skip to main content
10.1145/1027527.1027673acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article

"Sousveillance": inverse surveillance in multimedia imaging

Published:10 October 2004Publication History

ABSTRACT

This is a personal narrative that began 30 years ago as a childhood hobby, of wearing and implanting various sensors, effectors, and multimedia computation in order to re-define personal space and modify sensory perception computationally. This work involved the creation of various computational seeing aids that evolved into a new kind of visual art, using multimedia cyborglogs. Becoming at one with the machine, the author was able to explore a new humanity at the nexus of cyberspace and the real world. The author presents what was discovered accidentally, as a result of facing "cyborg discrimination". In particular, over the past 30 years, peer discrimination has decreased, while institutional and organized discrimination has intensified. Most notably, it was discovered that cyborg discrimination was most intense in establishments having the most surveillance. Rather than avoid such establishments, the author was able to explore and capture unique aspects to understand surveillance in new ways. The word <i>sur-veillance</i> denotes a God's eye view from on high (i.e. French for "to watch from above"). An inverse, called sous-veillance (French for "to watch from below") explores what happens when cameras move from lamp posts and ceilings down to eye level. Finally, it is suggested that new personal multimedia technologies, like mass-produced wearable cameraphones, can be used as tools for artists to explore "equiveillance" by shifting this equilibrium between surveillance and sousveillance with inverse/reverse/accountability/recountability/continuability of continuous sur/sousveillance.

References

  1. The influence of art and design on computer science research and development. In W. J. Mitchell, A. S. Inouye, and M. S. Blumenthal, editors, The In uence of Art and Design on Computer Science Research and Development, chapter 4. National Academy of Sciences, 2003. http://bob.nap.edu/html/beyond productivity/ch4.html.Google ScholarGoogle Scholar
  2. K. Aizawa, T. Hori, S. Kawasaki, and T. Ishikaw. Capture and efficient retrieval of life log. In Proceedings of the Pervasive 2004 Workshop on Memory and Sharing of Experiences, Linz/Vienna, Austria, Tuesday, April 20 2004. IEEE Computer Society.Google ScholarGoogle Scholar
  3. W. Carr and S. Kemmis. Becoming Critical: Education, Knowledge and Action Research. The Falmer Press, London, 1986.Google ScholarGoogle Scholar
  4. A. Frigo. Storing, indexing and retrieving my autobiography. In Proceedings of the Pervasive 2004 Workshop on Memory and Sharing of Experiences, Linz/Vienna, Austria, Tuesday, April 20 2004. IEEE Computer Society.Google ScholarGoogle Scholar
  5. S. Mann. Reflectionism and diffusionism. Leonardo, http://wearcam.org/leonardo/index.htm, 31(2):93--102, 1998.Google ScholarGoogle Scholar
  6. S. Mann. Comparametric equations with practical applications in quantigraphic image processing. IEEE Trans. Image Proc., 9(8):1389--1406, August 2000. ISSN 1057-7149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Mann. Intelligent Image Processing. John Wiley and Sons, November 2 2001. ISBN: 0-471-40637-6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Masters. The history of action research. In I. Hughes, editor, Action Research Electronic Reader. http://www.behs.cchs.usyd.edu.au/arow/Reader/rmasters.htm.Google ScholarGoogle Scholar
  9. Y. Sumi, S. Ito, T. Matsuguchi, S. Fels, and K. Mase. Collaborative capturing and interpretation of interactions. In Proceedings of the Pervasive 2004 Workshop on Memory and Sharing of Experiences, Linz/Vienna, Austria, Tuesday, April 20 2004. IEEE Computer Society.Google ScholarGoogle Scholar
  10. S. M. (with Hal Niedzviecki). Cyborg: Digital Destiny and Human Possibility in the Age of the Wearable Computer. Randomhouse (Doubleday), November 6 2001. ISBN: 0-385-65825-7. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. "Sousveillance": inverse surveillance in multimedia imaging

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MULTIMEDIA '04: Proceedings of the 12th annual ACM international conference on Multimedia
        October 2004
        1028 pages
        ISBN:1581138938
        DOI:10.1145/1027527

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 10 October 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate995of4,171submissions,24%

        Upcoming Conference

        MM '24
        MM '24: The 32nd ACM International Conference on Multimedia
        October 28 - November 1, 2024
        Melbourne , VIC , Australia

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader