[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3672539.3686778acmconferencesArticle/Chapter ViewAbstractPublication PagesuistConference Proceedingsconference-collections
demonstration

Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-Users

Published: 13 October 2024 Publication History

Abstract

Image-related privacy preservation techniques often demand significant technical expertise, creating a barrier for end-users. We present a privacy-focused intelligent image manipulation tool that leverages recent advancements in generative AI to lower this barrier. Our functional prototype allows users to express their privacy concerns, identify potential privacy risks in images, and recommends relevant AI-powered obfuscation techniques to mitigate these risks and concerns. We demonstrate the tool’s versatility across multiple different domains, showcasing its potential to empower users in managing their privacy across various contexts. This demonstration presents the concept, user workflow, and implementation details of our prototype, highlighting its potential to bridge the gap between privacy research and practical, user-facing tools for privacy-preserving image sharing.

References

[1]
Shane Ahern, Dean Eckles, Nathaniel S Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI conference on Human factors in computing systems. 357–366.
[2]
Chen,Christine and Malone, Ben and Mernitz, Kendrick and Page, Christopher and Kapadia,Apu and Buduru, Arun Balaji. 2024. Exploring ChatGPT’s ability to detect privacy violations in photo sharing. In GenAICHI: CHI 2024 Workshop on Generative AI and HCI, Vol. 3. Association for Computing Machinery (ACM), 1–24.
[3]
Rakibul Hasan, David Crandall, Mario Fritz, and Apu Kapadia. 2020. Automatically detecting bystanders in photos to reduce privacy risks. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 318–335.
[4]
Rakibul Hasan, Eman Hassan, Yifang Li, Kelly Caine, David J Crandall, Roberto Hoyle, and Apu Kapadia. 2018. Viewer experience of obscuring scene elements in photos to enhance privacy. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–13.
[5]
Rakibul Hasan, Yifang Li, Eman Hassan, Kelly Caine, David J Crandall, Roberto Hoyle, and Apu Kapadia. 2019. Can privacy be satisfying? On improving viewer satisfaction for privacy-enhanced photos using aesthetic transforms. In Proceedings of the 2019 CHI conference on human factors in computing systems. 1–13.
[6]
Rakibul Hasan, Patrick Shaffer, David Crandall, Eman T Apu Kapadia, 2017. Cartooning for enhanced privacy in lifelogging and streaming videos. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops. 29–38.
[7]
Mohamed Khamis, Habiba Farzand, Marija Mumm, and Karola Marky. 2022. DeepFakes for privacy: Investigating the effectiveness of state-of-the-art privacy-enhancing face obfuscation methods. In Proceedings of the 2022 International Conference on Advanced Visual Interfaces. 1–5.
[8]
Alexander Kirillov, Eric Mintun, Nikhila Ravi, Hanzi Mao, Chloe Rolland, Laura Gustafson, Tete Xiao, Spencer Whitehead, Alexander C. Berg, Wan-Yen Lo, Piotr Dollár, and Ross Girshick. 2023. Segment Anything. arXiv:2304.02643 (2023).
[9]
Karen Lander, Vicki Bruce, and Harry Hill. 2001. Evaluating the effectiveness of pixelation and blurring on masking the identity of familiar faces. Applied Cognitive Psychology: The Official Journal of the Society for Applied Research in Memory and Cognition 15, 1 (2001), 101–116.
[10]
Yifang Li and Kelly Caine. 2022. Obfuscation remedies harms arising from content flagging of photos. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. 1–25.
[11]
Yifang Li, Nishant Vishwamitra, Hongxin Hu, and Kelly Caine. 2020. Towards a taxonomy of content sensitivity and sharing preferences for photos. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14.
[12]
Yifang Li, Nishant Vishwamitra, Bart P Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Effectiveness and users’ experience of obfuscation as a privacy-enhancing technology for sharing photos. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 1–24.
[13]
Ethan Mendes, Yang Chen, James Hays, Sauvik Das, Wei Xu, and Alan Ritter. 2024. Granular Privacy Control for Geolocation with Vision Language Models. arXiv preprint arXiv:2407.04952 (2024).
[14]
Open-source. [n. d.]. Krita: Free and open-source digital painting application. https://krita.org/en/. Accessed: 2024-07-17.
[15]
Jason Wei, Xuezhi Wang, Dale Schuurmans, Maarten Bosma, Fei Xia, Ed Chi, Quoc V Le, Denny Zhou, 2022. Chain-of-thought prompting elicits reasoning in large language models. Advances in neural information processing systems 35 (2022), 24824–24837.
[16]
Bin Xiao, Haiping Wu, Weijian Xu, Xiyang Dai, Houdong Hu, Yumao Lu, Michael Zeng, Ce Liu, and Lu Yuan. 2023. Florence-2: Advancing a Unified Representation for a Variety of Vision Tasks. arxiv:2311.06242 [cs.CV] https://arxiv.org/abs/2311.06242
[17]
Anran Xu, Shitao Fang, Huan Yang, Simo Hosio, and Koji Yatani. 2024. Examining Human Perception of Generative Content Replacement in Image Privacy Protection. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1–16.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
UIST Adjunct '24: Adjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology
October 2024
394 pages
ISBN:9798400707186
DOI:10.1145/3672539
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 October 2024

Check for updates

Author Tags

  1. generative artificial intelligence
  2. image privacy
  3. usable security

Qualifiers

  • Demonstration
  • Research
  • Refereed limited

Funding Sources

Conference

UIST '24

Acceptance Rates

Overall Acceptance Rate 355 of 1,733 submissions, 20%

Upcoming Conference

UIST '25
The 38th Annual ACM Symposium on User Interface Software and Technology
September 28 - October 1, 2025
Busan , Republic of Korea

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 97
    Total Downloads
  • Downloads (Last 12 months)97
  • Downloads (Last 6 weeks)46
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media