I-Pic: A Platform for Privacy-Compliant Image Capture

نویسندگان

  • Paarijaat Aditya
  • Rijurekha Sen
  • Peter Druschel
  • Seong Joon Oh
  • Rodrigo Benenson
  • Mario Fritz
  • Bernt Schiele
  • Bobby Bhattacharjee
  • Tong Tong Wu
چکیده

The ubiquity of portable mobile devices equipped with built-in cameras have led to a transformation in how and when digital images are captured, shared, and archived. Photographs and videos from social gatherings, public events, and even crime scenes are commonplace online. While the spontaneity afforded by these devices have led to new personal and creative outlets, privacy concerns of bystanders (and indeed, in some cases, unwilling subjects) have remained largely unaddressed. We present I-Pic, a trusted software platform that integrates digital capture with user-defined privacy. In I-Pic, users choose a level of privacy (e.g., image capture allowed or not) based upon social context (e.g., out in public vs. with friends vs. at workplace). Privacy choices of nearby users are advertised via short-range radio, and I-Pic-compliant capture platforms generate edited media to conform to privacy choices of image subjects. I-Pic uses secure multiparty computation to ensure that users’ visual features and privacy choices are not revealed publicly, regardless of whether they are the subjects of an image capture. Just as importantly, I-Pic preserves the ease-of-use and spontaneous nature of capture and sharing between trusted users. Our evaluation of I-Pic shows that a practical, energy-efficient system that conforms to the privacy choices of many users within a scene can be built and deployed using current hardware.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud-based Privacy Preserving Image Storage, Sharing and Search

High-resolution cameras produce huge volume of high quality images everyday. It is extremely challenging to store, share and especially search those huge images, for which increasing number of cloud services are presented to support such functionalities. However, images tend to contain rich sensitive information (e.g., people, location and event), and people’s privacy concerns hinder their read...

متن کامل

Considerations for use of dental photography and electronic media in dental education and clinical practice.

Photography and electronic media are indispensable tools for dental education and clinical practice. Although previous research has focused on privacy issues and general strategies to protect patient privacy when sharing clinical photographs for educational purposes, there are no published recommendations for developing a functional, privacy-compliant institutional framework for the capture, st...

متن کامل

Open-source intelligence and privacy by design

As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements, in particular legal requirements. The experience of the VIRTUOSO platform will be used to illustra...

متن کامل

Design and Dynamic Modeling of Planar Parallel Micro-Positioning Platform Mechanism with Flexible Links Based on Euler Bernoulli Beam Theory

This paper presents the dynamic modeling and design of micro motion compliant parallel mechanism with flexible intermediate links and rigid moving platform. Modeling of mechanism is described with closed kinematic loops and the dynamic equations are derived using Lagrange multipliers and Kane’s methods. Euler-Bernoulli beam theory is considered for modeling the intermediate flexible link. Based...

متن کامل

A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments

In this paper we describe a system for allocating computational resources to distributed applications and services (within distributed data centres and utility computing systems) in order to perform operations on personal or confidential data in a way that is compliant with associated privacy policies. Relevant privacy policies are selected on the fly, based on related metapolicies, depending o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016