Advertisement

A context-driven privacy enforcement system for autonomous media capture devices

  • Giovanni Maria FarinellaEmail author
  • Christian Napoli
  • Gabriele Nicotra
  • Salvatore Riccobene
Article
  • 4 Downloads

Abstract

The evolution of the Internet of Things and the related market has renewed the concept of media recording and sharing by means of a new kind of home-consumer devices, capable of continuous and autonomous media capture and upload. Such technologies have already begun to tamper with people’s privacy and discretion expectations, also raising many concerns about the potential legal implications. This work proposes an overall context-related privacy preserving system, based on context recognition. Our approach has been specifically developed considering contexts characterized by a high degree of similarity. The presented methodology has been devised in order to enforce privacy rules using image recognition techniques jointly with radio beacon technology. The reported results show that, in the peculiar environment considered in this paper, the use of radio beacon technology can help to increase the performances of image recognition techniques, both in terms of computational performances and elapsed time.

Keywords

Image recognition Features extraction Artificial intelligence Image classification Cloud computing 

Notes

References

  1. 1.
    Abowd G, Rehg J, Starner T, Arriaga R (2007) Using information technologies to support detection of developmental delay. In: Assisted cognition workshopGoogle Scholar
  2. 2.
    Aditya P, Sen R, Druschel P, Joon Oh S, Benenson R, Fritz M, Schiele B, Bhattacharjee B, Wu TT (2016) I-pic: a platform for privacy-compliant image capture. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services, pp 235–248. ACMGoogle Scholar
  3. 3.
    Allen AL (2008) Dredging up the past: lifelogging, memory, and surveillance. The University of Chicago Law Review 75(1):47–74Google Scholar
  4. 4.
    Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefGoogle Scholar
  5. 5.
    Avidan S, Butman M (2006) Blind vision. In: European conference on computer vision, pp 1–13. SpringerGoogle Scholar
  6. 6.
    Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing system (NIPS), pp 57–64Google Scholar
  7. 7.
    Battiato S, Farinella GM, Napoli C, Nicotra G, Riccobene S (2017) Recognizing context for privacy preserving of first person vision image sequences. In: International conference on image analysis and processing, pp 580–590. SpringerGoogle Scholar
  8. 8.
    Bay H, Tuytelaars T, Van Gool L (2006) Surf: Speeded up robust features. In: Computer vision – ECCV 2006, pp 404–417. Springer, BerlinGoogle Scholar
  9. 9.
    Bo C, Shen G, Liu J, Li XY, Zhang Y, Zhao F (2014) Privacy. tag: Privacy concern expressed and respected. In: Proceedings of the 12th ACM conference on embedded network sensor systems, pp 163–176. ACMGoogle Scholar
  10. 10.
    Butler DJ, Huang J, Roesner F, Cakmak M (2015) The privacy-utility tradeoff for remotely teleoperated robots. In: Proceedings of the 10th annual ACM/IEEE international conference on human-robot interaction, pp 27–34. ACMGoogle Scholar
  11. 11.
    Campbell C (2000) Algorithmic approaches to training support vector machines: a survey. In: 8th european symposium on artificial neural networks, pp 27–54Google Scholar
  12. 12.
    Chen Y, Jones GJ (2010) Augmenting human memory using personal lifelogs. In: Proceedings of the 1st augmented human international conference, p 24. ACMGoogle Scholar
  13. 13.
    Cheng WC, Golubchik L, Kay DG (2004) Total recall: are privacy changes inevitable?. In: Proceedings of the the 1st ACM workshop on continuous archival and retrieval of personal experiences, pp 86–92. ACMGoogle Scholar
  14. 14.
    Chon Y, Lane ND, Li F, Cha H, Zhao F (2012) Automatically characterizing places with opportunistic crowdsensing using smartphones. In: Proceedings of the 2012 ACM conference on ubiquitous computing, pp 481–490. ACMGoogle Scholar
  15. 15.
    Cramer R, Damgård I, Nielsen JB (2001) Multiparty computation from threshold homomorphic encryption. In: International conference on the theory and applications of cryptographic techniques, pp 280–300. SpringerGoogle Scholar
  16. 16.
    Csurka G, Dance CR, Fan L, Willamowski J, Bray C (2004) Visual categorization with bags of keypoints. In: In workshop on statistical learning in computer vision, ECCV, pp 1–22Google Scholar
  17. 17.
    Dai J, Saghafi B, Wu J, Konrad J, Ishwar P (2015) Towards privacy-preserving recognition of human activities. In: 2015 IEEE international conference on image processing (ICIP), pp 4238–4242. IEEEGoogle Scholar
  18. 18.
    Du W, Atallah MJ (2001) Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 workshop on New security paradigms, pp 13–22. ACMGoogle Scholar
  19. 19.
    Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32 (2):5CrossRefGoogle Scholar
  20. 20.
    Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: International symposium on privacy enhancing technologies symposium, pp 235–253. SpringerGoogle Scholar
  21. 21.
    Goldreich O (2009) Foundations of cryptography: volume 2, basic applications. Cambridge University Press, CambridgezbMATHGoogle Scholar
  22. 22.
    Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: Proceedings of the 19th annual ACM symposium on theory of computing, pp 218–229. ACMGoogle Scholar
  23. 23.
    Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3(3):1157–1182zbMATHGoogle Scholar
  24. 24.
    Hoyle R, Templeman R, Armes S, Anthony D, Crandall D, Kapadia A (2014) Privacy behaviors of lifeloggers using wearable cameras. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, pp 571–582. ACMGoogle Scholar
  25. 25.
    Jana S, Narayanan A, Shmatikov V (2013) A scanner darkly: protecting user privacy from perceptual applications. In: 2013 IEEE symposium on security and privacy (SP), pp 349–363. IEEEGoogle Scholar
  26. 26.
    Keller JM, Gray MR, Givens JA (1985) A fuzzy k-nearest neighbor algorithm. IEEE Trans Syst Man Cybern 15:580–585CrossRefGoogle Scholar
  27. 27.
    Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems 25, pp 1097-1105. Curran Associates IncGoogle Scholar
  28. 28.
    Kumar R, Novak J, Tomkins A (2010) Structure and evolution of online social networks. In: Link mining: models, algorithms, and applications, pp 337–357. SpringerGoogle Scholar
  29. 29.
    Lindell Y, Pinkas B (2009) Secure multiparty computation for privacy-preserving data mining. J Priv Confid 1(1):5Google Scholar
  30. 30.
    Mann S (1997) Wearable computing: a first step toward personal imaging. Comput 30(2):25–32CrossRefGoogle Scholar
  31. 31.
    Mihailidis A, Hoey J, Boutilier C, Boger J (2007) Towards the development of an intelligent home to support agingin-place. In: Assisted cognition workshopGoogle Scholar
  32. 32.
    Miluzzo E, Lane ND, Fodor K, Peterson R, Lu H, Musolesi M, Eisenman SB, Zheng X, Campbell AT (2008) Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In: Proceedings of the 6th ACM conference on embedded network sensor systems, pp 337–350. ACMGoogle Scholar
  33. 33.
    Nauman M, Khan S, Zhang X (2010) Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM symposium on information, computer and communications security, pp 328–332. ACMGoogle Scholar
  34. 34.
    O’Hara K, Tuffield MM, Shadbolt N (2008) Lifelogging: privacy and empowerment with memories for life. Identity Inf Soc 1(1):155–172CrossRefGoogle Scholar
  35. 35.
    Ongtang M, Butler K, McDaniel P (2010) Porscha: policy oriented secure content handling in android. In: Proceedings of the 26th annual computer security applications conference, pp 221–230. ACMGoogle Scholar
  36. 36.
    Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510–527CrossRefGoogle Scholar
  37. 37.
    Park S, Kautz HA (2008) Privacy-preserving recognition of activities in daily living from multi-view silhouettes and rfid-based training. In: AAAI Fall symposium: AI in eldercare: new solutions to old problems, pp 70–77Google Scholar
  38. 38.
    Portokalidis G, Homburg P, Anagnostakis K, Bos H (2010) Paranoid android: versatile protection for smartphones. In: Proceedings of the 26th annual computer security applications conference, pp 347–356. ACMGoogle Scholar
  39. 39.
    Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613–620CrossRefGoogle Scholar
  40. 40.
    Taigman Y, Yang M, Ranzato M, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1701–1708Google Scholar
  41. 41.
    Templeman R, Korayem M, Crandall DJ, Kapadia A (2014) Placeavoider: steering first-person cameras away from sensitive spaces. In: Network and distributed system security symposium (NDSS)Google Scholar
  42. 42.
    Teraoka T (2012) Organization and exploration of heterogeneous personal data collected in daily life. Human-Centric Comput Inf Sci 2(1):1CrossRefGoogle Scholar
  43. 43.
    Thierer AD (2015) The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation. Richmond J Law Technol 21(2):6Google Scholar
  44. 44.
    Thomaz E, Parnami A, Bidwell J, Essa I, Abowd GD (2013) Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, pp 739–748. ACMGoogle Scholar
  45. 45.
    Truong KN, Patel SN, Summet JW, Abowd GD (2005) Preventing camera recording by designing a capture-resistant environment. In: International conference on ubiquitous computing, pp 73–86. SpringerGoogle Scholar
  46. 46.
    Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3 (1):71–86CrossRefGoogle Scholar
  47. 47.
    Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: IEEE Computer society conference on computer vision and pattern recognition (CVPR), vol 1, pp I–I. IEEEGoogle Scholar
  48. 48.
    Wei J (2014) How wearables intersect with the cloud and the internet of things: Considerations for the developers of wearables. IEEE Consumer Electron Mag 3(3):53–56CrossRefGoogle Scholar
  49. 49.
    Wu J, Osuntogun A, Choudhury T, Philipose M, Rehg JM (2007) A scalable approach to activity recognition based on object use. In: IEEE international conference on computer vision (ICCV), pp 1–8. IEEEGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Giovanni Maria Farinella
    • 1
    Email author
  • Christian Napoli
    • 1
  • Gabriele Nicotra
    • 1
  • Salvatore Riccobene
    • 1
  1. 1.Department of Mathematics and Computer ScienceUniversity of CataniaCataniaItaly

Personalised recommendations