2017
DOI: 10.1007/s11042-016-4337-7
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection vs. utility in visual data

Abstract: Ubiquitous and networked sensors impose a huge challenge for privacy protection which has become an emerging problem of modern society. Protecting the privacy of visual data is particularly important due to the omnipresence of cameras, and various protection mechanisms for captured images and videos have been proposed. This paper introduces an objective evaluation framework in order to assess such protection methods. Visual privacy protection is typically realised by obfuscating sensitive image regions which o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 43 publications
0
15
0
Order By: Relevance
“…To assess the efficiency of privacy enhancement, most of the existing work relies on automatic recognition techniques trained for extracting various attributes, such as identity, age, gender, ethnicity, or others, from the biometric data, e.g., [10], [20], [22], [33], [44], [45], [46], [69], [105], [106]. Experiments are typically conducted on both, the original and privacy enhanced data, and performance differences between the two groups of data are reported.…”
Section: Evaluation Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…To assess the efficiency of privacy enhancement, most of the existing work relies on automatic recognition techniques trained for extracting various attributes, such as identity, age, gender, ethnicity, or others, from the biometric data, e.g., [10], [20], [22], [33], [44], [45], [46], [69], [105], [106]. Experiments are typically conducted on both, the original and privacy enhanced data, and performance differences between the two groups of data are reported.…”
Section: Evaluation Methodologymentioning
confidence: 99%
“…Masking techniques are in general easy to implement and are, hence, often used as baselines in various privacyrelated performance evaluations, e.g., [104], [105], [106].…”
Section: B-pet Categorymentioning
confidence: 99%
See 2 more Smart Citations
“…This will require recognition of occupant's activities, gestures, body pose, facial expressions, etc. While it can be accomplished using video cameras, their use will likely raise privacy concerns which can hinder further development [7]. One approach to address privacy concerns is to obscure visuallyidentifying information via explicit image manipulation, such as pixelization, blurring, cartooning, etc.…”
Section: Introductionmentioning
confidence: 99%