ABSTRACT
Low-cost, lightweight wearable cameras let us record (or 'lifelog') our lives from a 'first-person' perspective for purposes ranging from fun to therapy. But they also capture private information that people may not want to be recorded, especially if images are stored in the cloud or visible to other people. For example, recent studies suggest that computer screens may be lifeloggers' single greatest privacy concern, because many people spend a considerable amount of time in front of devices that display private information. In this paper, we investigate using computer vision to automatically detect computer screens in photo lifelogs. We evaluate our approach on an existing in-situ dataset of 36 people who wore cameras for a week, and show that our technique could help manage privacy in the upcoming era of wearable cameras.
- Apple. Siri. https://www.apple.com/ios/siri/.Google Scholar
- Autographer. Autographer Wearable Camera. http://autographer.com.Google Scholar
- Jeff Brown. ZBar bar code reader. http://zbar.sourceforge.net/index.html.Google Scholar
- K. E. Caine. 2009. Supporting privacy by preventing misclosure. In CHI'09 Extended Abstracts on Human Factors in Computing Systems. ACM, 3145-3148. Google ScholarDigital Library
- Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, and Kalpana Shankar. 2010. DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home. In Proceedings of the 1st ACM International Health Informatics Symposium. 153-162. Google ScholarDigital Library
- D. Castro, S. Hickson, V. Bettadapura, E. Thomaz, G. Abowd, H. Christensen, and I. Essa. 2015. Predicting daily activities from egocentric images using deep learning. In Proceedings of the ACM International Symposium on Wearable Computers. Google ScholarDigital Library
- Ken Chatfield, Victor Lempitsky, Andrea Vedaldi, and Andrew Zisserman. 2011. The devil is in the details: an evaluation of recent feature encoding methods. In Proceedings of the British Machine Vision Conference.Google ScholarCross Ref
- Fanny Coudert, Denis Butin, and Daniel Le Metayer. 2015. Body-worn cameras for police accountability: Opportunities and risks. Computer Law & Security Review 31 (2015), 749-762.Google ScholarCross Ref
- Navneet Dalal and Bill Triggs. 2005. Histograms of Oriented Gradients for Human Detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 886-893. Google ScholarDigital Library
- C. Delo. 2013. U.S. Adults Now Spending More Time on Digital Devices Than Watching TV. Advertising Age (2013).Google Scholar
- T. Denning, Z. Dehlawi, and T. Kohno. 2014. In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-Mediating Technologies. In Proceedings of the International Conference on Human Factors in Computing Systems. Google ScholarDigital Library
- K. Fukuchi. libqrencode. http://http://fukuchi.org/works/qrencode/.Google Scholar
- Google. Google Glass. https://plus.google.com/+GoogleGlass/posts.Google Scholar
- Steve Hodges, Lyndsay Williams, Emma Berry, Shahram Izadi, James Srinivasan, Alex Butler, Gavin Smyth, Narinder Kapur, and Ken Wood. 2006. SenseCam: a Retrospective Memory Aid. In Proceedings of the ACM International Conference on Ubiquitous Computing. Google ScholarDigital Library
- Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras. In ACM SIGCHI Conference on Human Factors in Computing Systems. Google ScholarDigital Library
- R. Hoyle, R. Templeman, S. Armes, D. Anthony, D. Crandall, and A. Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 571-582. Google ScholarDigital Library
- S. Jana, D. Molnar, A. Moshchuk, A. M. Dunn, B. Livshits, H. J. Wang, and E. Ofek. 2013a. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. In USENIX Security. 415-430. Google ScholarDigital Library
- S. Jana, A. Narayanan, and V. Shmatikov. 2013b. A Scanner Darkly: Protecting User Privacy From Perceptual Applications. In Proceedings of the IEEE Symposium on Security and Privacy. Google ScholarDigital Library
- Yangqing Jia. 2013. Caffe: An Open Source Convolutional Architecture for Fast Feature Embedding. http://caffe.berkeleyvision.org/. (2013).Google Scholar
- Apu Kapadia, Tristan Henderson, Jeffrey J. Fielding, and David Kotz. 2007. Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In Proceedings of the Fifth International Conference on Pervasive Computing, Vol. 4480. 162-179. Google ScholarDigital Library
- P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L.F. Cranor, N. Gupta, and M. Reiter. 2012. Tag, you can see it!: using tags for access control in photo sharing. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. ACM, 377-386. Google ScholarDigital Library
- Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2014. ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras. arXiv 1412.0008.Google Scholar
- A. Krizhevsky, I. Sutskever, and G.E. Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097-1105.Google Scholar
- Michael S. Lam, Suneeta Godbole, Jacqueline Chen, Melody Oliver, Hannah Badland, Simon J. Marshall, Paul Kelly, Charlie Foster, Aiden Doherty, and Jacqueline Kerr. 2013. Measuring Time Spent Outdoors Using a Wearable Camera and GPS. In Proceedings of the 4th International SenseCam Pervasive Imaging Conference. 1-7. Google ScholarDigital Library
- Marc Langheinrich. 2002. A Privacy Awareness System for Ubiquitous Computing Environments. In Proceedings of the ACM International Conference on Ubiquitous Computing. Vol. 2498. 237-245. Google ScholarDigital Library
- Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 11, 86 (1998), 2278-2324.Google ScholarCross Ref
- David G. Lowe. 2004. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision 60, 2 (Nov. 2004), 91-110. Google ScholarDigital Library
- Gabriela Marcu, Anind K. Dey, and Sara Kiesler. 2012. Parent-driven Use of Wearable Cameras for Autism Support: A Field Study with Families. In Proceedings of the ACM International Conference on Ubiquitous Computing. 401-410. Google ScholarDigital Library
- Narrative. Narrative Clip: a wearable, automatic lifelogging camera. http://getnarrative.com.Google Scholar
- M. Oquab, L. Bottou, I. Laptev, and J. Sivic. 2014. Learning and Transferring Mid-Level Image Representations using Convolutional Neural Networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Google ScholarDigital Library
- Nisarg Raval, Landon Cox, Animesh Srivastava, Ashwin Machanavajjhala, and Kiron Lebeck. 2014. MarkIt: privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 1289-1295. Google ScholarDigital Library
- Franziska Roesner, Tadayoshi Kohno, and David Molnar. 2013. Security and Privacy for Augmented Reality Systems. Commun. ACM (2013). Google ScholarDigital Library
- Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, and Helen J Wang. 2014. World-Driven Access Control for Continuous Sensing. Microsoft Tech Report (2014).Google Scholar
- Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. 2014. ImageNet Large Scale Visual Recognition Challenge. arXiv 1409.0575.Google Scholar
- R. Templeman, A. Kapadia, R. Hoyle, and D. Crandall. 2014a. Reactive Security: Responding to Visual Stimuli from Wearable Cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 1297-1306. Google ScholarDigital Library
- R Templeman, M. Korayem, D. Crandall, and K. Kapadia. 2014b. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. In Network and Distributed System Security Symposium.Google Scholar
- Edison Thomaz, Aman Parnami, Jonathan Bidwell, Irfan Essa, and Gregory D. Abowd. 2013. Technological Approaches for Addressing Privacy Concerns when Recognizing Eating Behaviors with Wearable Cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 739-748. Google ScholarDigital Library
- Nancy A Van House and Marc Davis. 2005. The social life of cameraphone images. In Proceedings of the Pervasive Image Capture and Sharing: New Social Practices and Implications for Technology Workshop at the Seventh International Conference on Ubiquitous Computing.Google Scholar
- Jing Wang, Grant Schindler, and Irfan Essa. 2012. Orientation-aware Scene Understanding for Mobile Cameras. In Proceedings of the ACM International Conference on Ubiquitous Computing. 260-269. Google ScholarDigital Library
Index Terms
- Enhancing Lifelogging Privacy by Detecting Screens
Recommendations
Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsWhile media reports about wearable cameras have focused on the privacy concerns of bystanders, the perspectives of the `lifeloggers' themselves have not been adequately studied. We report on additional analysis of our previous in-situ lifelogging study ...
Privacy behaviors of lifeloggers using wearable cameras
UbiComp '14: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous ComputingA number of wearable 'lifelogging' camera devices have been released recently, allowing consumers to capture images and other sensor data continuously from a first-person perspective. Unlike traditional cameras that are used deliberately and ...
Understanding lifelog sharing preferences of lifeloggers
OzCHI '16: Proceedings of the 28th Australian Conference on Computer-Human InteractionThe lifelogging activity enables users, the lifeloggers, to passively capture images using wearable cameras from a first person perspective and ultimately create a visual diary encoding every possible aspect of their life with unprecedented details. ...
Comments