Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2393347.2396460acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
abstract

Use of invisible noise signals to prevent privacy invasion through face recognition from camera images

Published: 29 October 2012 Publication History

Abstract

A method is proposed for preventing privacy invasion through unintentional capture of facial images. Prevention methods such as covering the face and painting particular patterns on the face are effective but hinder face-to-face communication. The proposed method overcomes this problem through the use of a device worn on the face that transmits near-infrared signals that are picked up by camera image sensors, which makes the face in captured images undetectable. The device is similar in appearance to a pair of eyeglasses, and the signals cannot be seen by the human eye, so face-to-face communication is not hindered. Testing of a prototype "privacy visor" showed that it can effectively prevent privacy invasion via face detection by corrupting the facial images.

References

[1]
Wearable Privacy Shells, http://www.toxel.com/tech/2011/08/20/wearable-privacy-shells/, 2011.
[2]
K-M. Cutler, "How to camouflage yourself from facial recognition technology," http://venturebeat.com/2010/07/02/facial-recognition-camouflage/, 2010.
[3]
T. Yamada et al., "Preventing re-recording based on difference between sensory perceptions of humans and devices," Proc. of the 17th International Conference on Image Processing (ICIP 2010), pp. 993--996, 2010.
[4]
T. Yamada et al., "IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics," Proc. of the 9th International Workshop on Digital Watermarking (IWDW 2010), LNCS 6526, pp. 280--292, Springer, 2010.
[5]
J. Schanda (Ed.), "Colorimetry: Understanding the CIE System," Wiley-Interscience, 2007.
[6]
P. Viola and M. Jones, "Robust Real-Time Face Detection," Int'l Journal of Computer Vision, vol. 57, no. 2, pp. 137--154, 2004.
[7]
OpenCV 2.0 C Reference (Object Detection part), http://opencv.willowgarage.com/documentation/index.html

Cited By

View all
  • (2023)Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera SystemsProceedings of the 31st ACM International Conference on Multimedia10.1145/3581783.3612082(8799-8807)Online publication date: 26-Oct-2023
  • (2022)Controlled Intentional Degradation in Analytical Video SystemsProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3517899(2105-2119)Online publication date: 10-Jun-2022
  • (2021)Preventing Fake Information Generation Against Media Clone AttacksIEICE Transactions on Information and Systems10.1587/transinf.2020MUI0001E104.D:1(2-11)Online publication date: 1-Jan-2021
  • Show More Cited By

Index Terms

  1. Use of invisible noise signals to prevent privacy invasion through face recognition from camera images

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        MM '12: Proceedings of the 20th ACM international conference on Multimedia
        October 2012
        1584 pages
        ISBN:9781450310895
        DOI:10.1145/2393347

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 29 October 2012

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. face recognition
        2. infrared LED
        3. privacy invasion
        4. unintentional facial capture

        Qualifiers

        • Abstract

        Conference

        MM '12
        Sponsor:
        MM '12: ACM Multimedia Conference
        October 29 - November 2, 2012
        Nara, Japan

        Acceptance Rates

        Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)19
        • Downloads (Last 6 weeks)5
        Reflects downloads up to 23 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera SystemsProceedings of the 31st ACM International Conference on Multimedia10.1145/3581783.3612082(8799-8807)Online publication date: 26-Oct-2023
        • (2022)Controlled Intentional Degradation in Analytical Video SystemsProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3517899(2105-2119)Online publication date: 10-Jun-2022
        • (2021)Preventing Fake Information Generation Against Media Clone AttacksIEICE Transactions on Information and Systems10.1587/transinf.2020MUI0001E104.D:1(2-11)Online publication date: 1-Jan-2021
        • (2020)A User Study of a Wearable System to Enhance Bystanders’ Facial PrivacyIoT10.3390/iot10200131:2(198-217)Online publication date: 10-Oct-2020
        • (2019)Progressive Scrambling for Social MediaCensorship, Surveillance, and Privacy10.4018/978-1-5225-7113-1.ch106(2133-2152)Online publication date: 2019
        • (2018)Progressive Scrambling for Social MediaInternational Journal of Digital Crime and Forensics10.4018/IJDCF.201804010410:2(56-73)Online publication date: 1-Apr-2018
        • (2018)FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of ThingsElectronics10.3390/electronics71203797:12(379)Online publication date: 3-Dec-2018
        • (2018)IEICE INFORMATION AND SYSTEMS SOCIETY JOURNAL10.1587/ieiceissjournal.22.4_1022:4(10-11)Online publication date: 2018
        • (2018)Rainbow: Preventing Mobile-Camera-based Piracy in the Physical WorldIEEE INFOCOM 2018 - IEEE Conference on Computer Communications10.1109/INFOCOM.2018.8485881(1061-1069)Online publication date: Apr-2018
        • (2017)Bystanders' PrivacyIT Professional10.1109/MITP.2017.4219:3(61-65)Online publication date: 2017
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media