PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10595)

Abstract

Online social networks, such as Facebook, have become popular with people of all ages, and online communication with friends and acquaintances via messages that include photos has become very common. With the increasing ease with which users can take and post photos, the unintentional disclosure of sensitive information of various kinds through mistakes made while posting has become a problem. In this work, we focused on the privacy of people appearing in photos and developed a method called “PrivacyTag” for adaptively blurring their facial area in accordance with the communities to which they belong by using tags embedded with community-based privacy policies. We also evaluated a newly designed privacy tag and developed a prototype application for Facebook that uses this tag.

Keywords

Photo Privacy Privacy tag Online social network 

Notes

Acknowledgment

This work was supported by JSPS KAKENHI Grants (JP16H06302 and JP15H01686).

References

  1. 1.
    Bosker, B.: The Twitter Typo That Exposed Anthony Weiner. http://www.huffingtonpost.com/2011/06/07/anthony-weiner-twitter-dm\_n\_872590.html. Accessed 10 May 2017
  2. 2.
    Dabrowski, A., Weippl, E.R., Echizen, I.: Framework based on privacy policy hiding for preventing unauthorized face image processing. In: Proceedings of 2013 IEEE International Conference on Systems, Man and Cybernetics, pp. 455–461 (2013)Google Scholar
  3. 3.
    Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48–55 (2004)Google Scholar
  4. 4.
    Survey research regarding ethics of information security in 2014 (in Japanese). https://www.ipa.go.jp/files/000044094.pdf. Accessed 10 May 2017
  5. 5.
    Be careful when you post a photo during your vacation (in Japanese). http://www.ipa.go.jp/security/txt/2015/05outline.html. Accessed 10 May 2017
  6. 6.
    Bo, C., Shen, G., Liu, J., Li, X.-Y., Zhang, Y., Zhao, F.: Privacy.tag: privacy concern expressed and respected. In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, pp. 163–176 (2014)Google Scholar
  7. 7.
    Mondal, M., Liu, Y., Viswanath, B., Gummadi, K.P., Mislove, A.: Understanding and specifying social access control lists. In: Proceedings of the Tenth Symposium on Usable Privacy and Security, pp. 271–283 (2014)Google Scholar
  8. 8.
    Sleeper, M., Balebako, R., Das, S., McConahy, A.L., Wiese, J., Cranor, L.F.: The post that wasn’t: exploring self-censorship on facebook. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 793–802 (2013)Google Scholar
  9. 9.
    Besmer, A., Lipford, H.R.: Privacy perceptions of photo sharing in facebook. In: Proceedings of the Fourth Symposium on Usable Privacy and Security (2008)Google Scholar
  10. 10.
    Kumar, P., Schoenebeck, S.: The Modern day baby book: enacting good mothering and stewarding privacy on facebook. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, pp. 1302–1312 (2015)Google Scholar
  11. 11.
    Egelman, S., Oates, A., Krishnamurthi, S.: Oops, I did it again: mitigating repeated access control errors on facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2295–2304 (2011)Google Scholar
  12. 12.
    Machida, S., Kajiyama, T., Shigeru, S., Echizen, I.: Analysis of facebook friends using disclosure level. In: Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 471–474 (2014)Google Scholar
  13. 13.
    Sleeper, M., Cranshaw, J., Kelley, P.G., Ur, B., Acquisti, A., Cranor, L.F., Sadeh, N.: “I read my Twitter the next morning and was astonished”: a conversational perspective on Twitter regrets. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3277–3286 (2013)Google Scholar
  14. 14.
    Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “I regretted the minute I pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10 (2011)Google Scholar
  15. 15.
    Henne, B., Szongott, C., Smith, M.: SnapMe if you can: privacy threats of other peoples’ geo-tagged media and what we can do about it. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 95–106 (2013)Google Scholar
  16. 16.
    Pappachan, P., Yus, R., Das, P.K., Finin, T., Mena, E., Joshi, A.: A semantic context-aware privacy model for faceblock. In: Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology, pp. 64–72 (2014)Google Scholar
  17. 17.
    Li, Y., Xu, K., Yan, Q., Li, Y., Deng, R.H.: Understanding OSN-based facial disclosure against face authentication systems. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 413–424 (2014)Google Scholar
  18. 18.
    Pallas, F., Ulbricht, M.-R., Jaume-Palasí, L., Höppner, U.: Offlinetags: a novel privacy approach to online photo sharing. In: Proceedings of CHI 2014 Extended Abstracts on Human Factors in Computing Systems, pp. 2179–2184 (2014)Google Scholar
  19. 19.
    Cammozzo, A.: TagMeNot. http://tagmenot.info/. Accessed 10 May 2017
  20. 20.
    Hu, Y., Manikonda, L., Kambhampati, S.: What we instagram: a first analysis of instagram photo content and user types. In: Proceedings of the 8th International AAAI Conference on Weblogs and Social Media (2014)Google Scholar
  21. 21.
    Hall, E.T.: The Hidden Dimension. Anchor Books/Doubleday, New York (1966)Google Scholar
  22. 22.
    Ashok, A., Nguyen, V., Gruteser, M., Mandayam, N., Yuan, W., Dana, K.: Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras. In: Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, pp. 39–44 (2014)Google Scholar
  23. 23.
    Viola, P., Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vis. 57(2), 137–154 (2004). SpringerCrossRefGoogle Scholar
  24. 24.
    Cheung, S.-C.S., Venkatesh, M.V., Paruchuri, J.K., Zhao, J., Nguyen, T.: Protecting and managing privacy information in video surveillance systems. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 11–33. Springer, London (2009)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2017

Authors and Affiliations

  1. 1.SAP JapanTokyoJapan
  2. 2.SBA ResearchViennaAustria
  3. 3.National Institute of InformaticsTokyoJapan

Personalised recommendations