Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing 2013
DOI: 10.1145/2493432.2493509
|View full text |Cite
|
Sign up to set email alerts
|

Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras

Abstract: First-person point-of-view (FPPOV) images taken by wearable cameras can be used to better understand people's eating habits. Human computation is a way to provide effective analysis of FPPOV images in cases where algorithmic approaches currently fail. However, privacy is a serious concern. We provide a framework, the privacy-saliency matrix, for understanding the balance between the eating information in an image and its potential privacy concerns. Using data gathered by 5 participants wearing a lanyardmounted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(29 citation statements)
references
References 18 publications
0
29
0
Order By: Relevance
“…Thomaz et al [30] proposed a privacy saliency matrix to guide which images created by a lifelogger may pose privacy threats and should therefore be protected. Their model focuses on a specific setting related to eating behaviors in the context of a user study whereas we consider lifeloggers who share images for social reasons.…”
Section: Sharing Lifelogging Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Thomaz et al [30] proposed a privacy saliency matrix to guide which images created by a lifelogger may pose privacy threats and should therefore be protected. Their model focuses on a specific setting related to eating behaviors in the context of a user study whereas we consider lifeloggers who share images for social reasons.…”
Section: Sharing Lifelogging Datamentioning
confidence: 99%
“…Complementary work includes defensive frameworks in which users define policies based on physical location, so that photos taken in predefined sensitive spaces can be recognized and then deleted or quarantined for review [27]. Researchers have also qualitatively studied reactions of bystanders to wearable camera devices [10,20], as well as the sensitivity of lifelogging data and how it could be automatically altered to enable privacy-preserving processing [30]. However, we do not have a clear understanding of the privacy behaviors and attitudes of the 'lifeloggers' using these devices, or the kinds of images that people will perceive as sensitive, either for themselves or others.…”
Section: Introductionmentioning
confidence: 99%
“…Reviewing lifelogging data offers a chance to reflect on everyday experiences in a manner not easily afforded otherwise, providing the opportunity to draw new insights and learning, informing future behavior. Unsurprisingly, studies of lifelogging experiences are already an important focus for research [9,10,11,19], particularly in the areas of human autobiographical memory [9,15,17,19] and health-behavior monitoring [13,18].…”
Section: Related Workmentioning
confidence: 99%
“…This highlights the difficulty of relying on users filtering captured data and suggests that solutions that (i) automatically filter data, or (ii) those that restrict capture, may be more appropriate. Prior work indicates that automatic filtering of lifelogging photos based the presence of faces can be effective at reducing bystander privacy risks, as can cropping techniques that remove the bystanders but keep the remaining image content [18]. However, privacy infringements vary with person and context, and in many cases those very items that pose a privacy risk are themselves most valuable as a memory trigger (e.g.…”
Section: What Privacy Issues Are Likely To Arise ?mentioning
confidence: 99%
See 1 more Smart Citation