Smart Privacy Visor: Bridging the Privacy Gap

  • Adrian DabrowskiEmail author
  • Katharina Krombholz
  • Edgar R. Weippl
  • Isao Echizen
Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 228)


Due to the propagation of devices with imaging capabilities, the amount of pictures taken in public spaces has risen. Due to this, unintentionally photographed bystanders are often represented in pictures without being aware of it. Social networks and search engines make these images easier accessible due to the available meta-data and the tagging and linking functionality provided by these services. Facial recognition amplifies the privacy implications for the individuals in these pictures. Overall there exist three main classes of wearable picture-related Privacy Enhancing Technologies (PETs). As they need different prerequisites to operate and become effective they have unique time frames in the future where they can be effective even if introduced today. The group of face pattern destroying picture PETs work directly against current face detection algorithms and is the choice for immediate usage. These PETs destroy face patterns and inhibit the detection and automated processing and meta-data enrichment of individuals. This unconditionally visual destructive behavior can be a major obstacle in transition to other PETs. In this paper, we describe how to master a smooth transition between these classes including the restoration of the visual damage some of these methods entail. Furthermore, we propose the Smart Privacy Visor, a PET which combines the previously published Privacy Visor and the Picture Privacy Policy Framework. The overall goal of this transition is to create a PET that avoids identifiable and linkable properties which contradicts the goals of picture PETs in the first place and offer a visually appealing photographic result at the same time.


Privacy invasion Involuntary photographs Unintentional photographs Picture privacy Privacy policy 



This work is supported by the National Institute of Informatics’ internship program, a netidee grant by the Internet Foundation Austria (IPA), and the Comet K1 program of the Austrian Research Promotion Agency (FFG).


  1. 1.
    Harvey, A.: CV Dazzle (2010–2012) and Accessed 2 November 2014
  2. 2.
    Yamada, T., Gohshi, S., Echizen, I.: Use of invisible noise signals to prevent privacy invasion through face recognition from camera images. In: Proceedings of the 20th ACM International Conference on Multimedia, MM 2012, pp. 1315–1316. ACM (2012)Google Scholar
  3. 3.
    Yamada, T., Gohshi, S., Echizen, I.: Privacy visor: method for preventing face image detection by using differences in human and device sensitivity. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 152–161. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  4. 4.
    Yamada, T., Gohshi, S., Echizen, I.: Privacy visor: method based on light absorbing and reflecting properties for preventing face image detection. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2013)Google Scholar
  5. 5.
    Patel, S.N., Summet, J.W., Truong, K.N.: Blindspot: creating capture-resistant spaces. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 185–201. Springer, London (2009)CrossRefGoogle Scholar
  6. 6.
    Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65–89. Springer, London (2009)CrossRefGoogle Scholar
  7. 7.
    Dabrowski, A., Weippl, E.R., Echizen, I.: Framework based on privacy policy hiding for preventing unauthorized face image processing. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2013)Google Scholar
  8. 8.
    Pallas, F., Ulbricht, M.R., Jaume-Palasí, L., Höppner, U.: Offlinetags: a novel privacy approach to online photo sharing. In: CHI 2014 Extended Abstracts on Human Factors in Computing Systems, pp. 2179–2184. ACM (2014)Google Scholar
  9. 9.
    Barhm, M.S., Qwasmi, N., Qureshi, F.Z., El-Khatib, K.: Negotiating privacy preferences in video surveillance systems. In: Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K., Ali, M. (eds.) IEA/AIE 2011, Part II. LNCS, vol. 6704, pp. 511–521. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  10. 10.
    Henne, B., Szongott, C., Smith, M.: Snapme if you can: privacy threats of other peoples’ geo-tagged media and what we can do about it. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 95–106. ACM (2013)Google Scholar
  11. 11.
    Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, p. 8. IEEE (2005)Google Scholar
  12. 12.
    Yus, R., Pappachan, P., Das, P.K., Mena, E., Joshi, A., Finin, T.: Demo: Faceblock: privacy-aware pictures for google glass. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services. ACM (2014)Google Scholar
  13. 13.
    Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48–55. ACM (2004)Google Scholar
  14. 14.
    Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. In: Satoh, S., Nack, F., Etoh, M. (eds.) MMM 2008. LNCS, vol. 4903, pp. 144–154. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  15. 15.
    Moon, H.M., Seo, C.H., Chung, Y., Pan, S.B.: Privacy protection technology in video surveillance system. In: 4th International Conference on Embedded and Multimedia Computing, EM-Com 2009, pp. 1–6. IEEE (2009)Google Scholar
  16. 16.
    Ashok, A., Nguyen, V., Gruteser, M., Mandayam, N., Yuan, W., Dana, K.: Do not share! invisible light beacons for signaling preferences to privacy-respecting cameras. In: Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, pp. 39–44. ACM (2014)Google Scholar
  17. 17.
    Koster, M.: A Standard for Robot Exclusion. Accessed 15 July 2015
  18. 18.
    Lin, D., Tang, X.: Quality-driven face occlusion detection and recovery. In: Computer Vision and Pattern Recognition, CVPR 2007, pp. 1–7. IEEE (2007)Google Scholar
  19. 19.
    Mo, Z., Lewis, J.P., Neumann, U.: Face inpainting with local linear representations. In: BMVC, pp. 1–10 (2004)Google Scholar
  20. 20.
    Hwang, B.-W., Lee, S.-W.: Reconstructing a whole face image from a partially damaged or occluded image by multiple matching. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 692–701. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  21. 21.
    Jimenez, A.E., Dabrowski, A., Sonehara, N., Martinez, J.M.M., Echizen, I.: Tag detection for preventing unauthorized face image processing. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 513–524. Springer, Heidelberg (2015) CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Adrian Dabrowski
    • 1
    Email author
  • Katharina Krombholz
    • 1
  • Edgar R. Weippl
    • 1
  • Isao Echizen
    • 2
  1. 1.SBA ResearchViennaAustria
  2. 2.National Institute of InformaticsTokyoJapan

Personalised recommendations