Skip to main content

Automated Bystander Detection and Anonymization in Mobile Photography

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2020)

Abstract

As smartphones have become more popular in recent years, integrated cameras have seen a rise in use. This trend has negative implications for the privacy of the individual in public places. Those who are captured inadvertently in others’ pictures often have no knowledge of being included in a photograph nor have any control over how the photos of them might be distributed. To address this growing issue, we propose a novel system for protecting the privacy of bystanders captured in public photos. A fully automated approach to accurately distinguish the intended subjects of photos from strangers is first explored. To accurately distinguish these subjects and bystanders, we develop a feature-based classification approach utilizing entire photos. Additionally, we consider the privacy-minded case of only utilizing local face images with no contextual information from the original image by developing a convolutional neural network-based classifier. Considering the face to be the most sensitive and identifiable portion of a bystander, both classifiers are utilized to form an estimation of facial feature locations which can then be obfuscated to protect bystander privacy. We implement and compare three methods of facial anonymization: black boxing, Gaussian blurring, and pose-tolerant face swapping. To validate and explore the viability of these anonymization methods, a comprehensive user survey is conducted to understand the difference in appeal and viability between them.

Ang Li was a PhD student at the University of Arkansas at the time of this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baltrusaitis, T., Robinson, P., Morency, L.: Constrained local neural fields for robust facial landmark detection in the wild. In: 2013 IEEE International Conference on Computer Vision Workshops, pp. 354–361, December 2013. https://doi.org/10.1109/ICCVW.2013.54

  2. Baltrusaitis, T., Zadeh, A., Lim, Y.C., Morency, L.: OpenFace 2.0: facial behavior analysis toolkit. In: 2018 13th IEEE International Conference on Automatic Face Gesture Recognition (FG 2018), pp. 59–66, May 2018. https://doi.org/10.1109/FG.2018.00019

  3. Belhumeur, P.N., Jacobs, D.W., Kriegman, D.J., Kumar, N.: Localizing parts of faces using a consensus of exemplars. IEEE Trans. Pattern Anal. Mach. Intell. 35(12), 2930–2940, December 2013. https://doi.org/10.1109/TPAMI.2013.23

  4. Bo, C., Shen, G., Liu, J., Li, X.Y., Zhang, Y., Zhao, F.: Privacy.tag: privacy concern expressed and respected. In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. (SenSys 2014), pp. 163–176. Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2668332.2668339

  5. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001). https://doi.org/10.1023/A:1010933404324

    Article  MATH  Google Scholar 

  6. Darling, D.: Target bystander detection repository (2020). https://github.com/ddarling/target-bystander-detection

  7. Darling, D., Li, A., Li, Q.: Feature-based model for automated identification of subjects and bystanders in photos. In: IEEE International Workshop on the Security, Privacy, and Digital Forensics of Mobile Systems and Networks (MobiSec) (2019)

    Google Scholar 

  8. Feng, Y., Wu, F., Shao, X., Wang, Y., Zhou, X.: Joint 3D face reconstruction and dense alignment with position map regression network. In: ECCV (2018)

    Google Scholar 

  9. Friedman, J.H.: Stochastic gradient boosting. Comput. Stat. Data Anal. 38(4), 367–378 (2002). https://doi.org/10.1016/S0167-9473(01)00065-2, http://www.sciencedirect.com/science/article/pii/S0167947301000652, nonlinear Methods and Data Mining

  10. Hasan, R., Crandall, D., Fritz, M., Kapadia, A.: Automatically detecting bystanders in photos to reduce privacy risks. In: IEEE Symposium on Security and Privacy (S and P), May 2020. https://publications.cispa.saarland/3051/

  11. Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Appl. 13(4), 18–28 (1998). https://doi.org/10.1109/5254.708428

    Article  Google Scholar 

  12. Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., Ioannidis, S.: Face/off: preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (CCS 2015), pp. 781–792. Association for Computing Machinery, New York (2015). https://doi.org/10.1145/2810103.2813603

  13. Jung, J., Philipose, M.: Courteous glass. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (UbiComp 2014), pp. 1307–1312. Adjunct, Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2638728.2641711

  14. King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755–1758 (2009)

    Google Scholar 

  15. Le, V., Brandt, J., Lin, Z., Bourdev, L., Huang, T.S.: Interactive facial feature localization. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.) Computer Vision - ECCV 2012, pp. 679–692. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33712-3_49

    Chapter  Google Scholar 

  16. Li, A., Darling, D., Li, Q.: PhotoSafer: content-based and context-aware private photo protection for smartphones. In: IEEE Symposium on Privacy-Aware Computing (PAC), pp. 10–18 (2018)

    Google Scholar 

  17. Li, A., Du, W., Li, Q.: PoliteCamera: respecting strangers’ privacy in mobile photographing. In: 2018 International Conference on Security and Privacy in Communication Networks (SecureComm) (2018)

    Google Scholar 

  18. Li, A., Li, Q., Gao, W.: PrivacyCamera: cooperative privacy-aware photographing with mobile phones. In: IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–9 (2016)

    Google Scholar 

  19. Li, F., Sun, Z., Li, A., Niu, B., Li, H., Cao, G.: HideMe: privacy-preserving photo sharing on social networks. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, pp. 154–162, April 2019. https://doi.org/10.1109/INFOCOM.2019.8737466

  20. Pech-Pacheco, J.L., Cristobal, G., Chamorro-Martinez, J., Fernandez-Valdivia, J.: Diatom autofocusing in brightfield microscopy: a comparative study. In: Proceedings 15th International Conference on Pattern Recognition. ICPR-2000, vol. 3, pp. 314–317, September 2000. https://doi.org/10.1109/ICPR.2000.903548

  21. Raval, N., Srivastava, A., Lebeck, K., Cox, L., Machanavajjhala, A.: Markit: privacy markers for protecting visual secrets. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (UbiComp 2014), pp. 1289–1295. Adjunct, Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2638728.2641707

  22. Redmon, J., Farhadi, A.: YOLOv3: an incremental improvement (2018)

    Google Scholar 

  23. Richter, F.: Infographic: smartphones cause photography boom, August 2017. https://www.statista.com/chart/10913/number-of-photos-taken-worldwide/

  24. Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 971–978, October 2007. https://doi.org/10.1109/IROS.2007.4399122

  25. Wood, E., Baltruaitis, T., Zhang, X., Sugano, Y., Robinson, P., Bulling, A.: Rendering of eyes for eye-shape registration and gaze estimation. In: 2015 IEEE International Conference on Computer Vision (ICCV), pp. 3756–3764, December 2015. https://doi.org/10.1109/ICCV.2015.428

  26. Xu, K., Guo, Y., Guo, L., Fang, Y., Li, X.: My privacy my decision: control of photo sharing on online social networks. IEEE Trans. Dependable Secure Comput. 14(2), 199–210 (2017). https://doi.org/10.1109/TDSC.2015.2443795

    Article  Google Scholar 

  27. Zadeh, A., Baltrušaitis, T., Morency, L.: Convolutional experts constrained local model for facial landmark detection. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 2051–2059 (2017)

    Google Scholar 

Download references

Acknowledgements

We thank Murtuza Jadliwala for shepherding this paper. We also thank the anonymous reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ang Li .

Editor information

Editors and Affiliations

Appendices

Appendix

A Performance Characteristics of Classifiers

Table 3. Average single prediction forward-pass runtime (Intel i9-10900k)

Table 3 shows the measured single forward-pass runtimes for each of the examined classifiers averaged over 1000 runs. All feature-based classifiers have almost negligible runtime requirements for prediction operations on an Intel i9 platform. This indicates they would be excellent candidates to run directly on resource-constrained mobile devices.

Fig. 8.
figure 8

Progressive accuracy over training mini-batches for the CNN classifier.

Figure 8 shows the accuracy of the CNN as mini-batches progress during training. Taken in conjunction with Fig. 6, the CNN appears to only converge after the 220th mini-batch where loss and accuracy variance is lowest.

B Detailed Survey Results

Figure 9 shows detailed results of participant responses to survey questions 1–7. It is clear from these results that almost all respondents believe that photo privacy is important. Additionally, the rapid transition in willingness to use a system that does not degrade photo quality shows how paramount developing minimally invasive obfuscation methods is for real-world use.

Fig. 9.
figure 9

Survey responses to opinion questions 1–7.

Fig. 10.
figure 10

Survey responses to rating the impact of anonymization methods on photos.

Figure 10 shows that respondents generally believe that the blurring and swapping methods are the least impactful to the sample photos. Interestingly, there was not a strong correlation between responses here and with the next set of questions over user willingness to use these same methods on their own photos.

Fig. 11.
figure 11

Survey responses to rating how willing users would be to use each anonymization method.

The responses on willingness to use the obfuscation methods (see Fig. 11) demonstrate that there are more factors in determining what users want to use than perceived impact to photo quality. For example, face swapping, while rated as generally having a low impact to photo quality, received many negative responses from users in their likelihood to actually use it.

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Darling, D., Li, A., Li, Q. (2020). Automated Bystander Detection and Anonymization in Mobile Photography. In: Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N. (eds) Security and Privacy in Communication Networks. SecureComm 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 335. Springer, Cham. https://doi.org/10.1007/978-3-030-63086-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63086-7_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63085-0

  • Online ISBN: 978-3-030-63086-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics