ABSTRACT
The increasing popularity of wearable devices that continuously capture video, and the prevalence of third-party applications that utilize these feeds have resulted in a new threat to privacy. In many situations, sensitive objects/regions are maliciously (or accidentally) captured in a video frame by third-party applications. However, current solutions do not allow users to specify and enforce fine grained access control over video feeds.
In this paper, we describe MarkIt, a computer vision based privacy marker framework, that allows users to specify and enforce fine grained access control over video feeds. We present two example privacy marker systems -- PrivateEye and WaveOff. We conclude with a discussion of the computer vision, privacy and systems challenges in building a comprehensive system for fine grained access control over video feeds.
- Belussi, L. F., and Hirata, N. S. Fast component-based qr code detection in arbitrarily acquired images. J. Math. Imaging Vis. (2013). Google ScholarDigital Library
- Chaudhari, J., Cheung, S., and Venkatesh, M. Privacy protection for life-log video. In SAFE (2007).Google Scholar
- Enev, M., Jung, J., Bo, L., Ren, X., and Kohno, T. Sensorsift: Balancing sensor data privacy and utility in automated face understanding. ACSAC (2012). Google ScholarDigital Library
- Everingham, M., Van Gool, L., Williams, C. K. I., Winn, J., and Zisserman, A. The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results. http://www.pascal-network.org/challenges/VOC/voc2012/workshop/index.html.Google Scholar
- Ha, K., Chen, Z., Hu, W., Richter, W., Pillai, P., and Satyanarayanan, M. Towards wearable cognitive assistance. MobiSys (2014). Google ScholarDigital Library
- Hodges, S., Williams, L., Berry, E., Izadi, S., Srinivasan, J., Butler, A., Smyth, G., Kapur, N., and Wood, K. Sensecam: A retrospective memory aid. UbiComp (2006). Google ScholarDigital Library
- Jana, S., Molnar, D., Moshchuk, A., Dunn, A., Livshits, B., Wang, H. J., and Ofek, E. Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers. In USENIX Security (2013). Google ScholarDigital Library
- Jana, S., Narayanan, A., and Shmatikov, V. A Scanner Darkly: Protecting User Privacy from Perceptual Applications. In S & P (2013). Google ScholarDigital Library
- Juels, A. Rfid security and privacy: a research survey. Selected Areas in Communications, IEEE Journal on (2006). Google ScholarDigital Library
- Kalal, Z., Mikolajczyk, K., and Matas, J. Tracking-learning-detection. PAMI (2012). Google ScholarDigital Library
- Metz, R. More connected homes, more problems. MIT Technology Review (2013).Google Scholar
- Ra, M.-R., Sheth, A., Mummert, L., Pillai, P., Wetherall, D., and Govindan, R. Odessa: Enabling interactive perception applications on mobile devices. MobiSys (2011). Google ScholarDigital Library
- Rastogi, V., Suciu, D., and Welbourne, E. Access control over uncertain data. VLDB (2008). Google ScholarDigital Library
- Roesner, F., Kohno, T., and Molnar, D. Security and privacy for augmented reality systems. Commun. ACM (2014). Google ScholarDigital Library
- Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., and Wang, H. J. World-driven access control for continuous sensing. Tech. Rep. MSR-TR-2014-67, 2014.Google Scholar
- Sample, A., Macomber, C., Jiang, L.-T., and Smith, J. Optical localization of passive uhf rfid tags with integrated leds. In RFID (2012).Google Scholar
- Schiff, J., Meingast, M., Mulligan, D., Sastry, S., and Goldberg, K. Respectful cameras: detecting visual markers in real-time to address privacy concerns. In IROS (2007).Google ScholarCross Ref
- Templeman, R., Korayem, M., Crandall, D., and Kapadia, A. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In NDSS (2014).Google ScholarCross Ref
Index Terms
- MarkIt: privacy markers for protecting visual secrets
Recommendations
PBDM: a flexible delegation model in RBAC
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologiesRole-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control policy. Delegation of authority is among these rules. RBDM0 and RDM2000 ...
Personalised anonymity for microdata release
Individual privacy protection in the released data sets has become an important issue in recent years. The release of microdata provides a significant information resource for researchers, whereas the release of person‐specific data poses a threat to ...
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction
The privacy model of radio frequency identification RFID systems is for formalizing the adversarial capabilities and the security requirements of RFID anonymity and untraceability. Existing unpredictability-based privacy models such as unp-privacy, eunp-...
Comments