Skip to main content

Tag Detection for Preventing Unauthorized Face Image Processing

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Included in the following conference series:

Abstract

A new technology is being proposed as a solution to the problem of unintentional facial detection and recognition in pictures in which the individuals appearing want to express their privacy preferences, through the use of different tags. The existing methods for face de-identification were mostly ad hoc solutions that only provided an absolute binary solution in a privacy context such as pixelation, or a bar mask. As the number and users of social networks are increasing, our preferences regarding our privacy may become more complex, leaving these absolute binary solutions as something obsolete. The proposed technology overcomes this problem by embedding information in a tag which will be placed close to the face without being disruptive. Through a decoding method the tag will provide the preferences that will be applied to the images in further stages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang, M.-H., Kriegman, D., Ahuja, N.: Detecting faces in images: A survey. IEEE Trans. Pattern Anal. Mach. Intell. 24(1), 34–58 (2002)

    Google Scholar 

  2. Zhang, C., Zhang, Z.: A survey of recent advances in face detection, Technical report, Microsoft Research (2010)

    Google Scholar 

  3. Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229–244. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Bowyer, K.W.: Face recognition technology: security versus privacy. IEEE Technol. Soc. Mag. 23(1), 9–19 (2004)

    Google Scholar 

  5. A focus on efficiency, internet.org, Techical report (2013)

    Google Scholar 

  6. Besmer, A., Lipford, H.R.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, pp. 1563–1572 (2010)

    Google Scholar 

  7. Making photo tagging easier, June 2011. https://www.facebook.com/notes/facebook/making-photo-tagging-easier/467145887130

  8. How does facebook suggest tags?, May 2014. https://www.facebook.com/help/122175507864081

  9. Dabrowski, A., Weippl, E., Echizen, I.: Framework based on privacy policy hiding for preventing unauthorized face image processing. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 455–461, October 2013

    Google Scholar 

  10. Gross, R., Airoldi, E.M., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 227–242. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. M. Corporation. Microsoft tag - implementation guide (2011). http://tag.microsoft.com/resources/implementation-guide.aspx

  12. How does instagram develop their filters?, May 2012. http://www.quora.com/Instagram/How-does-Instagram-develop-their-filters

  13. Viola, P., Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vis. 57(2), 137–154 (2004)

    Google Scholar 

Download references

Acknowledgments

This work was performed under the National Institute of Informatics international internship program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Escalada Jimenez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Jimenez, A.E., Dabrowski, A., Sonehara, N., Martinez, J.M.M., Echizen, I. (2015). Tag Detection for Preventing Unauthorized Face Image Processing. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics