2017
DOI: 10.1145/3134702
|View full text |Cite
|
Sign up to set email alerts
|

Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos

Abstract: Current collaborative photo privacy protection solutions can be categorized into two approaches: controlling the recipient, which restricts certain viewers' access to the photo, and controlling the content, which protects all or part of the photo from being viewed. Focusing on the latter approach, we introduce privacy-enhancing obfuscations for photos and conduct an online experiment with 271 participants to evaluate their effectiveness against human recognition and how they affect the viewing experience. Resu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
40
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 62 publications
(41 citation statements)
references
References 57 publications
1
40
0
Order By: Relevance
“…To protect visual privacy, these methods can be implemented before posting the content or after identifying private objects. Most privacy technology uses one or more of these five protection techniques: intervention [23,26], blind vision [2,4,12], secure processing [12,15], redaction [27][28][29][30], and data hiding [12,15,31].…”
Section: Previous Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…To protect visual privacy, these methods can be implemented before posting the content or after identifying private objects. Most privacy technology uses one or more of these five protection techniques: intervention [23,26], blind vision [2,4,12], secure processing [12,15], redaction [27][28][29][30], and data hiding [12,15,31].…”
Section: Previous Literaturementioning
confidence: 99%
“…On SMNs, the users' information and visual content can intentionally or unintentionally be shared even though there may be a privacy risk contained [1]. From visual content, attackers can extract textual information, including credit card numbers, social security numbers, place of residence, phone numbers and other information [1,4]. This content can consequently create an opportunity for "cyberbullying" of other users [3].…”
mentioning
confidence: 99%
“…We found that blurring improves quantitiy of recalled details, but does not improve the accuracy of recall. Although blurring for obfuscation is commonly used in research [7,13] and industry (e.g., Google Street View), we cannot make claims about the impact of other techniques on memory recall. We plan to compare in the impact of obfuscation in explicit photo capturing contexts such as taking selfies.…”
Section: Lesson Learnt: Ambiguous Lifelogs Might Distort Memoriesmentioning
confidence: 99%
“…This is particularly true for environmental lifelogging [5]. Previous work counteracted this problem by 1) deleting photos: this can be done post hoc or by preventing the capture of photos if privacy-sensitive situations are detected [16], or by 2) obfuscating the individuals, for example by inpainting them and replacing them by avatars [13]. The second approach is particularly promising as it protects the individuals' privacy while maintaining good utility and user experience [13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation