skip to main content
10.1145/2638728.2641707acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

MarkIt: privacy markers for protecting visual secrets

Published:13 September 2014Publication History

ABSTRACT

The increasing popularity of wearable devices that continuously capture video, and the prevalence of third-party applications that utilize these feeds have resulted in a new threat to privacy. In many situations, sensitive objects/regions are maliciously (or accidentally) captured in a video frame by third-party applications. However, current solutions do not allow users to specify and enforce fine grained access control over video feeds.

In this paper, we describe MarkIt, a computer vision based privacy marker framework, that allows users to specify and enforce fine grained access control over video feeds. We present two example privacy marker systems -- PrivateEye and WaveOff. We conclude with a discussion of the computer vision, privacy and systems challenges in building a comprehensive system for fine grained access control over video feeds.

References

  1. Belussi, L. F., and Hirata, N. S. Fast component-based qr code detection in arbitrarily acquired images. J. Math. Imaging Vis. (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chaudhari, J., Cheung, S., and Venkatesh, M. Privacy protection for life-log video. In SAFE (2007).Google ScholarGoogle Scholar
  3. Enev, M., Jung, J., Bo, L., Ren, X., and Kohno, T. Sensorsift: Balancing sensor data privacy and utility in automated face understanding. ACSAC (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Everingham, M., Van Gool, L., Williams, C. K. I., Winn, J., and Zisserman, A. The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results. http://www.pascal-network.org/challenges/VOC/voc2012/workshop/index.html.Google ScholarGoogle Scholar
  5. Ha, K., Chen, Z., Hu, W., Richter, W., Pillai, P., and Satyanarayanan, M. Towards wearable cognitive assistance. MobiSys (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hodges, S., Williams, L., Berry, E., Izadi, S., Srinivasan, J., Butler, A., Smyth, G., Kapur, N., and Wood, K. Sensecam: A retrospective memory aid. UbiComp (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jana, S., Molnar, D., Moshchuk, A., Dunn, A., Livshits, B., Wang, H. J., and Ofek, E. Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers. In USENIX Security (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jana, S., Narayanan, A., and Shmatikov, V. A Scanner Darkly: Protecting User Privacy from Perceptual Applications. In S & P (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Juels, A. Rfid security and privacy: a research survey. Selected Areas in Communications, IEEE Journal on (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kalal, Z., Mikolajczyk, K., and Matas, J. Tracking-learning-detection. PAMI (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Metz, R. More connected homes, more problems. MIT Technology Review (2013).Google ScholarGoogle Scholar
  12. Ra, M.-R., Sheth, A., Mummert, L., Pillai, P., Wetherall, D., and Govindan, R. Odessa: Enabling interactive perception applications on mobile devices. MobiSys (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Rastogi, V., Suciu, D., and Welbourne, E. Access control over uncertain data. VLDB (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Roesner, F., Kohno, T., and Molnar, D. Security and privacy for augmented reality systems. Commun. ACM (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., and Wang, H. J. World-driven access control for continuous sensing. Tech. Rep. MSR-TR-2014-67, 2014.Google ScholarGoogle Scholar
  16. Sample, A., Macomber, C., Jiang, L.-T., and Smith, J. Optical localization of passive uhf rfid tags with integrated leds. In RFID (2012).Google ScholarGoogle Scholar
  17. Schiff, J., Meingast, M., Mulligan, D., Sastry, S., and Goldberg, K. Respectful cameras: detecting visual markers in real-time to address privacy concerns. In IROS (2007).Google ScholarGoogle ScholarCross RefCross Ref
  18. Templeman, R., Korayem, M., Crandall, D., and Kapadia, A. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In NDSS (2014).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. MarkIt: privacy markers for protecting visual secrets

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
          September 2014
          1409 pages
          ISBN:9781450330473
          DOI:10.1145/2638728

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 September 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate764of2,912submissions,26%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader