Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3117811.3117820acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Public Access

Automating Visual Privacy Protection Using a Smart LED

Published: 04 October 2017 Publication History

Abstract

The ubiquity of mobile camera devices has been triggering an outcry of privacy concerns, whereas privacy protection still relies on the cooperation of the photographer or camera hardware, which can hardly be guaranteed in practice. In this paper, we introduce LiShield, which automatically protects a physical scene against photographing, by illuminating it with smart LEDs flickering in specialized waveforms. We use a model-driven approach to optimize the waveform, so as to ensure protection against the (uncontrollable) cameras and potential image-processing based attacks. We have also designed mechanisms to unblock authorized cameras and enable graceful degradation under strong ambient light interference. Our prototype implementation and experiments show that LiShield can effectively destroy unauthorized capturing while maintaining robustness against potential attacks.

References

[1]
2010. Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90, 3 (2010).
[2]
Paarijaat Aditya, Rijurekha Sen, Peter Druschel, Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele, Bobby Bhattacharjee, and Tong Tong Wu. 2016. I-Pic: A Platform for Privacy-Compliant Image Capture. In Proceedings of ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).
[3]
Saeed Al-Mansoori and Alavi Kunhu. 2012. Robust watermarking technique based on DCT to protect the ownership of DubaiSat-1 images against attacks. International Journal of Computer Science and Network Security (IJCSNS) 12, 6 (2012), 1.
[4]
Stephen J. Anderson and David C. Burr. 1985. Spatial and temporal selectivity of the human motion detection system. Vision Research 25, 8 (1985), 1147 -- 1154.
[5]
Mauro Barni. 2006. Document and Image compression. CRC press.
[6]
BBC. 2004. The Camera Phone Backlash. (2004). http://news.bbc.co.uk/2/hi/uk_news/magazine/3793501.stm
[7]
Cheng Bo, Guobin Shen, Jie Liu, Xiang-Yang Li, YongGuang Zhang, and Feng Zhao. 2014. Privacy.Tag: Privacy Concern Expressed and Respected. In ACM Conference on Embedded Network Sensor Systems (SenSys).
[8]
Jérôme Boulanger. {n. d.}. jboulanger.gmic. ({n. d.}). https://github.com/jboulanger/jboulanger-gmic
[9]
Antoni Buades, Bartomeu Coll, and J-M Morel. 2005. A non-local algorithm for image denoising. In Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on, Vol. 2. IEEE, 60--65.
[10]
Herschel Clement Burstyn. 2009. Cinema anti-piracy measures. (2009). US Patent 7,634,089.
[11]
Herschel Clement Burstyn, George Herbert Needham Riddle, Leon Shapiro, and David Lloyd Staebler. 2008. Method and apparatus for film anti-piracy. (2008). US Patent 7,324,646.
[12]
Tung-Shou Chen, Chin-Chen Chang, and Min-Shiang Hwang. 1998. A virtual image cryptosystem based upon vector quantization. IEEE transactions on Image Processing 7, 10 (1998), 1485--1488.
[13]
Cinetics. {n. d.}. Axis360 Pro. http://cinetics.com/axis360-pro/. ({n. d.}).
[14]
Ronald R Coifman and David L Donoho. 1995. Translation-invariant de-noising. Springer.
[15]
Kostadin Dabov, Alessandro Foi, Vladimir Katkovnik, and Karen Egiazarian. 2006. Image denoising with block-matching and 3D filtering. In Electronic Imaging. International Society for Optics and Photonics.
[16]
Christos Danakis, Mostafa Afgani, Gordon Povey, Ian Underwood, and Harald Haas. 2012. Using a CMOS camera sensor for visible light communication. In Proc. of IEEE Globecom Workshops.
[17]
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy- mediating Technologies. In SIGCHI Conference on Human Factors in Computing Systems (CHI).
[18]
F. Dufaux and T. Ebrahimi. 2008. Scrambling for Privacy Protection in Video Surveillance Systems. IEEE Transactions on Circuits and Systems for Video Technology 18, 8 (2008).
[19]
Engadget. 2016. Japan's noisy iPhone problem. (2016). https://www.engadget.com/2016/09/30/japans-noisy-iphone-problem/
[20]
Michael Epstein and Douglas A Stanton. 2003. Method and device for preventing piracy of video material from theater screens. (2003). US Patent 6,529,600.
[21]
James A Fancher, David H Sitrick, and Gregory P Sitrick. 2003. Movie film security system utilizing infrared patterns. (2003). US Patent 6,559,883.
[22]
Iain Fergusson. {n. d.}. External Filters by Iain Fergusson. ({n. d.}). https://github.com/dtschump/gmic-community/blob/master/include/iain_fergusson.gmic
[23]
Federico Ferrari, Marco Zimmerling, Lothar Thiele, and Olga Saukh. 2011. Efficient network flooding and time synchronization with glossy. In Proc. of ACM/IEEE IPSN. 73--84.
[24]
Forbes. 2011. Adventures in Self-Surveillance, aka The Quantified Self, aka Extreme Navel-Gazing. (Apr. 2011).
[25]
Nobuhiro Fujimoto and Hikari Mochizuki. 2013. 477 Mbit/s visible light transmission based on OOK-NRZ modulation using a single commercially available visible LED and a practical LED driver with a pre-emphasis circuit. In National Fiber Optic Engineers Conference. Optical Society of America, JTh2A--73.
[26]
Nobuhiro Fujimoto and Shohei Yamamoto. 2014. The fastest visible light transmissions of 662 Mb/s by a blue LED, 600 Mb/s by a red LED, and 520 Mb/s by a green LED based on simple OOK-NRZ modulation of a commercially available RGB-type white LED using pre-emphasis and post-equalizing techniques. In Optical Communication (ECOC), 2014 European Conference on. IEEE, 1--3.
[27]
Zhongpai Gao, Guangtao Zhai, and Chunjia Hu. 2015. The invisible qr code. In Proceedings of the 23rd ACM international conference on Multimedia. ACM, 1047--1050.
[28]
Golf News Net. 2015. Why is it illegal in South Korea to silence mobile phone camera sounds? (2015). https://thegolfnewsnet.com/golfnewsnetteam/2015/10/07/illegal-south-korea-silence-mobile-phone-camera-sounds-13503/
[29]
Rafael L Gomes, Luiz F Bittencourt, Edmundo RM Madeira, Eduardo Cerqueira, and Mario Gerla. 2015. QoE-Aware dynamic virtual network resource adaptation for EaaS environment. In Communications (ICC), 2015 IEEE International Conference on. IEEE, 6836--6841.
[30]
Dean K Goodhill and Ty Safreno. 2011. Method and apparatus for inhibiting the piracy of motion pictures. (2011). US Patent 8,018,569.
[31]
Joseph W Goodman. 2005. Introduction to Fourier optics. Roberts and Company Publishers.
[32]
Google. {n. d.}. android.hardware.camera2. ({n. d.}). https://developer.android.com/reference/android/hardware/camera2/package-summary.html
[33]
Phil Green and Lindsay MacDonald. 2011. Colour engineering: achieving device independent colour. Vol. 30. John Wiley & Sons.
[34]
Stacey L. Gulick. 2004. Preventing Unauthorized Audio and Video Recording at Your Practice. (2004). http://medicaleconomics.modernmedicine.com/medical-economics/content/tags/hipaa/preventing-unauthorized-audio-and-video-recording-your-practice?page=full
[35]
Mark Harman. {n. d.}. Open Camera. ({n. d.}). http://opencamera.sourceforge.net/
[36]
David Honzátko. {n. d.}. CUDA implementation of BM3D. ({n. d.}). https://github.com/DawyD/bm3d-gpu
[37]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy Behaviors of Lifeloggers Using Wearable Cameras. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).
[38]
Chin-Wei Hsu, Kevin Liang, Hung-Yu Chen, Liang-Yu Wei, Chien-Hung Yeh, Yang Liu, and Chi-Wai Chow. 2016. Visible light encryption system using camera image sensor. In OptoElectronics and Communications Conference (OECC) held jointly with 2016 International Conference on Photonics in Switching (PS), 2016 21st. IEEE, 1--3.
[39]
Chunjia Hu, Guangtao Zhai, and Zhongpai Gao. 2015. Visible light communication via temporal psycho-visual modulation. In Proceedings of the 23rd ACM international conference on Multimedia. ACM, 785--788.
[40]
Image Team of the GREYC laboratory. {n. d.}. G'MIC - GREYC's Magic for Image Computing. ({n. d.}). http://gmic.eu/
[41]
Yi Jiang, Ke Zhou, and Sheng He. 2007. Human visual cortex responds to invisible chromatic flicker. Nature Neuroscience 10, 5 (2007), 657--662.
[42]
Jaeyeon Jung and Matthai Philipose. 2014. Courteous Glass. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).
[43]
Masayuki Karakawa. 2006. Laser video projection system and method with anti-piracy feature. (2006). US Patent 7,103,074.
[44]
Ye-Sheng Kuo, Pat Pannuto, Ko-Jen Hsiao, and Prabal Dutta. 2014. Luxapose: Indoor Positioning with Mobile Phones and Visible Light. In Proc. of ACM MobiCom.
[45]
Hui-Yu Lee, Hao-Min Lin, Yu-Lin Wei, Hsin-I Wu, Hsin-Mu Tsai, and Kate Ching-Ju Lin. 2015. Rollinglight: Enabling line-of-sight light-to-camera communications. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 167--180.
[46]
LG Electronics. {n. d.}. Nexus 5. ({n. d.}). http://www.lg.com/ca_en/cell-phones/lg-D820-White-nexus5
[47]
Tianxing Li, Chuankai An, Xinran Xiao, Andrew T. Campbell, and Xia Zhou. 2015. Real-Time Screen-Camera Communication Behind Any Scene. In Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).
[48]
Zhenjiang Li, Cheng Li, Wenwei Chen, Jingyao Dai, Mo Li, Xiang-Yang Li, and Yunhao Liu. 2012. Clock Calibration Using Fluorescent Lighting. In Proceedings of International Conference on Mobile Computing and Networking (MobiCom).
[49]
C. K. Liang, L. W. Chang, and H. H. Chen. 2008. Analysis and Compensation of Rolling Shutter Effect. IEEE Transactions on Image Processing 17, 8 (2008).
[50]
M Ronnier Luo, Guihua Cui, and B Rigg. 2001. The development of the CIE 2000 colour-difference formula: CIEDE2000. Color Research & Application 26, 5 (2001), 340--350.
[51]
Maxim Integrated Products, Inc. 2004. Why Drive White LEDs with Constant Current? https://www.maximintegrated.com/en/app-notes/index.mvp/id/3256. (Aug. 2004).
[52]
Moni Naor and Adi Shamir. 1995. Visual Cryptography. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EURO- CRYPT).
[53]
Narrative. 2016. Narrative Clip 2 Wearable HD Video Camera. (2016). http://getnarrative.com/
[54]
T. Naseer, J. Sturm, and D. Cremers. 2013. FollowMe: Person Following and Gesture Recognition With a Quadrocopter. In IEEE/RSJ International Conference on Intelligent Robots and Systems.
[55]
Alaeddin Nassani, Huidong Bai, Gun Lee, and Mark Billinghurst. 2015. Tag It!: AR Annotation Using Wearable Sensors. In SIGGRAPH Asia Mobile Graphics and Interactive Applications.
[56]
Elaine M. Newton, Latanya Sweeney, and Bradley Malin. 2005. Preserving Privacy by De-Identifying Face Images. IEEE Transactions on Knowledge and Data Engineering 17, 2 (2005).
[57]
S. John Obringer and Kent Coffey. 2007. Cell Phones in American High Schools: A National Survey. Journal of Technology Studies 33, 1 (2007).
[58]
ON Semiconductor. {n. d.}. NCL30160: LED Driver, Constant Current Buck Regulator, 1.0 A. ({n. d.}). http://www.onsemi.com/PowerSolutions/product.do?id=NCL30160
[59]
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. 1999. Information Hiding--a-Survey. Proc. IEEE 87, 7 (1999).
[60]
Philips Lighting B.V. {n. d.}. Philips Hue. ({n. d.}). http://meethue.com
[61]
John D Price. 2009. Methods and apparatus for detection of motion picture piracy for piracy prevention. (2009). US Patent App. 12/322,915.
[62]
QImaging. 2014. Rolling Shutter vs. Global Shutter. (2014). https://www.qimaging.com/ccdorscmos/pdfs/RollingvsGlobalShutter.pdf
[63]
Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward Privacy-preserving Photo Sharing. In USENIX Conference on Networked Systems Design and Implementation (NSDI).
[64]
Swati Rallapalli, Aishwarya Ganesan, Krishna Chintalapudi, Venkat N. Padmanabhan, and Lili Qiu. 2014. Enabling Physical Analytics in Retail Stores Using Smart Glasses. In Annual International Conference on Mobile Computing and Networking (MobiCom).
[65]
Nisarg Raval, Animesh Srivastava, Ali Razeen, Kiron Lebeck, Ashwin Machanavajjhala, and Lanodn P. Cox. 2016. What You Mark is What Apps See. In Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).
[66]
Erik Reinhard, Wolfgang Heidrich, Paul Debevec, Sumanta Pattanaik, Greg Ward, and Karol Myszkowski. 2010. High dynamic range imaging: acquisition, display, and image-based lighting. Morgan Kaufmann.
[67]
Mehul P Sampat, Zhou Wang, Shalini Gupta, Alan Conrad Bovik, and Mia K Markey. 2009. Complex wavelet structural similarity: A new image similarity index. IEEE transactions on image processing 18, 11 (2009), 2385--2401.
[68]
Yosef Sanhedrai, Ariel Schwarz, Liad Ben Yishai, and Zeev Zalevsky. 2007. System and method for preventing photography. (2007). US Patent App. 12/308,525.
[69]
Oren Shani. {n. d.}. Precise Time Synchronization Over WLAN. ({n. d.}). http://www.ti.com/lit/an/swaa162a/swaa162a.pdf
[70]
Ling Shao, Ruomei Yan, Xuelong Li, and Yan Liu. 2014. From heuristic optimization to dictionary learning: A review and comprehensive comparison of image denoising algorithms. IEEE Transactions on Cybernetics 44, 7 (2014), 1001--1013.
[71]
David H Sitrick and James A Fancher. 2004. Anti-piracy protection system and methodology. (2004). US Patent 6,771,349.
[72]
David H Sitrick and James A Fancher. 2007. Targeted anti-piracy system and methodology. (2007). US Patent 7,170,577.
[73]
David H Sitrick and James A Fancher. 2011. System and methodology for validating compliance of anti-piracy security and reporting thereupon. (2011). US Patent 8,006,311.
[74]
Fikret Sivrikaya and Bülent Yener. 2004. Time Synchronization in Sensor Networks: a Survey. IEEE network 18, 4 (2004), 45--50.
[75]
Vincent So. 2009. Anti-piracy image display methods and systems. (2009). US Patent 7,634,134.
[76]
Social Pilot. 2016. 125 Amazing Social Media Statistics You Should Know. (2016). https://socialpilot.co/blog/125-amazing-social-media-statistics-know-2016/
[77]
S.S. Stevens. 1975. Psychophysics: introduction to its perceptual, neural, and social prospects. Transaction Publishers.
[78]
STMicroelectronics. {n. d.}. STM32F103C8. ({n. d.}). http://www.st.com/en/microcontrollers/stm32f103c8.html
[79]
Emil Tchoukaleysky. 2013. Digital cinema anti-piracy method and apparatus for liquid crystal projection systems. (2013). US Patent 8,559,791.
[80]
Robert Templeman, Mohammed Korayem, David J. Crandall, and Apu Kapadia. 2014. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. In Network and Distributed System Security Symposium (NDSS).
[81]
R. Templeman, Z. Rahman, D. Crandall, and A. Kapadia. 2013. PlaceRaider: Virtual Theft in Physical Spaces With Smartphones. In Network and Distributed System Security Symposium (NDSS).
[82]
Michael Terman and Jiuan Su Terman. 2005. Light therapy for seasonal and nonseasonal depression: efficacy, protocol, safety, and side effects. CNS spectrums 10, 08 (2005), 647--663.
[83]
The GIMP Team. {n. d.}. GIMP - GNU Image Manipulation Program. ({n. d.}). https://www.gimp.org/
[84]
Victor Tiscareno, Kevin Jonhson, and Cindy Lawrence. 2011. Systems and Methods for Receiving Infrared Data with a Camera Designed to Detect Images. (2011).
[85]
PR Tregenza. 1980. The daylight factor and actual illuminance ratios. Lighting Research & Technology 12, 2 (1980), 64--68.
[86]
Khai N. Truong, Shwetak N. Patel, Jay W. Summet, and Gregory D. Abowd. 2005. Preventing Camera Recording by Designing a Capture-Resistant Environment.
[87]
Christopher W. Tyler. 1985. Analysis of visual modulation sensitivity. II. Peripheral retina and the role of photoreceptor dimensions. Journal of the Optical Society of America A 2, 3 (1985), 393--398.
[88]
H. van der Broeck, G. Sauerlander, and M. Wendt. 2007. Power driver topologies and control schemes for LEDs. In Annual IEEE Applied Power Electronics Conference and Exposition.
[89]
Anran Wang, Zhuoran Li, Chunyi Peng, Guobin Shen, Gan Fang, and Bing Zeng. 2015. Inframe++: Achieve simultaneous screen-human viewing and hidden screen-camera communication. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 181--195.
[90]
Anran Wang, Chunyi Peng, Ouyang Zhang, Guobin Shen, and Bing Zeng. 2014. Inframe: Multiflexing full-frame visible communication channel for humans and devices. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks. ACM, 23.
[91]
Zhou Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13, 4 (2004), 600--612.
[92]
Zhou Wang and Eero P Simoncelli. 2005. Translation insensitive image similarity in complex wavelet domain. In Acoustics, Speech, and Signal Processing, 2005. Proceedings.(ICASSP'05). IEEE International Conference on, Vol. 2. IEEE, ii--573.
[93]
Allan G Weber. 1997. The USC-SIPI image database version 5. USC-SIPI Report 315 (1997), 1--24.
[94]
Donald Henry Willis. 2008. Method, apparatus and system for anti-piracy protection in digital cinema. (2008). US Patent App. 12/736,774.
[95]
H. James Wilson. 2012. You, By the Numbers. Harvard Business Review (Sep. 2012).
[96]
W. Winterhalter, F. Fleckenstein, B. Steder, L. Spinello, and W. Burgard. 2015. Accurate Indoor Localization for RGB-D Smartphones and Tablets Given 2D Floor Plans. In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[97]
Grace Woo, Andy Lippman, and Ramesh Raskar. 2012. VRCodes: Unobtrusive and Active Visual Codes for Interaction by Exploiting Rolling Shutter. In IEEE International Symposium on Mixed and Augmented Reality (ISMAR).
[98]
Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan, and Jin Teng. 2009. Stealthy Video Capturer: a New Video-Based Spyware in 3G smartphones. In Proceedings of the ACM conference on Wireless Network Security (WiSec).
[99]
Zhe Yang, Yuting Bao, Chuhao Luo, Xingya Zhao, Siyu Zhu, Chunyi Peng, Yunxin Liu, and Xinbing Wang. 2016. ARTcode: Preserve Art and Code in Any Image. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).
[100]
Hong Heather Yu and Prabir Bhattacharya. 2006. Methods and apparatus for digital content protection. (2006). US Patent 7,006,630.
[101]
Guangtao Zhai and Xiaolin Wu. 2014. Defeating camcorder piracy by temporal psychovisual modulation. Journal of Display Technology 10, 9 (2014), 754--757.
[102]
Chi Zhang and Xinyu Zhang. 2016. LiTell: Robust Indoor Localization Using Unmodified Light Fixtures. In Proc. of ACM MobiCom.
[103]
Chi Zhang and Xinyu Zhang. 2017. Pulsar: Towards Ubiquitous Visible Light Localization. In Proc. of ACM MobiCom.
[104]
Lan Zhang, Cheng Bo, Jiahui Hou, Xiang-Yang Li, Yu Wang, Kebin Liu, and Yunhao Liu. 2015. Kaleido: You Can Watch It But Cannot Record It. In ACM International Conference on Mobile Computing and Networking (MobiCom).
[105]
Lan Zhang, Kebin Liu, Xiang-Yang Li, Cihang Liu, Xuan Ding, and Yunhao Liu. 2016. Privacy-friendly Photo Capturing and Sharing System. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).
[106]
Shilin Zhu and Xinyu Zhang. 2017. Enabling High-Precision Visible Light Localization in Today's Buildings. In Proc. of ACM MobiSys.

Cited By

View all
  • (2024)The Sociotechnical Stack: Opportunities for Social Computing Research in Non-Consensual Intimate MediaProceedings of the ACM on Human-Computer Interaction10.1145/36869148:CSCW2(1-21)Online publication date: 8-Nov-2024
  • (2024)Feminist Interaction Techniques: Social Consent Signals to Deter NCIM ScreenshotsProceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3654777.3676380(1-14)Online publication date: 13-Oct-2024
  • (2024)Invisible Optical Adversarial Stripes on Traffic Sign against Autonomous VehiclesProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661854(534-546)Online publication date: 3-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '17: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking
October 2017
628 pages
ISBN:9781450349161
DOI:10.1145/3117811
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. camera
  2. computer vision
  3. privacy protection
  4. visible light

Qualifiers

  • Research-article

Funding Sources

Conference

MobiCom '17
Sponsor:

Acceptance Rates

MobiCom '17 Paper Acceptance Rate 35 of 186 submissions, 19%;
Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)223
  • Downloads (Last 6 weeks)22
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The Sociotechnical Stack: Opportunities for Social Computing Research in Non-Consensual Intimate MediaProceedings of the ACM on Human-Computer Interaction10.1145/36869148:CSCW2(1-21)Online publication date: 8-Nov-2024
  • (2024)Feminist Interaction Techniques: Social Consent Signals to Deter NCIM ScreenshotsProceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3654777.3676380(1-14)Online publication date: 13-Oct-2024
  • (2024)Invisible Optical Adversarial Stripes on Traffic Sign against Autonomous VehiclesProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661854(534-546)Online publication date: 3-Jun-2024
  • (2024)Exploiting Fine-grained Dimming with Improved LiFi ThroughputACM Transactions on Sensor Networks10.1145/364381420:3(1-24)Online publication date: 13-Apr-2024
  • (2024)Stealthy and Effective Physical Adversarial Attacks in Autonomous DrivingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.342292019(6795-6809)Online publication date: 2024
  • (2023)One-time Camera Fingerprint: Unauthorized Photography Detection under Modulated IlluminationProceedings of the 21st ACM Conference on Embedded Networked Sensor Systems10.1145/3625687.3625784(181-194)Online publication date: 12-Nov-2023
  • (2023)MagicCloth: Protect User Privacy in AR StreamingProceedings of the 1st ACM Workshop on Mobile Immersive Computing, Networking, and Systems10.1145/3615452.3617936(222-228)Online publication date: 6-Oct-2023
  • (2023)The Security in Optical Wireless Communication: A SurveyACM Computing Surveys10.1145/359471855:14s(1-36)Online publication date: 28-Apr-2023
  • (2023)Demo: Integrated On-site Localization and Optical Camera Communication for Drones2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM57956.2023.00055(334-336)Online publication date: Jun-2023
  • (2023)PoseFly: On-site Pose Parsing of Swarming Drones via 4-in-1 Optical Camera Communication2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM57956.2023.00021(67-76)Online publication date: Jun-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

EPUB

View this article in ePub.

ePub

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media