Abstract
As smartphones have become more popular in recent years, integrated cameras have seen a rise in use. This trend has negative implications for the privacy of the individual in public places. Those who are captured inadvertently in others’ pictures often have no knowledge of being included in a photograph nor have any control over how the photos of them might be distributed. To address this growing issue, we propose a novel system for protecting the privacy of bystanders captured in public photos. A fully automated approach to accurately distinguish the intended subjects of photos from strangers is first explored. To accurately distinguish these subjects and bystanders, we develop a feature-based classification approach utilizing entire photos. Additionally, we consider the privacy-minded case of only utilizing local face images with no contextual information from the original image by developing a convolutional neural network-based classifier. Considering the face to be the most sensitive and identifiable portion of a bystander, both classifiers are utilized to form an estimation of facial feature locations which can then be obfuscated to protect bystander privacy. We implement and compare three methods of facial anonymization: black boxing, Gaussian blurring, and pose-tolerant face swapping. To validate and explore the viability of these anonymization methods, a comprehensive user survey is conducted to understand the difference in appeal and viability between them.
Ang Li was a PhD student at the University of Arkansas at the time of this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baltrusaitis, T., Robinson, P., Morency, L.: Constrained local neural fields for robust facial landmark detection in the wild. In: 2013 IEEE International Conference on Computer Vision Workshops, pp. 354–361, December 2013. https://doi.org/10.1109/ICCVW.2013.54
Baltrusaitis, T., Zadeh, A., Lim, Y.C., Morency, L.: OpenFace 2.0: facial behavior analysis toolkit. In: 2018 13th IEEE International Conference on Automatic Face Gesture Recognition (FG 2018), pp. 59–66, May 2018. https://doi.org/10.1109/FG.2018.00019
Belhumeur, P.N., Jacobs, D.W., Kriegman, D.J., Kumar, N.: Localizing parts of faces using a consensus of exemplars. IEEE Trans. Pattern Anal. Mach. Intell. 35(12), 2930–2940, December 2013. https://doi.org/10.1109/TPAMI.2013.23
Bo, C., Shen, G., Liu, J., Li, X.Y., Zhang, Y., Zhao, F.: Privacy.tag: privacy concern expressed and respected. In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. (SenSys 2014), pp. 163–176. Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2668332.2668339
Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001). https://doi.org/10.1023/A:1010933404324
Darling, D.: Target bystander detection repository (2020). https://github.com/ddarling/target-bystander-detection
Darling, D., Li, A., Li, Q.: Feature-based model for automated identification of subjects and bystanders in photos. In: IEEE International Workshop on the Security, Privacy, and Digital Forensics of Mobile Systems and Networks (MobiSec) (2019)
Feng, Y., Wu, F., Shao, X., Wang, Y., Zhou, X.: Joint 3D face reconstruction and dense alignment with position map regression network. In: ECCV (2018)
Friedman, J.H.: Stochastic gradient boosting. Comput. Stat. Data Anal. 38(4), 367–378 (2002). https://doi.org/10.1016/S0167-9473(01)00065-2, http://www.sciencedirect.com/science/article/pii/S0167947301000652, nonlinear Methods and Data Mining
Hasan, R., Crandall, D., Fritz, M., Kapadia, A.: Automatically detecting bystanders in photos to reduce privacy risks. In: IEEE Symposium on Security and Privacy (S and P), May 2020. https://publications.cispa.saarland/3051/
Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Appl. 13(4), 18–28 (1998). https://doi.org/10.1109/5254.708428
Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., Ioannidis, S.: Face/off: preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (CCS 2015), pp. 781–792. Association for Computing Machinery, New York (2015). https://doi.org/10.1145/2810103.2813603
Jung, J., Philipose, M.: Courteous glass. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (UbiComp 2014), pp. 1307–1312. Adjunct, Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2638728.2641711
King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755–1758 (2009)
Le, V., Brandt, J., Lin, Z., Bourdev, L., Huang, T.S.: Interactive facial feature localization. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.) Computer Vision - ECCV 2012, pp. 679–692. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33712-3_49
Li, A., Darling, D., Li, Q.: PhotoSafer: content-based and context-aware private photo protection for smartphones. In: IEEE Symposium on Privacy-Aware Computing (PAC), pp. 10–18 (2018)
Li, A., Du, W., Li, Q.: PoliteCamera: respecting strangers’ privacy in mobile photographing. In: 2018 International Conference on Security and Privacy in Communication Networks (SecureComm) (2018)
Li, A., Li, Q., Gao, W.: PrivacyCamera: cooperative privacy-aware photographing with mobile phones. In: IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–9 (2016)
Li, F., Sun, Z., Li, A., Niu, B., Li, H., Cao, G.: HideMe: privacy-preserving photo sharing on social networks. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, pp. 154–162, April 2019. https://doi.org/10.1109/INFOCOM.2019.8737466
Pech-Pacheco, J.L., Cristobal, G., Chamorro-Martinez, J., Fernandez-Valdivia, J.: Diatom autofocusing in brightfield microscopy: a comparative study. In: Proceedings 15th International Conference on Pattern Recognition. ICPR-2000, vol. 3, pp. 314–317, September 2000. https://doi.org/10.1109/ICPR.2000.903548
Raval, N., Srivastava, A., Lebeck, K., Cox, L., Machanavajjhala, A.: Markit: privacy markers for protecting visual secrets. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (UbiComp 2014), pp. 1289–1295. Adjunct, Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2638728.2641707
Redmon, J., Farhadi, A.: YOLOv3: an incremental improvement (2018)
Richter, F.: Infographic: smartphones cause photography boom, August 2017. https://www.statista.com/chart/10913/number-of-photos-taken-worldwide/
Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 971–978, October 2007. https://doi.org/10.1109/IROS.2007.4399122
Wood, E., Baltruaitis, T., Zhang, X., Sugano, Y., Robinson, P., Bulling, A.: Rendering of eyes for eye-shape registration and gaze estimation. In: 2015 IEEE International Conference on Computer Vision (ICCV), pp. 3756–3764, December 2015. https://doi.org/10.1109/ICCV.2015.428
Xu, K., Guo, Y., Guo, L., Fang, Y., Li, X.: My privacy my decision: control of photo sharing on online social networks. IEEE Trans. Dependable Secure Comput. 14(2), 199–210 (2017). https://doi.org/10.1109/TDSC.2015.2443795
Zadeh, A., Baltrušaitis, T., Morency, L.: Convolutional experts constrained local model for facial landmark detection. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 2051–2059 (2017)
Acknowledgements
We thank Murtuza Jadliwala for shepherding this paper. We also thank the anonymous reviewers for their valuable comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix
A Performance Characteristics of Classifiers
Table 3 shows the measured single forward-pass runtimes for each of the examined classifiers averaged over 1000 runs. All feature-based classifiers have almost negligible runtime requirements for prediction operations on an Intel i9 platform. This indicates they would be excellent candidates to run directly on resource-constrained mobile devices.
Figure 8 shows the accuracy of the CNN as mini-batches progress during training. Taken in conjunction with Fig. 6, the CNN appears to only converge after the 220th mini-batch where loss and accuracy variance is lowest.
B Detailed Survey Results
Figure 9 shows detailed results of participant responses to survey questions 1–7. It is clear from these results that almost all respondents believe that photo privacy is important. Additionally, the rapid transition in willingness to use a system that does not degrade photo quality shows how paramount developing minimally invasive obfuscation methods is for real-world use.
Figure 10 shows that respondents generally believe that the blurring and swapping methods are the least impactful to the sample photos. Interestingly, there was not a strong correlation between responses here and with the next set of questions over user willingness to use these same methods on their own photos.
The responses on willingness to use the obfuscation methods (see Fig. 11) demonstrate that there are more factors in determining what users want to use than perceived impact to photo quality. For example, face swapping, while rated as generally having a low impact to photo quality, received many negative responses from users in their likelihood to actually use it.
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Darling, D., Li, A., Li, Q. (2020). Automated Bystander Detection and Anonymization in Mobile Photography. In: Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N. (eds) Security and Privacy in Communication Networks. SecureComm 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 335. Springer, Cham. https://doi.org/10.1007/978-3-030-63086-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-63086-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63085-0
Online ISBN: 978-3-030-63086-7
eBook Packages: Computer ScienceComputer Science (R0)