with persons in captured photos accurately and efficiently. Furthermore, 3) the association process itself should not cause portrait information leakage and should be accomplished in a privacy-preserving way. In this work, we design, develop, and evaluate a system, called COIN (Cloak Of INvisibility), that enables a user to flexibly express her privacy requirement and empowers the photo service provider (or image taker) to exert the privacy protection policy. Leveraging the visual distinguishability of people in the field-of-view and the dimension-order-independent property of vector similarity measurement, COIN achieves high accuracy and low overhead. We implement a prototype system, and our evaluation results on both the trace-driven and real-life experiments confirm the feasibility and efficiency of our system.

[1]  Mahadev Satyanarayanan,et al.  Scalable crowd-sourcing of video from mobile devices , 2013, MobiSys '13.

[2]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[3]  Yunhao Liu,et al.  Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks , 2015, IEEE Transactions on Mobile Computing.

[4]  Xiang-Yang Li,et al.  Privacy.tag: privacy concern expressed and respected , 2014, SenSys.

[5]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[6]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.

[7]  Yunhao Liu,et al.  POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[8]  B. S. Manjunath,et al.  Unsupervised Segmentation of Color-Texture Regions in Images and Video , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Harold W. Kuhn,et al.  The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.

[10]  Aryya Gangopadhyay,et al.  A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms , 2006, The VLDB Journal.

[11]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[12]  Sharath Pankanti,et al.  Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .

[13]  Leonidas J. Guibas,et al.  Graph Matching with Anchor Nodes: A Learning Approach , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[14]  Taeho Jung,et al.  Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.

[15]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[16]  Yunhao Liu,et al.  Cloud-based Privacy Preserving Image Storage, Sharing and Search , 2014, ArXiv.

[17]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[18]  Nikos Komodakis,et al.  Image Completion Using Global Optimization , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[19]  Yunhao Liu,et al.  It starts with iGaze: visual attention driven networking with smart glasses , 2014, MobiCom.

[20]  Yunhao Liu,et al.  PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.

[21]  David K. Y. Yau,et al.  Distributed collaborative key agreement and authentication protocols for dynamic peer Groups , 2006, IEEE/ACM Transactions on Networking.

[22]  Jiaqi Guo Image Reconstruction based on Local feature Descriptors , 2011 .

[23]  Bernt Schiele,et al.  Pedestrian detection in crowded scenes , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[24]  Patrick Pérez,et al.  Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.

[25]  Jie Yang,et al.  Push the limit of WiFi based localization for smartphones , 2012, Mobicom '12.

[26]  Norbert Krüger,et al.  Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.

[27]  Charless C. Fowlkes,et al.  Contour Detection and Hierarchical Image Segmentation , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[28]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.

[29]  Safwat G. Zaky,et al.  Fingerprint identification using graph matching , 1986, Pattern Recognit..

[30]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[31]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.