PoliteCamera: Respecting Strangers’ Privacy in Mobile Photographing

  • Ang LiEmail author
  • Wei Du
  • Qinghua Li
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 254)


Camera is a standard on-board sensor of modern mobile phones. It makes photo taking popular due to its convenience and high resolution. However, when users take a photo of a scenery, a building or a target person, a stranger may also be unintentionally captured in the photo. Such photos expose the location and activity of strangers, and hence may breach their privacy. In this paper, we propose a cooperative mobile photographing scheme called PoliteCamera to protect strangers’ privacy. Through the cooperation between a photographer and a stranger, the stranger’s face in a photo can be automatically blurred upon his request when the photo is taken. Since multiple strangers nearby the photographer might send out blurring requests but not all of them are in the photo, an adapted balanced convolutional neural network (ABCNN) is proposed to determine whether the requesting stranger is in the photo based on facial attributes. Evaluations demonstrate that the ABCNN can accurately predict facial attributes and PoliteCamera can provide accurate privacy protection for strangers.


Mobile phone Photo Privacy 


  1. 1.
    Bo, C., Shen, G., Liu, J., Li, X.Y., Zhang, Y., Zhao, F.: Privacy.tag: privacy concern expressed and respected. In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, pp. 163–176. ACM (2014)Google Scholar
  2. 2.
  3. 3.
    Chen, T., et al.: MXnet: a flexible and efficient machine learning library for heterogeneous distributed systems. arXiv preprint arXiv:1512.01274 (2015)
  4. 4.
  5. 5.
    Dong, W., Dave, V., Qiu, L., Zhang, Y.: Secure friend discovery in mobile social networks. In: 2011 Proceedings of IEEE, INFOCOM, pp. 1647–1655. IEEE (2011)Google Scholar
  6. 6.
  7. 7.
    Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report 07–49. University of Massachusetts, Amherst (2007)Google Scholar
  8. 8.
  9. 9.
    Jana, S., et al.: Enabling fine-grained permissions for augmented reality applications with recognizers. In: USENIX Security, pp. 415–430 (2013)Google Scholar
  10. 10.
    Jana, S., Narayanan, A., Shmatikov, V.: A scanner darkly: protecting user privacy from perceptual applications. In: 2013 IEEE Symposium on Security and Privacy, SP, pp. 349–363. IEEE (2013)Google Scholar
  11. 11.
    Jung, J., Philipose, M.: Courteous glass. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, pp. 1307–1312. ACM (2014)Google Scholar
  12. 12.
    Kang, S., Lee, D., Yoo, C.D.: Face attribute classification using attribute-aware correlation map and gated convolutional neural networks. In: 2015 IEEE International Conference on Image Processing, ICIP, pp. 4922–4926. IEEE (2015)Google Scholar
  13. 13.
    Kumar, N., Belhumeur, P., Nayar, S.: FaceTracer: a search engine for large collections of images with faces. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008. LNCS, vol. 5305, pp. 340–353. Springer, Heidelberg (2008). Scholar
  14. 14.
    Li, A., Li, Q., Gao, W.: PrivacyCamera: cooperative privacy-aware photographing with mobile phones. In: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON, pp. 1–9. IEEE (2016)Google Scholar
  15. 15.
    Liu, Y., Guo, Y., Liang, C.: A survey on peer-to-peer video streaming systems. Peer-to-Peer Netw. Appl. 1(1), 18–28 (2008)CrossRefGoogle Scholar
  16. 16.
    Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730–3738 (2015)Google Scholar
  17. 17.
    Pidcock, S., Smits, R., Hengartner, U., Goldberg, I.: NotiSense: an urban sensing notification system to improve bystander privacy. In: PhoneSense (2011)Google Scholar
  18. 18.
    Raval, N., Cox, L., Srivastava, A., Machanavajjhala, A., Lebeck, K.: MarkIt: privacy markers for protecting visual secrets. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, pp. 1289–1295. ACM (2014)Google Scholar
  19. 19.
    Schafer, J.B., Frankowski, D., Herlocker, J., Sen, S.: Collaborative filtering recommender systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web. LNCS, vol. 4321, pp. 291–324. Springer, Heidelberg (2007). Scholar
  20. 20.
    Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65–89. Springer, London (2009)CrossRefGoogle Scholar
  21. 21.
    Shapiro, L., Stockman, G.: Computer Vision, Chap. 12, pp. 137–150. Prentice Hall, New Jersey (2001)Google Scholar
  22. 22.
    Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)
  23. 23.
    iPhone 7 technical specifications (2016).
  24. 24.
    Tan, J., Drolia, U., Martins, R., Gandhi, R., Narasimhan, P.: Short paper: chips: content-based heuristics for improving photo privacy for smartphones. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, pp. 213–218. ACM (2014)Google Scholar
  25. 25.
    Templeman, R., Kapadia, A., Hoyle, R., Crandall, D.: Reactive security: responding to visual stimuli from wearable cameras. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, pp. 1297–1306. ACM (2014)Google Scholar
  26. 26.
    Templeman, R., Korayem, M., Crandall, D., Kapadia, A.: PlaceAvoider: steering first-person cameras away from sensitive spaces. In: Network and Distributed System Security Symposium (NDSS) (2014)Google Scholar
  27. 27.
    Wang, H., Bao, X., Roy Choudhury, R., Nelakuditi, S.: Visually fingerprinting humans without face recognition. In: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 345–358. ACM (2015)Google Scholar
  28. 28.
    Zhang, L., Liu, K., Li, X.Y., Liu, C., Ding, X., Liu, Y.: Privacy-friendly photo capturing and sharing system. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 524–534. ACM (2016)Google Scholar
  29. 29.
    Zhang, Z., Luo, P., Loy, C.C., Tang, X.: Learning social relation traits from face images. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3631–3639 (2015)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.Department of Computer Science and Computer EngineeringUniversity of ArkansasFayettevilleUSA
  2. 2.Department of Electrical and Computer EngineeringMichigan State UniversityEast LansingUSA

Personalised recommendations