Abstract
The evolution of the Internet of Things and the related market has renewed the concept of media recording and sharing by means of a new kind of home-consumer devices, capable of continuous and autonomous media capture and upload. Such technologies have already begun to tamper with people’s privacy and discretion expectations, also raising many concerns about the potential legal implications. This work proposes an overall context-related privacy preserving system, based on context recognition. Our approach has been specifically developed considering contexts characterized by a high degree of similarity. The presented methodology has been devised in order to enforce privacy rules using image recognition techniques jointly with radio beacon technology. The reported results show that, in the peculiar environment considered in this paper, the use of radio beacon technology can help to increase the performances of image recognition techniques, both in terms of computational performances and elapsed time.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-019-7376-z/MediaObjects/11042_2019_7376_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-019-7376-z/MediaObjects/11042_2019_7376_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-019-7376-z/MediaObjects/11042_2019_7376_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-019-7376-z/MediaObjects/11042_2019_7376_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-019-7376-z/MediaObjects/11042_2019_7376_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-019-7376-z/MediaObjects/11042_2019_7376_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-019-7376-z/MediaObjects/11042_2019_7376_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-019-7376-z/MediaObjects/11042_2019_7376_Fig8_HTML.png)
Similar content being viewed by others
References
Abowd G, Rehg J, Starner T, Arriaga R (2007) Using information technologies to support detection of developmental delay. In: Assisted cognition workshop
Aditya P, Sen R, Druschel P, Joon Oh S, Benenson R, Fritz M, Schiele B, Bhattacharjee B, Wu TT (2016) I-pic: a platform for privacy-compliant image capture. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services, pp 235–248. ACM
Allen AL (2008) Dredging up the past: lifelogging, memory, and surveillance. The University of Chicago Law Review 75(1):47–74
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Avidan S, Butman M (2006) Blind vision. In: European conference on computer vision, pp 1–13. Springer
Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing system (NIPS), pp 57–64
Battiato S, Farinella GM, Napoli C, Nicotra G, Riccobene S (2017) Recognizing context for privacy preserving of first person vision image sequences. In: International conference on image analysis and processing, pp 580–590. Springer
Bay H, Tuytelaars T, Van Gool L (2006) Surf: Speeded up robust features. In: Computer vision – ECCV 2006, pp 404–417. Springer, Berlin
Bo C, Shen G, Liu J, Li XY, Zhang Y, Zhao F (2014) Privacy. tag: Privacy concern expressed and respected. In: Proceedings of the 12th ACM conference on embedded network sensor systems, pp 163–176. ACM
Butler DJ, Huang J, Roesner F, Cakmak M (2015) The privacy-utility tradeoff for remotely teleoperated robots. In: Proceedings of the 10th annual ACM/IEEE international conference on human-robot interaction, pp 27–34. ACM
Campbell C (2000) Algorithmic approaches to training support vector machines: a survey. In: 8th european symposium on artificial neural networks, pp 27–54
Chen Y, Jones GJ (2010) Augmenting human memory using personal lifelogs. In: Proceedings of the 1st augmented human international conference, p 24. ACM
Cheng WC, Golubchik L, Kay DG (2004) Total recall: are privacy changes inevitable?. In: Proceedings of the the 1st ACM workshop on continuous archival and retrieval of personal experiences, pp 86–92. ACM
Chon Y, Lane ND, Li F, Cha H, Zhao F (2012) Automatically characterizing places with opportunistic crowdsensing using smartphones. In: Proceedings of the 2012 ACM conference on ubiquitous computing, pp 481–490. ACM
Cramer R, Damgård I, Nielsen JB (2001) Multiparty computation from threshold homomorphic encryption. In: International conference on the theory and applications of cryptographic techniques, pp 280–300. Springer
Csurka G, Dance CR, Fan L, Willamowski J, Bray C (2004) Visual categorization with bags of keypoints. In: In workshop on statistical learning in computer vision, ECCV, pp 1–22
Dai J, Saghafi B, Wu J, Konrad J, Ishwar P (2015) Towards privacy-preserving recognition of human activities. In: 2015 IEEE international conference on image processing (ICIP), pp 4238–4242. IEEE
Du W, Atallah MJ (2001) Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 workshop on New security paradigms, pp 13–22. ACM
Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32 (2):5
Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: International symposium on privacy enhancing technologies symposium, pp 235–253. Springer
Goldreich O (2009) Foundations of cryptography: volume 2, basic applications. Cambridge University Press, Cambridge
Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: Proceedings of the 19th annual ACM symposium on theory of computing, pp 218–229. ACM
Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3(3):1157–1182
Hoyle R, Templeman R, Armes S, Anthony D, Crandall D, Kapadia A (2014) Privacy behaviors of lifeloggers using wearable cameras. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, pp 571–582. ACM
Jana S, Narayanan A, Shmatikov V (2013) A scanner darkly: protecting user privacy from perceptual applications. In: 2013 IEEE symposium on security and privacy (SP), pp 349–363. IEEE
Keller JM, Gray MR, Givens JA (1985) A fuzzy k-nearest neighbor algorithm. IEEE Trans Syst Man Cybern 15:580–585
Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems 25, pp 1097-1105. Curran Associates Inc
Kumar R, Novak J, Tomkins A (2010) Structure and evolution of online social networks. In: Link mining: models, algorithms, and applications, pp 337–357. Springer
Lindell Y, Pinkas B (2009) Secure multiparty computation for privacy-preserving data mining. J Priv Confid 1(1):5
Mann S (1997) Wearable computing: a first step toward personal imaging. Comput 30(2):25–32
Mihailidis A, Hoey J, Boutilier C, Boger J (2007) Towards the development of an intelligent home to support agingin-place. In: Assisted cognition workshop
Miluzzo E, Lane ND, Fodor K, Peterson R, Lu H, Musolesi M, Eisenman SB, Zheng X, Campbell AT (2008) Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In: Proceedings of the 6th ACM conference on embedded network sensor systems, pp 337–350. ACM
Nauman M, Khan S, Zhang X (2010) Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM symposium on information, computer and communications security, pp 328–332. ACM
O’Hara K, Tuffield MM, Shadbolt N (2008) Lifelogging: privacy and empowerment with memories for life. Identity Inf Soc 1(1):155–172
Ongtang M, Butler K, McDaniel P (2010) Porscha: policy oriented secure content handling in android. In: Proceedings of the 26th annual computer security applications conference, pp 221–230. ACM
Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510–527
Park S, Kautz HA (2008) Privacy-preserving recognition of activities in daily living from multi-view silhouettes and rfid-based training. In: AAAI Fall symposium: AI in eldercare: new solutions to old problems, pp 70–77
Portokalidis G, Homburg P, Anagnostakis K, Bos H (2010) Paranoid android: versatile protection for smartphones. In: Proceedings of the 26th annual computer security applications conference, pp 347–356. ACM
Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613–620
Taigman Y, Yang M, Ranzato M, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1701–1708
Templeman R, Korayem M, Crandall DJ, Kapadia A (2014) Placeavoider: steering first-person cameras away from sensitive spaces. In: Network and distributed system security symposium (NDSS)
Teraoka T (2012) Organization and exploration of heterogeneous personal data collected in daily life. Human-Centric Comput Inf Sci 2(1):1
Thierer AD (2015) The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation. Richmond J Law Technol 21(2):6
Thomaz E, Parnami A, Bidwell J, Essa I, Abowd GD (2013) Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, pp 739–748. ACM
Truong KN, Patel SN, Summet JW, Abowd GD (2005) Preventing camera recording by designing a capture-resistant environment. In: International conference on ubiquitous computing, pp 73–86. Springer
Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3 (1):71–86
Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: IEEE Computer society conference on computer vision and pattern recognition (CVPR), vol 1, pp I–I. IEEE
Wei J (2014) How wearables intersect with the cloud and the internet of things: Considerations for the developers of wearables. IEEE Consumer Electron Mag 3(3):53–56
Wu J, Osuntogun A, Choudhury T, Philipose M, Rehg JM (2007) A scalable approach to activity recognition based on object use. In: IEEE international conference on computer vision (ICCV), pp 1–8. IEEE
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Farinella, G.M., Napoli, C., Nicotra, G. et al. A context-driven privacy enforcement system for autonomous media capture devices. Multimed Tools Appl 78, 14091–14108 (2019). https://doi.org/10.1007/s11042-019-7376-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7376-z