CHI '09 Extended Abstracts on Human Factors in Computing Systems 2009
DOI: 10.1145/1520340.1520704
|View full text |Cite
|
Sign up to set email alerts
|

Tagged photos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…For example, if removing an individual results in a gap between two people in a group photo, the resulting photo may look unrealistic or fabricated. The study by Li et al [28] also showed also showed that blurring, although not as effective in privacy protection, was among the preferred techniques, conforming with its extensive usage in research and practice [1,16,27].…”
Section: Related Work 21 Obfuscating Individuals In Photosmentioning
confidence: 88%
See 1 more Smart Citation
“…For example, if removing an individual results in a gap between two people in a group photo, the resulting photo may look unrealistic or fabricated. The study by Li et al [28] also showed also showed that blurring, although not as effective in privacy protection, was among the preferred techniques, conforming with its extensive usage in research and practice [1,16,27].…”
Section: Related Work 21 Obfuscating Individuals In Photosmentioning
confidence: 88%
“…For this reason, previous work in the HCI and security communities studied obfuscation methods in terms of both: their effectiveness in concealing identities and their impact on perceived visual aesthetics of photos. Obfuscation methods that have been studied extensively include blurring [1,16,27,28], pixelating [5,23,28,39], masking [23,28,42], replacement with avatar [28,33], cartooning [13,33] and inpainting [8,28,31,41].…”
Section: Related Work 21 Obfuscating Individuals In Photosmentioning
confidence: 99%
“…They recommended inpainting individuals or replacing them with avatars because these obfuscation methods provided a good trade-off between effective protection of privacy against computer vision attacks and a good viewer experience [37]. However, they also reported that blurring was among the preferred techniques, conforming with its extensive usage in research and practice [5,28,36]. Gross et al showed that blurring and pixelating of human faces could extensively expose features hindering privacy, or extensively eliminate features hindering the utility of videos [20].…”
Section: Privacy In Lifelogsmentioning
confidence: 99%
“…C2 (obfuscation) Participants received an obfuscated version of photos in (C1), where all persons were blurred (see sidebar 1). We used body blurring because of positive results in prior work [2,8,12] and its wide adoption in research and industry (e.g. Google Maps).…”
Section: Session 1: Building the Lifelog In A Controlled Eventmentioning
confidence: 99%