Luddy researchers Rakibul Hasan, David Crandall, and Apu Kapadia of Indiana University, and Mario Fritz from CISPA Helmholtz Center for Information Security, will present their paper "Automatically Detecting Bystanders in Photos to Reduce Privacy Risks" at the annual IEEE Symposium on Security and Privacy.
This paper focuses on privacy concerns in the context of cameras and “bystanders,” i.e., people who are not the main subject of the photo but are inadvertently captured in photos. The authors propose a fully-automated approach to detect bystanders using computer vision and machine learning. Once detected, they can be obfuscated, thus enforcing a “privacy-by-default” policy where bystanders’ privacy can be protected without requiring them to be proactive. Furthermore, this general-purpose approach can be deployed in cameras and mobile phones, as well as in the cloud.
To understand ‘what makes someone a bystander’, the authors conducted a user study using images from the Google Open Image Dataset. This study unveiled intuitive high-level concepts that people use to distinguish between ‘subjects’ and ‘bystanders’ within photos. With extensive experimentation, the authors discovered visual features that can be used to first infer those concepts and then make a final classification. The best classifier yielded high accuracy even for the images in which the roles of subjects and bystanders were ambiguous to human annotators. This fully automated and general approach, based solely on image data, does not require explicit user action and has the potential to protect bystanders’ privacy at scale.
This material is based upon work supported in part by the National Science Foundation under grant CNS-1408730.
This diversity of defense in ML increases the cost of subverting the model through black box attacks, and sharing of suspicious data offers the potential for one model to detect an attack on another. More importantly Block-Pi provides user-centric security such that user privacy is protected while autonomy and security are improved. They have completed two experiments to show the feasibility of the proposed system.
This research was supported by Cisco Research Award funding and is based on work supported by the National Science Foundation (NSF) under Grant CNS 1814518 and CNS 1565375.