Log in

A context-driven privacy enforcement system for autonomous media capture devices

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The evolution of the Internet of Things and the related market has renewed the concept of media recording and sharing by means of a new kind of home-consumer devices, capable of continuous and autonomous media capture and upload. Such technologies have already begun to tamper with people’s privacy and discretion expectations, also raising many concerns about the potential legal implications. This work proposes an overall context-related privacy preserving system, based on context recognition. Our approach has been specifically developed considering contexts characterized by a high degree of similarity. The presented methodology has been devised in order to enforce privacy rules using image recognition techniques jointly with radio beacon technology. The reported results show that, in the peculiar environment considered in this paper, the use of radio beacon technology can help to increase the performances of image recognition techniques, both in terms of computational performances and elapsed time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abowd G, Rehg J, Starner T, Arriaga R (2007) Using information technologies to support detection of developmental delay. In: Assisted cognition workshop

  2. Aditya P, Sen R, Druschel P, Joon Oh S, Benenson R, Fritz M, Schiele B, Bhattacharjee B, Wu TT (2016) I-pic: a platform for privacy-compliant image capture. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services, pp 235–248. ACM

  3. Allen AL (2008) Dredging up the past: lifelogging, memory, and surveillance. The University of Chicago Law Review 75(1):47–74

    Google Scholar 

  4. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  MATH  Google Scholar 

  5. Avidan S, Butman M (2006) Blind vision. In: European conference on computer vision, pp 1–13. Springer

  6. Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing system (NIPS), pp 57–64

  7. Battiato S, Farinella GM, Napoli C, Nicotra G, Riccobene S (2017) Recognizing context for privacy preserving of first person vision image sequences. In: International conference on image analysis and processing, pp 580–590. Springer

  8. Bay H, Tuytelaars T, Van Gool L (2006) Surf: Speeded up robust features. In: Computer vision – ECCV 2006, pp 404–417. Springer, Berlin

  9. Bo C, Shen G, Liu J, Li XY, Zhang Y, Zhao F (2014) Privacy. tag: Privacy concern expressed and respected. In: Proceedings of the 12th ACM conference on embedded network sensor systems, pp 163–176. ACM

  10. Butler DJ, Huang J, Roesner F, Cakmak M (2015) The privacy-utility tradeoff for remotely teleoperated robots. In: Proceedings of the 10th annual ACM/IEEE international conference on human-robot interaction, pp 27–34. ACM

  11. Campbell C (2000) Algorithmic approaches to training support vector machines: a survey. In: 8th european symposium on artificial neural networks, pp 27–54

  12. Chen Y, Jones GJ (2010) Augmenting human memory using personal lifelogs. In: Proceedings of the 1st augmented human international conference, p 24. ACM

  13. Cheng WC, Golubchik L, Kay DG (2004) Total recall: are privacy changes inevitable?. In: Proceedings of the the 1st ACM workshop on continuous archival and retrieval of personal experiences, pp 86–92. ACM

  14. Chon Y, Lane ND, Li F, Cha H, Zhao F (2012) Automatically characterizing places with opportunistic crowdsensing using smartphones. In: Proceedings of the 2012 ACM conference on ubiquitous computing, pp 481–490. ACM

  15. Cramer R, Damgård I, Nielsen JB (2001) Multiparty computation from threshold homomorphic encryption. In: International conference on the theory and applications of cryptographic techniques, pp 280–300. Springer

  16. Csurka G, Dance CR, Fan L, Willamowski J, Bray C (2004) Visual categorization with bags of keypoints. In: In workshop on statistical learning in computer vision, ECCV, pp 1–22

  17. Dai J, Saghafi B, Wu J, Konrad J, Ishwar P (2015) Towards privacy-preserving recognition of human activities. In: 2015 IEEE international conference on image processing (ICIP), pp 4238–4242. IEEE

  18. Du W, Atallah MJ (2001) Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 workshop on New security paradigms, pp 13–22. ACM

  19. Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32 (2):5

    Article  Google Scholar 

  20. Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: International symposium on privacy enhancing technologies symposium, pp 235–253. Springer

  21. Goldreich O (2009) Foundations of cryptography: volume 2, basic applications. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  22. Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: Proceedings of the 19th annual ACM symposium on theory of computing, pp 218–229. ACM

  23. Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3(3):1157–1182

    MATH  Google Scholar 

  24. Hoyle R, Templeman R, Armes S, Anthony D, Crandall D, Kapadia A (2014) Privacy behaviors of lifeloggers using wearable cameras. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, pp 571–582. ACM

  25. Jana S, Narayanan A, Shmatikov V (2013) A scanner darkly: protecting user privacy from perceptual applications. In: 2013 IEEE symposium on security and privacy (SP), pp 349–363. IEEE

  26. Keller JM, Gray MR, Givens JA (1985) A fuzzy k-nearest neighbor algorithm. IEEE Trans Syst Man Cybern 15:580–585

    Article  Google Scholar 

  27. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems 25, pp 1097-1105. Curran Associates Inc

  28. Kumar R, Novak J, Tomkins A (2010) Structure and evolution of online social networks. In: Link mining: models, algorithms, and applications, pp 337–357. Springer

  29. Lindell Y, Pinkas B (2009) Secure multiparty computation for privacy-preserving data mining. J Priv Confid 1(1):5

    Google Scholar 

  30. Mann S (1997) Wearable computing: a first step toward personal imaging. Comput 30(2):25–32

    Article  Google Scholar 

  31. Mihailidis A, Hoey J, Boutilier C, Boger J (2007) Towards the development of an intelligent home to support agingin-place. In: Assisted cognition workshop

  32. Miluzzo E, Lane ND, Fodor K, Peterson R, Lu H, Musolesi M, Eisenman SB, Zheng X, Campbell AT (2008) Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In: Proceedings of the 6th ACM conference on embedded network sensor systems, pp 337–350. ACM

  33. Nauman M, Khan S, Zhang X (2010) Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM symposium on information, computer and communications security, pp 328–332. ACM

  34. O’Hara K, Tuffield MM, Shadbolt N (2008) Lifelogging: privacy and empowerment with memories for life. Identity Inf Soc 1(1):155–172

    Article  Google Scholar 

  35. Ongtang M, Butler K, McDaniel P (2010) Porscha: policy oriented secure content handling in android. In: Proceedings of the 26th annual computer security applications conference, pp 221–230. ACM

  36. Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510–527

    Article  Google Scholar 

  37. Park S, Kautz HA (2008) Privacy-preserving recognition of activities in daily living from multi-view silhouettes and rfid-based training. In: AAAI Fall symposium: AI in eldercare: new solutions to old problems, pp 70–77

  38. Portokalidis G, Homburg P, Anagnostakis K, Bos H (2010) Paranoid android: versatile protection for smartphones. In: Proceedings of the 26th annual computer security applications conference, pp 347–356. ACM

  39. Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613–620

    Article  MATH  Google Scholar 

  40. Taigman Y, Yang M, Ranzato M, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1701–1708

  41. Templeman R, Korayem M, Crandall DJ, Kapadia A (2014) Placeavoider: steering first-person cameras away from sensitive spaces. In: Network and distributed system security symposium (NDSS)

  42. Teraoka T (2012) Organization and exploration of heterogeneous personal data collected in daily life. Human-Centric Comput Inf Sci 2(1):1

    Article  Google Scholar 

  43. Thierer AD (2015) The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation. Richmond J Law Technol 21(2):6

    Google Scholar 

  44. Thomaz E, Parnami A, Bidwell J, Essa I, Abowd GD (2013) Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, pp 739–748. ACM

  45. Truong KN, Patel SN, Summet JW, Abowd GD (2005) Preventing camera recording by designing a capture-resistant environment. In: International conference on ubiquitous computing, pp 73–86. Springer

  46. Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3 (1):71–86

    Article  Google Scholar 

  47. Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: IEEE Computer society conference on computer vision and pattern recognition (CVPR), vol 1, pp I–I. IEEE

  48. Wei J (2014) How wearables intersect with the cloud and the internet of things: Considerations for the developers of wearables. IEEE Consumer Electron Mag 3(3):53–56

    Article  Google Scholar 

  49. Wu J, Osuntogun A, Choudhury T, Philipose M, Rehg JM (2007) A scalable approach to activity recognition based on object use. In: IEEE international conference on computer vision (ICCV), pp 1–8. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giovanni Maria Farinella.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farinella, G.M., Napoli, C., Nicotra, G. et al. A context-driven privacy enforcement system for autonomous media capture devices. Multimed Tools Appl 78, 14091–14108 (2019). https://doi.org/10.1007/s11042-019-7376-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7376-z

Keywords

Navigation