Skip to main content

Integrating Utility into Face De-identification

  • Conference paper
Privacy Enhancing Technologies (PET 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3856))

Included in the following conference series:

Abstract

With the proliferation of inexpensive video surveillance and face recognition technologies, it is increasingly possible to track and match people as they move through public spaces. To protect the privacy of subjects visible in video sequences, prior research suggests using ad hoc obfuscation methods, such as blurring or pixelation of the face. However, there has been little investigation into how obfuscation influences the usability of images, such as for classification tasks. In this paper, we demonstrate that at high obfuscation levels, ad hoc methods fail to preserve utility for various tasks, whereas at low obfuscation levels, they fail to prevent recognition. To overcome the implied tradeoff between privacy and utility, we introduce a new algorithm, k-Same-Select, which is a formal privacy protection schema based on k-anonymity that provably protects privacy and preserves data utility. We empirically validate our findings through evaluations on the FERET database, a large real world dataset of facial images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Belsie, L.: The eyes have it - for now. Christian Science Monitor (November 7, 2002)

    Google Scholar 

  2. Sweeney, L.: Surveillance of surveillance camera watch project (2004)

    Google Scholar 

  3. Bowyer, K.: Face recognition technology and the security vs. privacy tradeoff. IEEE Technology and Society, 9–20 (2004)

    Google Scholar 

  4. Crowley, J., Coutaz, J., Berard, F.: Things that see. Communications of the ACM 43, 54–64 (2000)

    Article  Google Scholar 

  5. Neustaedter, C., Greenberg, S.: Balancing privacy and awareness in home media spaces. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864. Springer, Heidelberg (2003)

    Google Scholar 

  6. Newton, E., Sweeney, L., Malin, B.: Preserving privacy by de-identifying facial images. IEEE Transactions on Knowledge and Data Engineering 17, 232–243 (2005)

    Article  Google Scholar 

  7. Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: ACM Conference on Computer Supported Cooperative Work, Philadelphia, PA, pp. 1–10 (2000)

    Google Scholar 

  8. Greenberg, S., Kuzuoka, H.: Using digital but physical surrogates to mediate awareness, communication, and privacy in media spaces. Personal Technologies 4 (2000)

    Google Scholar 

  9. Hudson, S., Smith, I.: Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In: ACM Conference on Computer Supported Cooperative Work, Boston, MA, pp. 1–10 (1996)

    Google Scholar 

  10. Neustaedter, C., Greenberg, S., Boyle, M.: Blur filtration fails to preserve privacy for home-based video conferencing. ACM Transactions on Computer Human Interactions (TOCHI) (in press, 2005)

    Google Scholar 

  11. Zhao, Q., Stasko, J.: Evaluating image filtering based techniques in media space applications. In: ACM Conference on Computer Supported Cooperative Work, Seattle, WA, pp. 11–18 (1998)

    Google Scholar 

  12. Senior, A., Pankati, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A.: Blinkering surveillance: enabling video surveillance privacy through computer vision. IBM Research Report RC22886 (W0308-109), T.J. Watson Research Center, Yorktown Heights (2003)

    Google Scholar 

  13. Alexander, J., Kenny, S.: Engineering privacy in public: Confounding face recognition. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 88–106. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-Based Systems 10, 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  15. Kanade, T.: Computer Recognition of Human Faces. Birkhauser, Basel (1977)

    Book  Google Scholar 

  16. Zhao, W., Chellappa, R., Phillips, P., Rosenfeld, A.: Face recognition: a literature survey. ACM Computing Surveys 35, 399–458 (2003)

    Article  Google Scholar 

  17. Gross, R., Shi, J., Cohn, J.: Quo vadis face recognition? In: Third Workshop on Empirical Evaluation Methods in Computer Vision (2001)

    Google Scholar 

  18. Blackburn, D., Bone, M., Philips, P.: Facial recognition vendor test 2000: evaluation report (2000)

    Google Scholar 

  19. Phillips, P.J., Grother, P., Ross, J.M., Blackburn, D., Tabassi, E., Bone, M.: Face recognition vendor test 2002: evaluation report (2003)

    Google Scholar 

  20. Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 711–720 (1997)

    Article  Google Scholar 

  21. Penev, P., Atick, J.: Local feature analysis: A general statistical theory for object representation (1996)

    Google Scholar 

  22. Gross, R., Yang, J., Waibel, A.: Face recognition in a meeting room. In: Proceedings of the Fourth IEEE International Conference on Automatic Face and Gesture Recognition, Grenoble, France (2000)

    Google Scholar 

  23. Phillips, P.J., Wechsler, H., Huang, J.S., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithms. Image and Vision Computing 16, 295–306 (1998)

    Article  Google Scholar 

  24. Sonka, M., Hlavac, V., Boyle, R.: Image processing, analysis, and machine vision. 2nd edn. Brooks/Cole (1999)

    Google Scholar 

  25. Cristianini, N., Shawe-Taylor, J.: An introduction to support vector machines. Cambridge University Press, Cambridge (2000)

    MATH  Google Scholar 

  26. Seeger, M.: Learning with labeled and unlabeled data. Technical report, University of Edinburgh (2002)

    Google Scholar 

  27. Blum, A., Mitchell, T.: Combining labeled and unlabeled data with co-training. In: COLT: Proceedings of the Workshop on Computational Learning Theory. Morgan Kaufmann Publishers, San Francisco (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gross, R., Airoldi, E., Malin, B., Sweeney, L. (2006). Integrating Utility into Face De-identification. In: Danezis, G., Martin, D. (eds) Privacy Enhancing Technologies. PET 2005. Lecture Notes in Computer Science, vol 3856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11767831_15

Download citation

  • DOI: https://doi.org/10.1007/11767831_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34745-3

  • Online ISBN: 978-3-540-34746-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics