2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) 2016
DOI: 10.1109/sahcn.2016.7733008
|View full text |Cite
|
Sign up to set email alerts
|

PrivacyCamera: Cooperative Privacy-Aware Photographing with Mobile Phones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…Face blurring is as likeable and only slightly less attractive in terms of other elements of users' experience and does provide some amount of privacy enhancement. Given this, it make sense that face blurring is a commonly used filter in existing literature (Ilia et al, 2015;A. Li et al, 2016) and in practice (e.g., in Google's street view, people's faces are blurred).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Face blurring is as likeable and only slightly less attractive in terms of other elements of users' experience and does provide some amount of privacy enhancement. Given this, it make sense that face blurring is a commonly used filter in existing literature (Ilia et al, 2015;A. Li et al, 2016) and in practice (e.g., in Google's street view, people's faces are blurred).…”
Section: Discussionmentioning
confidence: 99%
“…In this approach, part of the photo is hidden, for example by blurring, pixelating or distorting a person's face to avoid identification. Blurring is the most commonly used and widely studied approach to controlling photo content disclosure (e.g., Ilia, Polakis, Athanasopoulos, Maggi, & Ioannidis, 2015;Li, Li, & Gao, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…ObscuraCam [13] Respectful cameras [21] Invisible Light Beacons [23] Negative face blurring [24] Device-based-collaborative I-pic [14] PrivacyCamera [20] Do Not Capture [22] IoT 2020, 1 203…”
Section: Bystander-basedmentioning
confidence: 99%
“…Device-based obfuscation: In this group, third-party devices which are not owned by the bystander perform blurring or add noise (in the signal processing sense) to the image captured from the bystander to hide his/her identity. Depending on how the software at the capturing device performs the blurring, solutions in this category can be further classified into default obfuscation (any face in the image will be blurred) [19], selective obfuscation (third-party device users select who to obfuscate in the image) [20], or collaborative obfuscation (third-party and bystander's device collaborate via wireless protocols [47] to allow a face to be blurred) [21]. A drawback of device-based obfuscation method is that a bystander must trust a device that he/she does not control to protect his/her privacy.…”
mentioning
confidence: 99%
“…Templeman et al [36] implemented a system PlaceAvoider to protect visual privacy by identifying sensitive places in video streams. Li et al [37], [38] proposed two systems for protecting bystanders' privacy in photo taking. Tan et al [11] designed an access control scheme to protect private photos on mobile phones, but it depends on pre-specified target faces on mobile phones and can only provide limited protection.…”
Section: Related Workmentioning
confidence: 99%