Skip to main content

Content-Based Privacy for Consumer-Produced Multimedia

  • Chapter
  • First Online:
Multimedia Data Mining and Analytics

Abstract

We contend that current and future advances in Internet scale Multimedia analytics , global Inference , and linking can circumvent traditional Security and Privacy barriers. We therefore are in dire need of a new research field to address this issue and come up with new solutions. We present the privacy risks, Attack vectors , details for a preliminary experiment on Account linking , and describe mitigation and educational techniques that will help address the issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In many countries, this practice is possibly illegal but exists in a gray area and is seemingly routine practice. The Galleon insider trading trial [32] was based largely on the use of expert network consultants.

References

  1. Prosser D (1960) Privacy. In: California law review, vol 48, p 383

    Google Scholar 

  2. House TW (2012) Consumer data privacy in a networked world. http://www.whitehouse.gov/sites/default/files/privacy-final.pdf

  3. Webster M (2013) Privacy. http://www.merriam-webster.com/dictionary/privacy

  4. Wikipedia (2013) Secure communication.http://en.wikipedia.org/wiki/Secure_communication

  5. Sweeney L (1997) Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25:2–3

    Article  Google Scholar 

  6. Aggarwal C (2005) On k-anonymity and the curse of dimensionality. In: Proceedings of the international conference on very large data bases

    Google Scholar 

  7. Dinur I, Nissim K (2003) Revealing information while preserving privacy. In: ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems (PODS)

    Google Scholar 

  8. Dwork C (2006) Differential privacy. In: 33rd international colloquium on automata, languages, and programming (ICALP)

    Google Scholar 

  9. Dwork C (2008) Differential privacy: a survey of results. In: Agrawal M, Du D, Duan Z, Li A (eds) Theory and applications of models of computation., Lecture notes in computer scienceSpringer, Berlin, pp 1–19

    Chapter  Google Scholar 

  10. Sweeney L (2002) k-anonymity: a model for protecting privacy. J Uncertain Fuzziness Knowl-based Syst 10(5):557–570

    Article  MATH  MathSciNet  Google Scholar 

  11. Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: Proceedings of the IEEE symposium on security and privacy

    Google Scholar 

  12. Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the IEEE symposium on security and privacy

    Google Scholar 

  13. Chow R, Golle P, Staddon J (2008) Detecting privacy leaks using corpus-based association rules. In: Proceeding of the 14th ACM SIGKDD international conference on knowledge discovery and data mining

    Google Scholar 

  14. Staddon J, Golle P, Zimny B (2007) Web-based inference detection. In: Proceedings of 16th USENIX security symposium

    Google Scholar 

  15. Griffith V, Jakobsson M (2005) Messin’ with texas deriving mother’s maiden names using public records. In: Proceedings of the international conference on applied cryptography and network security (ACNS)

    Google Scholar 

  16. Balduzzi M, Platzer C, Holz T, Kirda E, Balzarotti D, Kruegel C (2010) Abusing social networks for automated user profiling. In: 13th international symposium on recent advances in intrusion detection, 09 RAID’2010

    Google Scholar 

  17. Bishop M, Cummins J, Peisert S, Singh A, Bhumiratana B, Agarwal D, Frincke D, Hogarth M (2010) Relationships and data sanitization: a study in scarlet. In: Proceedings of the workshop on new security paradigms

    Google Scholar 

  18. Blumberg A, Eckersley P, On locational privacy, and how to avoid losing it forever. Electronic frontier foundation

    Google Scholar 

  19. Hoh B, Gruteser M, Herring R, Ban J, Work D, Herrera J-C, Bayen AM, Annavaram M, Jacobson Q (2008) Virtual trip lines for distributed privacy-preserving traffic monitoring. In: Proceeding of the 6th international conference on mobile systems, applications, and services MobiSys’08

    Google Scholar 

  20. Popa RA, Balakrishnan H, Blumberg A (2009) VPriv: protecting privacy in location-based vehicular services. In: Proceedings of the USENIX security symposium

    Google Scholar 

  21. Zhong G, Goldberg I, Hengartner U (2007) Louis, lester and pierre: three protocols for location privacy. In: Proceedings of the privacy enhancing technologies symposium

    Google Scholar 

  22. H-Security Cree.py application knows where you’ve been. http://www.h-online.com/security/news/item/Cree-py-application-knows-where-you-ve-been-1217981.html

  23. Friedland G, Sommer R (2010) Cybercasing the joint: on the privacy implications of geo-tagging. In: Proceedings of the USENIX workshop on hot topics in security, August 2010

    Google Scholar 

  24. Friedland G, Choi J (2011) Semantic computing and privacy: a case study using inferred geo-location. Int J Semant Comput 5(01):79–93

    Article  Google Scholar 

  25. Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214

    Article  Google Scholar 

  26. Dufaux F, Ebrahimi T (2006) Scrambling for video surveillance with privacy. In: computer vision and pattern recognition workshop. CVPRW’06. In: Proceeding of the conference on, pp 160–160

    Google Scholar 

  27. Fan J, Luo H, Hacid M-S, Bertino E (2005) A novel approach for privacy-preserving video sharing. In: Proceedings of the 14th ACM international conference on information and knowledge management, CIKM’05. ACM, New York, pp 609–616

    Google Scholar 

  28. Koshimizu T, Toriyama T, Babaguchi N (2006) Factors on the sense of privacy in video surveillance. In: Proceedings of the 3rd ACM workshop on continuous archival and retrival of personal experiences, CARPE’06. ACM, New York, pp 35–44

    Google Scholar 

  29. Neustaedter C, Greenberg S, Boyle M (2006) Blur filtration fails to preserve privacy for home-based video conferencing. ACM Trans Comput-Hum Interact 13(1):1–36

    Article  Google Scholar 

  30. Dufaux F, Ebrahimi T (2010) A framework for the validation of privacy protection solutions in video surveillance. In: IEEE international conference on multimedia and expo (ICME), pp 66–71

    Google Scholar 

  31. Friedland G, Maier G, Sommer R, Weaver N (2011) Sherlock Holmes evil twin: on the impact of global inference for online privacy. In: Proceedings of the new security paradigms workshop (NSPW), September 2011

    Google Scholar 

  32. Cohan P (2009) Why executives risk their job to tip a hedge fund. http://meet-the-street.blogspot.com/2009/10/expert-networks-what-every-iro-needs-to.html,

  33. Amazon.com Mechanical Turk, https://www.mturk.com/mturk/welcome

  34. Mediaeval web site. http://www.multimediaeval.org

  35. Burget L, Oldřich P, Sandro C, Glembek O, Matějka P, Brümmer N (2011) Discriminantly trained probabilistic linear discriminant analysis for speaker verification. In: Proceedings of ICASSP, Brno, Czech Republic

    Google Scholar 

  36. Mathias L, Chatzichristofis SA (2008) Lire: Lucene image retrieval—an extensible Java CBIR library. In: Proceedings of the 16th ACM international conference on multimedia, pp 1085–1088, October 2008

    Google Scholar 

  37. Hatch AO (2006) Generalized linear kernels for one-versus-all classification: application to speaker recognition. In: Proceedings of ICASSP, Toulouse, France

    Google Scholar 

  38. Ioffe S (2006) Probabilistic linear discriminant analysis. In: Proceedings of ECCV, pp 531–542

    Google Scholar 

  39. Joint factor analysis matlab demo. http://speech.fit.vutbr.cz/software/joint-factor-analysis-matlab-demo/

  40. Bonastre J, Wils F, Meignier S (2005) Alize, a free toolkit for speaker recognition. In: Proceedings of the ICASSP, vol 1, pp 737–740

    Google Scholar 

  41. Hmm toolkit (htk). http://htk.eng.cam.ac.uk/

  42. Facebook users by age.http://en.wikipedia.org/wiki/Facebook#Reception

  43. Tools for teaching privacy to k12 and undergraduate students.http://teachingprivacy.icsi.berkeley.edu

Download references

Acknowledgments

This material is based upon work supported by the National Science Foundation under Grant No. CNS-1065240. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. We thank Michael Ellsworth for his rewording suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gerald Friedland .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Friedland, G., Janin, A., Lei, H., Choi, J., Sommer, R. (2015). Content-Based Privacy for Consumer-Produced Multimedia. In: Baughman, A., Gao, J., Pan, JY., Petrushin, V. (eds) Multimedia Data Mining and Analytics. Springer, Cham. https://doi.org/10.1007/978-3-319-14998-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14998-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14997-4

  • Online ISBN: 978-3-319-14998-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics