Proceedings of the 1998 ACM Conference on Computer Supported Cooperative Work 1998
DOI: 10.1145/289444.289450
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating image filtering based techniques in media space applications

Abstract: Nledia space applications that promote informrd aw~eness in an organization confront an inevitable paradox: the shared video connections between offices and rooms that promote informal awareness rdso cm rob individurds of privacy. A important open problem in this area is how to foster awareness of colleagues while minimizing the accompanying 10SSof privacy. One proposrd put forward is to filter the communicated video streams rather than broadcasting clear video. Such a scheme may facilitate awareness while hel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
42
0
2

Year Published

2002
2002
2015
2015

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(44 citation statements)
references
References 11 publications
0
42
0
2
Order By: Relevance
“…In previous studies, it has been claimed that ad hoc de-identification methods, such as pixelation and blurring prevent humans from reliably recognizing the identity of de-identified images [7,4,8,9,5,11]. However, as our experiments demonstrate, these methods can not prevent a computer from reliably performing recognition; even at 40% de-identification the PCA algorithm achieves almost perfect recognition.…”
Section: Formal Methods Are Better For Protecting Privacymentioning
confidence: 58%
See 2 more Smart Citations
“…In previous studies, it has been claimed that ad hoc de-identification methods, such as pixelation and blurring prevent humans from reliably recognizing the identity of de-identified images [7,4,8,9,5,11]. However, as our experiments demonstrate, these methods can not prevent a computer from reliably performing recognition; even at 40% de-identification the PCA algorithm achieves almost perfect recognition.…”
Section: Formal Methods Are Better For Protecting Privacymentioning
confidence: 58%
“…In particular, proposed methods include pixelation and blur and various other distortion filters [7,4,8,9,5,10,11]. This set of obfuscating techniques prevent the rendering of the original image, but they do not provide intuition as to whether or not privacy is maintained.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…the eyes) or blurring or pixelation of faces [7,17,20,36] were eventually tested. However, these methods are visually intrusive and target human and algorithmic recognition alike.…”
Section: Related Workmentioning
confidence: 99%
“…The majority of work on images or image sequences applies simple distortion methods such as "pixelation" (image subsampling) or "blurring" (smoothing the image with e.g. a Gaussian filter with large variance) to obfuscate parts or all of the image [7,17,20,27]. The PrivacyCam architecture proposed by Senior et al [24] suppresses automatically segmented foreground objects in the scene and cryptographically secures access to the altered video stream produced by the system.…”
Section: Related Workmentioning
confidence: 99%