Skip to main content

Preventing Camera Recording by Designing a Capture-Resistant Environment

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3660))

Abstract

With the ubiquity of camera phones, it is now possible to capture digital still and moving images anywhere, raising a legitimate concern for many organizations and individuals. Although legal and social boundaries can curb the capture of sensitive information, it sometimes is neither practical nor desirable to follow the option of confiscating the capture device from an individual. We present the design and proof of concept implementation of a capture-resistant environment that prevents the recording of still and moving images without requiring any cooperation on the part of the capturing device or its operator. Our solution involves a tracking system that uses computer vision for locating any number of retro-reflective CCD or CMOS camera sensors in a protected area. A pulsing light is then directed at the lens, distorting any imagery the camera records. Although the directed light interferes with the camera’s operation, it can be designed to minimally impact the sight of other humans in the environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brassil, J.: Using Mobile Communications to Assert Privacy from Video Surveillance. To appear at 1st International Workshop on Security in Systems and Networks (April 2005)

    Google Scholar 

  2. Art. 29 Data Protection Working Party. Opinion 4/2004 on the Processing of Personal Data by means of Video Surveillance. Document 11750/02/EN WP89, European Commission (2004), http://europa.eu.int/comm

  3. Chung, J.: Threat Of Subway Photo Ban Riseth Again. Gothamist, November 30 (2004)

    Google Scholar 

  4. Eye, E.: Bulletin of the Connecticut Academy of Science and Engineering, vol. 12(2) (1997)

    Google Scholar 

  5. Halderman, J.A., Waters, B., Felten, E.W.: Privacy Management for Portable Recording Devices. In: The 3rd Workshop on Privacy in Electronic Society (WPES 2004), Washington, DC (October 2004)

    Google Scholar 

  6. Iceberg’s Safe Haven, http://www.iceberg-ip.com/index.htm

  7. Perry, S.H.: Blur Photos with Camera Privacy Patent (January 2005), http://www.digital-lifestyles.info/display_page.asp?section=business&id=1888

  8. Video Voyeurism Prevention Act of 2004. 18 USC 1801 (December 2004)

    Google Scholar 

  9. Wagstaff, J.: Using Bluetooth To Disable Camera Phones (September 2004), http://loosewire.typepad.com/blog/2004/09/using_bluetooth.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Truong, K.N., Patel, S.N., Summet, J.W., Abowd, G.D. (2005). Preventing Camera Recording by Designing a Capture-Resistant Environment. In: Beigl, M., Intille, S., Rekimoto, J., Tokuda, H. (eds) UbiComp 2005: Ubiquitous Computing. UbiComp 2005. Lecture Notes in Computer Science, vol 3660. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551201_5

Download citation

  • DOI: https://doi.org/10.1007/11551201_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28760-5

  • Online ISBN: 978-3-540-31941-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics