skip to main content
10.1145/2858036.2858120acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
note

You Can't Watch This!: Privacy-Respectful Photo Browsing on Smartphones

Published:07 May 2016Publication History

ABSTRACT

We present an approach to protect photos on smartphones from unwanted observations by distorting them in a way that makes it hard or impossible to recognize their content for an onlooker who does not know the photographs. On the other hand, due to the chosen way of distortion, the device owners who know the original images have no problems recognizing photos. We report the results of a user study (n=18) that showed very high usability properties for all tested graphical filters (only 11 out of 216 distorted photos were not correctly identified by their owners). At the same time, two of the filters significantly reduced the observability of the image contents.

References

  1. Anne Adams and Martina Angela Sasse. 1999. Users Are Not the Enemy. Commun. ACM 42, 12 (Dec. 1999), 40--46.\showISSN0001-0782\showDOI%http://dx.doi.org/10.1145/322796.322806 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Mike Burton, Stephen Wilson, Michelle Cowan, and Vicki Bruce. 1999. Face Recognition in Poor-Quality Video: Evidence From Security Surveillance. Psychological Science 10, 3 (1999), 243--248. DOI http://dx.doi.org/10.1111/1467--9280.00144Google ScholarGoogle ScholarCross RefCross Ref
  3. Daniel Buschek, Moritz Bader, Emanuel von Zezschwitz, and Alexander De Luca. 2015. Automatic Privacy Classification of Personal Photos. In Human-Computer Interaction INTERACT 2015, Julio Abascal, Simone Barbosa, Mirko Fetter, Tom Gross, Philippe Palanque, and Marco Winckler (Eds.). Lecture Notes in Computer Science, Vol. 9297. Springer International Publishing, 428--435. ISBNx978-3-319-226675 DOI http://dx.doi.org/10.1007/978-3-319-22668-2_33Google ScholarGoogle ScholarCross RefCross Ref
  4. Tamara Denning, Kevin Bowers, Marten van Dijk, and Ari Juels. 2011. Exploring Implicit Memory for Painless Password Recovery. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 2615--2618. ISBNx978-1-4503-0228-9 DOI http://dx.doi.org/10.1145/1978942.1979323 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Sigrid Andrea Ebbinghaus. 2015. Privacy-Respectful Photo Browsing for Smartphones Filter Selection and Evaluation. Technical Report LMU-MI-2015-3. University of Munich (LMU), Department of Computer Science, Media Informatics Group, Munich, Germany. URLwww.medien.ifi.lmu.de/forschung/publikationen/detail?pub=ZezschwitzTR_PrivacyGoogle ScholarGoogle Scholar
  6. Adrienne Porter Felt, Serge Egelman, and David Wagner. 2012. I'Ve Got 99 Problems, but Vibration Ain't One: A Survey of Smartphone Users' Concerns. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12). ACM, New York, NY, USA, 33--44. ISBNx978-1-4503-1666-8 DOI http://dx.doi.org/10.1145/2381934.2381943Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Richard L. Gregory. 1997. Knowledge in perception and illusion. Philosophical Transactions of the Royal Society of London B: Biological Sciences 352, 1358 (1997), 1121--1127. ISSN0962-8436 http://dx.doi.org/10.1098/rstb.1997.0095Google ScholarGoogle ScholarCross RefCross Ref
  8. Atsushi Harada, Takeo Isarida, Tadanori Mizuno, and Masakatsu Nishigaki. 2006. A User Authentication System Using Schema of Visual Memory. In Biologically Inspired Approaches to Advanced Information Technology, AukeJan Ijspeert, Toshimitsu Masuzawa, and Shinji Kusumoto (Eds.). Lecture Notes in Computer Science, Vol. 3853. Springer Berlin Heidelberg, 338--345. ISBNx978-3-540-31253-6 http://dx.doi.org/10.1007/11613022_28 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 213--230. ISBNx978-1-931971-13--3 URL https://www.usenix.org/system/files/conference/soups2014/soups14-paper-harbach.pdfGoogle ScholarGoogle Scholar
  10. Eiji Hayashi, Rachna Dhamija, Nicolas Christin, and Adrian Perrig. 2008. Use Your Illusion: Secure Authentication Usable Anywhere. In Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS '08). ACM, New York, NY, USA, 35--45. ISBNx978-1-60558-276-4 DOI http://dx.doi.org/10.1145/1408664.1408670 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Amy K. Karlson, A.J. Bernheim Brush, and Stuart Schechter. 2009. Can I Borrow Your Phone?: Understanding Concerns when Sharing Mobile Phones. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09). ACM, New York, NY, USA, 1647--1650. ISBNx978-1-60558-246-7 DOI http://dx.doi.org/10.1145/1518701.1518953 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hikari Kinjo and Joan Gay Snodgrass. 2000. Does the generation effect occur for pictures? The American journal of psychology 113, 1 (2000), 95. URL http://www.jstor.org/stable/1423462Google ScholarGoogle Scholar
  13. Zhan Wang, Jiwu Jing, and Liang Li. 2013. Time Evolving Graphical Password for Securing Mobile Devices. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS '13). ACM, New York, NY, USA, 347--352. ISBNx978-1-4503-1767-2 DOI http://dx.doi.org/10.1145/2484313.2484358 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. You Can't Watch This!: Privacy-Respectful Photo Browsing on Smartphones

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
      May 2016
      6108 pages
      ISBN:9781450333627
      DOI:10.1145/2858036

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 May 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • note

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader