skip to main content
10.1145/2858036.2858417acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
note
Public Access
Honorable Mention

Enhancing Lifelogging Privacy by Detecting Screens

Published:07 May 2016Publication History

ABSTRACT

Low-cost, lightweight wearable cameras let us record (or 'lifelog') our lives from a 'first-person' perspective for purposes ranging from fun to therapy. But they also capture private information that people may not want to be recorded, especially if images are stored in the cloud or visible to other people. For example, recent studies suggest that computer screens may be lifeloggers' single greatest privacy concern, because many people spend a considerable amount of time in front of devices that display private information. In this paper, we investigate using computer vision to automatically detect computer screens in photo lifelogs. We evaluate our approach on an existing in-situ dataset of 36 people who wore cameras for a week, and show that our technique could help manage privacy in the upcoming era of wearable cameras.

References

  1. Apple. Siri. https://www.apple.com/ios/siri/.Google ScholarGoogle Scholar
  2. Autographer. Autographer Wearable Camera. http://autographer.com.Google ScholarGoogle Scholar
  3. Jeff Brown. ZBar bar code reader. http://zbar.sourceforge.net/index.html.Google ScholarGoogle Scholar
  4. K. E. Caine. 2009. Supporting privacy by preventing misclosure. In CHI'09 Extended Abstracts on Human Factors in Computing Systems. ACM, 3145-3148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, and Kalpana Shankar. 2010. DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home. In Proceedings of the 1st ACM International Health Informatics Symposium. 153-162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Castro, S. Hickson, V. Bettadapura, E. Thomaz, G. Abowd, H. Christensen, and I. Essa. 2015. Predicting daily activities from egocentric images using deep learning. In Proceedings of the ACM International Symposium on Wearable Computers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ken Chatfield, Victor Lempitsky, Andrea Vedaldi, and Andrew Zisserman. 2011. The devil is in the details: an evaluation of recent feature encoding methods. In Proceedings of the British Machine Vision Conference.Google ScholarGoogle ScholarCross RefCross Ref
  8. Fanny Coudert, Denis Butin, and Daniel Le Metayer. 2015. Body-worn cameras for police accountability: Opportunities and risks. Computer Law & Security Review 31 (2015), 749-762.Google ScholarGoogle ScholarCross RefCross Ref
  9. Navneet Dalal and Bill Triggs. 2005. Histograms of Oriented Gradients for Human Detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 886-893. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Delo. 2013. U.S. Adults Now Spending More Time on Digital Devices Than Watching TV. Advertising Age (2013).Google ScholarGoogle Scholar
  11. T. Denning, Z. Dehlawi, and T. Kohno. 2014. In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-Mediating Technologies. In Proceedings of the International Conference on Human Factors in Computing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K. Fukuchi. libqrencode. http://http://fukuchi.org/works/qrencode/.Google ScholarGoogle Scholar
  13. Google. Google Glass. https://plus.google.com/+GoogleGlass/posts.Google ScholarGoogle Scholar
  14. Steve Hodges, Lyndsay Williams, Emma Berry, Shahram Izadi, James Srinivasan, Alex Butler, Gavin Smyth, Narinder Kapur, and Ken Wood. 2006. SenseCam: a Retrospective Memory Aid. In Proceedings of the ACM International Conference on Ubiquitous Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras. In ACM SIGCHI Conference on Human Factors in Computing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Hoyle, R. Templeman, S. Armes, D. Anthony, D. Crandall, and A. Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 571-582. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Jana, D. Molnar, A. Moshchuk, A. M. Dunn, B. Livshits, H. J. Wang, and E. Ofek. 2013a. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. In USENIX Security. 415-430. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Jana, A. Narayanan, and V. Shmatikov. 2013b. A Scanner Darkly: Protecting User Privacy From Perceptual Applications. In Proceedings of the IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Yangqing Jia. 2013. Caffe: An Open Source Convolutional Architecture for Fast Feature Embedding. http://caffe.berkeleyvision.org/. (2013).Google ScholarGoogle Scholar
  20. Apu Kapadia, Tristan Henderson, Jeffrey J. Fielding, and David Kotz. 2007. Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In Proceedings of the Fifth International Conference on Pervasive Computing, Vol. 4480. 162-179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L.F. Cranor, N. Gupta, and M. Reiter. 2012. Tag, you can see it!: using tags for access control in photo sharing. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. ACM, 377-386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2014. ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras. arXiv 1412.0008.Google ScholarGoogle Scholar
  23. A. Krizhevsky, I. Sutskever, and G.E. Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097-1105.Google ScholarGoogle Scholar
  24. Michael S. Lam, Suneeta Godbole, Jacqueline Chen, Melody Oliver, Hannah Badland, Simon J. Marshall, Paul Kelly, Charlie Foster, Aiden Doherty, and Jacqueline Kerr. 2013. Measuring Time Spent Outdoors Using a Wearable Camera and GPS. In Proceedings of the 4th International SenseCam Pervasive Imaging Conference. 1-7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Marc Langheinrich. 2002. A Privacy Awareness System for Ubiquitous Computing Environments. In Proceedings of the ACM International Conference on Ubiquitous Computing. Vol. 2498. 237-245. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 11, 86 (1998), 2278-2324.Google ScholarGoogle ScholarCross RefCross Ref
  27. David G. Lowe. 2004. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision 60, 2 (Nov. 2004), 91-110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Gabriela Marcu, Anind K. Dey, and Sara Kiesler. 2012. Parent-driven Use of Wearable Cameras for Autism Support: A Field Study with Families. In Proceedings of the ACM International Conference on Ubiquitous Computing. 401-410. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Narrative. Narrative Clip: a wearable, automatic lifelogging camera. http://getnarrative.com.Google ScholarGoogle Scholar
  30. M. Oquab, L. Bottou, I. Laptev, and J. Sivic. 2014. Learning and Transferring Mid-Level Image Representations using Convolutional Neural Networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Nisarg Raval, Landon Cox, Animesh Srivastava, Ashwin Machanavajjhala, and Kiron Lebeck. 2014. MarkIt: privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 1289-1295. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Franziska Roesner, Tadayoshi Kohno, and David Molnar. 2013. Security and Privacy for Augmented Reality Systems. Commun. ACM (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, and Helen J Wang. 2014. World-Driven Access Control for Continuous Sensing. Microsoft Tech Report (2014).Google ScholarGoogle Scholar
  34. Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. 2014. ImageNet Large Scale Visual Recognition Challenge. arXiv 1409.0575.Google ScholarGoogle Scholar
  35. R. Templeman, A. Kapadia, R. Hoyle, and D. Crandall. 2014a. Reactive Security: Responding to Visual Stimuli from Wearable Cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 1297-1306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. R Templeman, M. Korayem, D. Crandall, and K. Kapadia. 2014b. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. In Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  37. Edison Thomaz, Aman Parnami, Jonathan Bidwell, Irfan Essa, and Gregory D. Abowd. 2013. Technological Approaches for Addressing Privacy Concerns when Recognizing Eating Behaviors with Wearable Cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 739-748. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Nancy A Van House and Marc Davis. 2005. The social life of cameraphone images. In Proceedings of the Pervasive Image Capture and Sharing: New Social Practices and Implications for Technology Workshop at the Seventh International Conference on Ubiquitous Computing.Google ScholarGoogle Scholar
  39. Jing Wang, Grant Schindler, and Irfan Essa. 2012. Orientation-aware Scene Understanding for Mobile Cameras. In Proceedings of the ACM International Conference on Ubiquitous Computing. 260-269. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enhancing Lifelogging Privacy by Detecting Screens

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
          May 2016
          6108 pages
          ISBN:9781450333627
          DOI:10.1145/2858036

          Copyright © 2016 ACM

          © 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 May 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • note

          Acceptance Rates

          CHI '16 Paper Acceptance Rate565of2,435submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader