Education, Science, Technology, Innovation and Life
Open Access
Sign In

Privacy Preserving Smartphone Camera Tracking Using Support Vector Machines

Download as PDF

DOI: 10.23977/jipta.2021.41001 | Downloads: 18 | Views: 783

Author(s)

Q. Memon 1, K. Al Shanqiti 1, A. Al Falasi 1, A. Al Jaberi 1, Y. Amer 1

Affiliation(s)

1 UAE University

Corresponding Author

Q. Memon

ABSTRACT

Due to easy access to recent hand-held technologies, privacy concern has also increased. One most common and prevalent form of privacy and intellectual property breach nowadays is use of smartphone camera. This work reflects an attempt for privacy protection in smartphone environment. The potential contribution from this study is to disable smartphone camera temporarily by tracking it. The key parts of the approach are camera lens detection and tracking in upper body area, and then disabling it. The detection stage involves camera calibration followed by image processing steps conducted on captured environment frame for camera lens detection using either by database search or support vector machines applied on published data of smartphone camera lenses. The disabling process is enabled using safe-to-environment laser(s) controlled by a hardware interface. For tests, an experimental system is built, and results show improvement in tracking using support vector machines with performance error less than 0.5%.

KEYWORDS

Camera detection; Camera tracking; Camera blocking; Privacy, Security; Machine Learning

CITE THIS PAPER

Q. Memon, K. Al Shanqiti, A. Al Falasi, A. Al Jaberi, Y. Amer, Privacy Preserving Smartphone Camera Tracking Using Support Vector Machines. Journal of Image Processing Theory and Applications (2021) Vol. 4: 1-12. DOI: http://dx.doi.org/10.23977/jipta.2021.41001

REFERENCES

[1] M. Schulz, F. Gringoli, D. Steinmetzer, M. Koch, and M. Hollick, “Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control,” ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 111-121, doi: 10.1145/3098243.3098253
[2] Q. Memon, “A New Approach to Video Security over Networks,” International Journal of Computer Applications in Technology, 25 (1), 72-83, 2006.
[3] Memon, Q., Khoja, S., “RFID–based Patient Tracking for Regional Collaborative Healthcare,” International Journal of Computer Applications in Technology, 45 (4), pp. 231-244, 2012
[4] Y. Akbulut, A. Şengür, Ü. Budak and S. Ekici, "Deep learning-based face liveness detection in videos," International Artificial Intelligence and Data Processing Symposium, Malatya, 2017, pp. 1-4, doi: 10.1109/IDAP.2017.8090202.
[5] T. Chavdarova and F. Fleuret, "Deep Multi-camera People Detection," IEEE International Conference on Machine Learning and Applications, Cancun, 2017, pp. 848-853, doi: 10.1109/ICMLA.2017.00-50
[6] V. U. Sameer, A. Sarkar and R. Naskar, "Source camera identification model: Classifier learning, role of learning curves and their interpretation," International Conference on Wireless Communications, Signal Processing and Networking, Chennai, 2017, pp. 2660-2666.
[7] D. Lee, W. Gyu La and H. Kim, "Drone Detection and Identification System using Artificial Intelligence, "International Conference on Information and Communication Technology Convergence,” Jeju, 2018, pp. 1131-1133., doi: 10.1109/ICTC.2018.8539442
[8] The Pirate Eye Anti-Piracy Solution. (n.d.). Retrieved from http://www.pirateeye.com/pirateeye/ 
[9] Kate Greene, (June 22, 2006). MIT Technology review, a prototype device seeks out cameras and blocks them from taking pictures and video. Retriever From https://www.technologyreview.com/s/405968/lights-camera-jamming/ 
[10] D. Li, D. Guo, W. Han, H. Chen, C. Cao and X. S. Wang, "Camera-Recognizable and Human-Invisible Labelling for Privacy Protection," International Conference on Mobile Ad-Hoc and Sensor Networks, Hefei, 2016, pp. 365-369., doi: 10.1109/MSN.2016.066
[11] J. Hsu, “LiShield Can Block Smartphone Cameras for Privacy's Sake,” IEEE Spectrum, Oct. 2017.
[12] T. Wheatley, “Laser pointer prohibition: improving safety or driving misclassification,” International Laser Safety Conference, 2013, pp. 48-54
[13] Viola, P., Jones, N., “Robust Real Time Object Detection,” International Journal of Computer Vision, pp. 137-154, 2004.
[14] Hough, P.V.C. Method and means for recognizing complex patterns, U.S. Patent 3,069,654, 1962
[15] Q Memon, “On assisted living of paralyzed persons through real-time eye features tracking and classification using Support Vector Machines,” Medical Technologies Journal, 3 (1), 316-333, 2019.
[16] R. Kumar, M. Geetha, “Deep Learning Model: Emotion Recognition from Continuous Action Video,” In Data Science: Theory, Analysis, and Applications, 305-322, 2019
[17] S Pal, S Shaw, T Saurabh, Y Kumar, S Chakraborty, “A Study and Analysis of an Emotion Classification and State Transition System in Brain Computer Interfacing,” In Data Science: Theory, Analysis, and Applications, 225-248, 2019
[18] Al-Kassim, Z., Memon, Q., “Investigating camera calibration for eye tracking of the physically challenged,” ICFST 2016, MATEC Web of Conferences, DOI: 10.1051/matecconf/2016590800.
[19] Cortes, C.; Vapnik, V., "Support-vector networks", Machine Learning, 1995, 20 (3): pp. 273–297. doi:10.1007/BF00994018. 

Downloads: 603
Visits: 38153

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.