Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3560571acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks

Published: 07 November 2022 Publication History

Abstract

Photo capturing and sharing have become routine daily activities for social platform users. Alongside the entertainment of social interaction, we are experiencing tremendous visual violation and photo abusing. Especially, users may be unconsciously filmed and exposed online, which is termed as the non-consensual sharing issue. Unfortunately, this problem cannot be well handled with proactive access control or dedicated bystander detection, as users are unaware of their situations and may be filmed stealthily. We propose Videre on behalf of the privacy of the unaware parties in a way that they would be automatically identified and warned before such photos go public. For this, we first elaborate on the predominant features encountered in non-consensual captured photos via a thorough user study. Then we establish a dataset for this context and build a classifier as a proactive detector based on multi-deep-feature fusion. To relieve the burden of person-wise unawareness detection, we further design a signature-based filter for local pre-authorization, which can also implicitly avoid classification errors. We implement and test Videre in various field settings to demonstrate its effectiveness and performance.

Supplementary Material

MP4 File (CCS22-fp104.mp4)
Presentation video - short version

References

[1]
Janko Rottgers. Snapchat loses 3 million daily users, but beats expectations in q2 earnings. https://variety.com/2018/digital/news/snap-posts-q2-revenue-beatbut- daily-users-down-for-first-time, 2018.
[2]
99Content. Whatsapp statistics. https://99firms.com/blog/whatsapp-statistics/ #gref, 2019.
[3]
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. "You don't want to be the next meme": College students' workarounds to manage privacy in the era of pervasive photography. In Proc. of Symposium on Usable Privacy and Security (SOUPS), pages 143--157, Baltimore,MD,USA, 2018. USENIX Association.
[4]
Rakibul Hasan, David Crandall, Mario Fritz, and Apu Kapadia. Automatically detecting bystanders in photos to reduce privacy risks. In Proc. of the IEEE Symposium on Security and Privacy (S&P), pages 318--335, San Francisco,CA,USA, 2020. IEEE.
[5]
Majid Yar and Jacqueline Drew. Image-based abuse, non-consensual pornography, revenge porn: A study of criminalization and crime prevention in australia and england & wales. International Journal of Cyber Criminology, 13(2):578--594, 2019.
[6]
Christena E Nippert-Eng. Islands of privacy. In Islands of Privacy. University of Chicago Press, 2010.
[7]
Kate Brimsted. The jk rowling photo case--are privacy rights evolving for the online era" Computer Law & Security Review, 24(5):465--468, 2008.
[8]
The High Court of Justice Queens Bench Division. Judgment files. http://www.courtservice.gov.uk/judgmentsfiles/j1096/Naomi_Campbell_v_Mirror.htm, 2002.
[9]
Lan Zhang, Kebin Liu, Xiang-Yang Li, Cihang Liu, Xuan Ding, and Yunhao Liu. Privacy-friendly photo capturing and sharing system. In Proc. of the International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), pages 524--534, New York,NY,USA, 2016. ACM.
[10]
Paarijaat Aditya, Rijurekha Sen, Peter Druschel, Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele, Bobby Bhattacharjee, and Tong Tong Wu. I-pic: A platform for privacy-compliant image capture. In Proc. of the Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 235--248, Singapore,Singapore, 2016. ACM.
[11]
Moo-Ryong Ra, Seungjoon Lee, Emiliano Miluzzo, and Eric Zavesky. Do not capture: Automated obscurity for pervasive imaging. IEEE Internet Computing, 21(3):82--87, 2017.
[12]
Ang Li, Qinghua Li, and Wei Gao. Privacycamera: Cooperative privacy-aware photographing with mobile phones. In Proc. of the IEEE International Conference on Sensing, Communication, and Networking (SECON), pages 1--9, London,UK, 2016. IEEE.
[13]
Fenghua Li, Zhe Sun, Ang Li, Ben Niu, Hui Li, and Guohong Cao. Hideme: Privacypreserving photo sharing on social networks. In Proc. of the International Conference on Computer Communications (INFOCOM), pages 154--162, Paris, France, 2019. IEEE.
[14]
Benjamin Henne, Christian Szongott, and Matthew Smith. Snapme if you can: Privacy threats of other peoples' geo-tagged media and what we can do about it. In Proc. of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC), pages 95--106, Budapest,Hungary, 2013. ACM.
[15]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. Face/off: Preventing privacy leakage from photos in social networks. In Proc. of the ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 781--792, Denver Colorado,USA, 2015. ACM.
[16]
Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, and Gail-Joon Ahn. Towards pii-based multiparty access control for photo sharing in online social networks. In Proc. of the ACM on Symposium on Access Control Models and Technologies, pages 155--166, New York,NY,USA, 2017. ACM.
[17]
Cheng Bo, Guobin Shen, Jie Liu, Xiang-Yang Li, YongGuang Zhang, and Feng Zhao. Privacy. tag: Privacy concern expressed and respected. In Proc. of the ACM Conference on Embedded Network Sensor Systems, pages 163--176, Memphis, TN,USA, 2014. ACM.
[18]
Frank Pallas, Max-Robert Ulbricht, Lorena Jaume-Palasí, and Ulrike Höppner. Offlinetags: A novel privacy approach to online photo sharing. In Proc. of the Extended Abstracts on Human Factors in Computing Systems (CHI), pages 2179-- 2184, Toronto Ontario,Canada, 2014. ACM.
[19]
Yong Ding, Bingyao Wang, Yujue Wang, Kun Zhang, and Huiyong Wang. Secure metering data aggregation with batch verification in industrial smart grid. IEEE Transactions on Industrial Informatics, 16(10):6607--6616, 2020.
[20]
Attila Altay Yavuz, Anand Mudgerikar, Ankush Singla, Ioannis Papapanagiotou, and Elisa Bertino. Real-time digital signatures for time-critical networks. IEEE Transactions on Information Forensics and Security, 12(11):2627--2639, 2017.
[21]
Wenjie Yang, ShangpengWang, and Yi Mu. An enhanced certificateless aggregate signature without pairings for e-healthcare system. IEEE Internet of Things Journal, 8(6):5000--5008, 2020.
[22]
Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proc. of International Conference on The Theory and Applications of Cryptographic Techniques, pages 523--540, Interlaken,Switzerland, 2004. Springer.
[23]
Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, and Adam Smith. Reusable fuzzy extractors for low-entropy distributions. In Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 117--146, Vienna,Austria, 2016. Springer.
[24]
Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C Lawrence Zitnick. Microsoft coco: Common objects in context. In Proc. of European Conference on Computer Vision (ECCV), pages 740--755, Zurich,Switzerland, 2014. Springer.
[25]
Iryna Korshunova, Wenzhe Shi, Joni Dambre, and Lucas Theis. Fast face-swap using convolutional neural networks. In Proc. of the IEEE International Conference on Computer Vision (ICCV), pages 3677--3685, Honolulu,HI,USA, 2017. IEEE.
[26]
Petr Kellnhofer, Adria Recasens, Simon Stent, Wojciech Matusik, and Antonio Torralba. Gaze360: Physically unconstrained gaze estimation in the wild. In Proc. of the IEEE/CVF International Conference on Computer Vision (ICCV), pages 6912--6921, Long Beach,CA,USA, 2019. IEEE.
[27]
Alex Graves, Santiago Fernández, and Jürgen Schmidhuber. Bidirectional lstm networks for improved phoneme classification and recognition. In Proc. of the International Conference on Artificial Neural Networks, pages 799--804, Warsaw, Poland, 2005. Springer.
[28]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 770--778, Las Vegas,NV,USA, 2016. IEEE.
[29]
Vitor Albiero, Xingyu Chen, Xi Yin, Guan Pang, and Tal Hassner. img2pose: Face alignment and detection via 6dof, face pose estimation. In Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 7617--7627, Nashville,TN,USA, 2021. IEEE.
[30]
Tsung-Yi Lin, Piotr Dollár, Ross Girshick, Kaiming He, Bharath Hariharan, and Serge Belongie. Feature pyramid networks for object detection. In Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 2117--2125, Honolulu,HI,USA, 2017. IEEE.
[31]
Kemi Ding and Junshan Zhang. Multi-party privacy conflict management in online social networks: a network game perspective. IEEE/ACM Transactions on Networking, 28(6):2685--2698, 2020.
[32]
Peter Young, Alice Lai, Micah Hodosh, and Julia Hockenmaier. From image descriptions to visual denotations: New similarity metrics for semantic inference over event descriptions. Transactions of the Association for Computational Linguistics, 2:67--78, 2014.
[33]
Shan Li, Weihong Deng, and JunPing Du. Reliable crowdsourcing and deep locality-preserving learning for expression recognition in the wild. In Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 2852--2861, Honolulu,HI,USA, 2017. IEEE.
[34]
Cao Zhe, Simon Tomas, Wei Shih-En, and Sheikh Yaser. Realtime multi-person 2d pose estimation using part affinity fields. In Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 7291--7299, Salt Lake City,USA, 2018. IEEE.
[35]
Paul Viola and Michael J Jones. Robust real-time face detection. International Journal of Computer Vision, 57(2):137--154, 2004.
[36]
Angelo De Caro and Vincenzo Iovino. jpbc: Java pairing based cryptography. In Proc. of the IEEE Symposium on Computers and Communications (ISCC), pages 850--855, Kerkyra,Greece, 2011. IEEE.
[37]
Anunay Kulshrestha and Jonathan Mayer. Identifying harmful media in endto- end encrypted communication: Efficient private membership computation. In Proc. of the USENIX Security Symposium (USENIX Security), pages 893--910, Virtual, 2021. USENIX Association.
[38]
Facebook. The tmkpdqf video-hashing algorithm and the pdq image-hashing algorithm. https://github.com/facebook/ThreatExchange/blob/master/hashing/hashing.pdf, 2019.

Cited By

View all
  • (2024)Designing the informing process with streamers and bystanders in live streamingProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696916(315-332)Online publication date: 12-Aug-2024
  • (2024)In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera GlassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642242(1-18)Online publication date: 11-May-2024
  • (2023)"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security ConferencesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623130(3433-3459)Online publication date: 15-Nov-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
November 2022
3598 pages
ISBN:9781450394505
DOI:10.1145/3548606
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. image privacy protection
  2. photo sharing
  3. social networks

Qualifiers

  • Research-article

Funding Sources

  • National Key Research and Development Program of China
  • Natural Science Foundation of Hunan Province
  • Science and Technology Innovation Program of Hunan Province
  • NSFC

Conference

CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)127
  • Downloads (Last 6 weeks)10
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Designing the informing process with streamers and bystanders in live streamingProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696916(315-332)Online publication date: 12-Aug-2024
  • (2024)In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera GlassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642242(1-18)Online publication date: 11-May-2024
  • (2023)"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security ConferencesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623130(3433-3459)Online publication date: 15-Nov-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media