An outlook into the future of egocentric vision

C Plizzari, G Goletto, A Furnari, S Bansal… - International Journal of …, 2024 - Springer
What will the future be? We wonder! In this survey, we explore the gap between current
research in egocentric vision and the ever-anticipated future, where wearable computing …

Defeating image obfuscation with deep learning

R McPherson, R Shokri, V Shmatikov - arXiv preprint arXiv:1609.00408, 2016 - arxiv.org
We demonstrate that modern image recognition methods based on artificial neural networks
can recover hidden information from images protected by various forms of obfuscation. The …

Towards a visual privacy advisor: Understanding and predicting privacy risks in images

T Orekondy, B Schiele, M Fritz - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
With an increasing number of users sharing information online, privacy implications entailing
such actions are a major concern. For explicit content, such as user profile or GPS data …

A survey on privacy preservation in fog-enabled internet of things

K Sarwar, S Yongchareon, J Yu… - ACM Computing Surveys …, 2021 - dl.acm.org
Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical
challenges that need to be addressed before the full adoption of the IoT. Data privacy is one …

" I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications

T Akter, B Dosono, T Ahmed, A Kapadia… - 29th USENIX Security …, 2020 - usenix.org
The emergence of camera-based assistive technologies has empowered people with visual
impairments (VIP) to obtain independence in their daily lives. Popular services feature …

Photo privacy conflicts in social media: A large-scale empirical study

JM Such, J Porter, S Preibusch, A Joinson - Proceedings of the 2017 …, 2017 - dl.acm.org
Items in social media such as photos may be co-owned by multiple users, ie, the sharing
decisions of the ones who upload them have the potential to harm the privacy of the others …

Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos

Y Li, N Vishwamitra, BP Knijnenburg, H Hu… - Proceedings of the ACM …, 2017 - dl.acm.org
Current collaborative photo privacy protection solutions can be categorized into two
approaches: controlling the recipient, which restricts certain viewers' access to the photo …

Privacy preserving image-based localization

P Speciale, JL Schonberger, SB Kang… - Proceedings of the …, 2019 - openaccess.thecvf.com
Image-based localization is a core component of many augmented/mixed reality (AR/MR)
and autonomous robotic systems. Current localization systems rely on the persistent storage …

[PDF][PDF] Blur vs. block: Investigating the effectiveness of privacy-enhancing obfuscation for images

N Vishwamitra, B Knijnenburg, H Hu… - Proceedings of the …, 2017 - openaccess.thecvf.com
Computer vision can lead to privacy issues such as unauthorized disclosure of private
information and identity theft, but it may also be used to preserve user privacy. For example …

Real-fictional entanglements: Using science fiction and design fiction to interrogate sensing technologies

RY Wong, E Van Wyk, J Pierce - … of the 2017 Conference on Designing …, 2017 - dl.acm.org
We present a set of design fiction proposals related to sensing and tracking technologies,
inspired by the 2013 science fiction novel The Circle. By creating design proposals that …