Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.48550/arxiv.1806.08471
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Visual Content Privacy Leaks on Social Media Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…These types of conflict can affect the privacy of minors [62,63] and bystanders [23,27,57]. This co-owned content can cause privacy leaks without it being the individual's intent [30]. In the ML pipeline, the researcher should consider possible issues for MPC in all phases.…”
Section: Multiparty Conflict (Mpc)mentioning
confidence: 99%
See 1 more Smart Citation
“…These types of conflict can affect the privacy of minors [62,63] and bystanders [23,27,57]. This co-owned content can cause privacy leaks without it being the individual's intent [30]. In the ML pipeline, the researcher should consider possible issues for MPC in all phases.…”
Section: Multiparty Conflict (Mpc)mentioning
confidence: 99%
“…To protect the visual privacy of individuals, researchers have suggested the use of concepts like obfuscation [18,29] for mitigating objects and faces and privacy risk scores. The idea of visual privacy mitigation is centered around accessibility and caters to the individualistic concept of privacy [7,30]. Most visual privacy systems use one or more of these five protection techniques [29]: intervention [20], blind vision [20], secure processing [19,20], redaction [18], and data hiding [20].…”
Section: Introductionmentioning
confidence: 99%