Privacy Preserving Smartphone Camera Tracking Using Support Vector Machines
DOI: 10.23977/jipta.2021.41001 | Downloads: 41 | Views: 2082
Author(s)
Q. Memon 1, K. Al Shanqiti 1, A. Al Falasi 1, A. Al Jaberi 1, Y. Amer 1
Affiliation(s)
1 UAE University
Corresponding Author
Q. MemonABSTRACT
Due to easy access to recent hand-held technologies, privacy concern has also increased. One most common and prevalent form of privacy and intellectual property breach nowadays is use of smartphone camera. This work reflects an attempt for privacy protection in smartphone environment. The potential contribution from this study is to disable smartphone camera temporarily by tracking it. The key parts of the approach are camera lens detection and tracking in upper body area, and then disabling it. The detection stage involves camera calibration followed by image processing steps conducted on captured environment frame for camera lens detection using either by database search or support vector machines applied on published data of smartphone camera lenses. The disabling process is enabled using safe-to-environment laser(s) controlled by a hardware interface. For tests, an experimental system is built, and results show improvement in tracking using support vector machines with performance error less than 0.5%.
KEYWORDS
Camera detection; Camera tracking; Camera blocking; Privacy, Security; Machine LearningCITE THIS PAPER
Q. Memon, K. Al Shanqiti, A. Al Falasi, A. Al Jaberi, Y. Amer, Privacy Preserving Smartphone Camera Tracking Using Support Vector Machines. Journal of Image Processing Theory and Applications (2021) Vol. 4: 1-12. DOI: http://dx.doi.org/10.23977/jipta.2021.41001
REFERENCES
[1] M. Schulz, F. Gringoli, D. Steinmetzer, M. Koch, and M. Hollick, “Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control,” ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 111-121, doi: 10.1145/3098243.3098253
[2] Q. Memon, “A New Approach to Video Security over Networks,” International Journal of Computer Applications in Technology, 25 (1), 72-83, 2006.
[3] Memon, Q., Khoja, S., “RFID–based Patient Tracking for Regional Collaborative Healthcare,” International Journal of Computer Applications in Technology, 45 (4), pp. 231-244, 2012
[4] Y. Akbulut, A. Şengür, Ü. Budak and S. Ekici, "Deep learning-based face liveness detection in videos," International Artificial Intelligence and Data Processing Symposium, Malatya, 2017, pp. 1-4, doi: 10.1109/IDAP.2017.8090202.
[5] T. Chavdarova and F. Fleuret, "Deep Multi-camera People Detection," IEEE International Conference on Machine Learning and Applications, Cancun, 2017, pp. 848-853, doi: 10.1109/ICMLA.2017.00-50
[6] V. U. Sameer, A. Sarkar and R. Naskar, "Source camera identification model: Classifier learning, role of learning curves and their interpretation," International Conference on Wireless Communications, Signal Processing and Networking, Chennai, 2017, pp. 2660-2666.
[7] D. Lee, W. Gyu La and H. Kim, "Drone Detection and Identification System using Artificial Intelligence, "International Conference on Information and Communication Technology Convergence,” Jeju, 2018, pp. 1131-1133., doi: 10.1109/ICTC.2018.8539442
[8] The Pirate Eye Anti-Piracy Solution. (n.d.). Retrieved from http://www.pirateeye.com/pirateeye/
[9] Kate Greene, (June 22, 2006). MIT Technology review, a prototype device seeks out cameras and blocks them from taking pictures and video. Retriever From https://www.technologyreview.com/s/405968/lights-camera-jamming/
[10] D. Li, D. Guo, W. Han, H. Chen, C. Cao and X. S. Wang, "Camera-Recognizable and Human-Invisible Labelling for Privacy Protection," International Conference on Mobile Ad-Hoc and Sensor Networks, Hefei, 2016, pp. 365-369., doi: 10.1109/MSN.2016.066
[11] J. Hsu, “LiShield Can Block Smartphone Cameras for Privacy's Sake,” IEEE Spectrum, Oct. 2017.
[12] T. Wheatley, “Laser pointer prohibition: improving safety or driving misclassification,” International Laser Safety Conference, 2013, pp. 48-54
[13] Viola, P., Jones, N., “Robust Real Time Object Detection,” International Journal of Computer Vision, pp. 137-154, 2004.
[14] Hough, P.V.C. Method and means for recognizing complex patterns, U.S. Patent 3,069,654, 1962
[15] Q Memon, “On assisted living of paralyzed persons through real-time eye features tracking and classification using Support Vector Machines,” Medical Technologies Journal, 3 (1), 316-333, 2019.
[16] R. Kumar, M. Geetha, “Deep Learning Model: Emotion Recognition from Continuous Action Video,” In Data Science: Theory, Analysis, and Applications, 305-322, 2019
[17] S Pal, S Shaw, T Saurabh, Y Kumar, S Chakraborty, “A Study and Analysis of an Emotion Classification and State Transition System in Brain Computer Interfacing,” In Data Science: Theory, Analysis, and Applications, 225-248, 2019
[18] Al-Kassim, Z., Memon, Q., “Investigating camera calibration for eye tracking of the physically challenged,” ICFST 2016, MATEC Web of Conferences, DOI: 10.1051/matecconf/2016590800.
[19] Cortes, C.; Vapnik, V., "Support-vector networks", Machine Learning, 1995, 20 (3): pp. 273–297. doi:10.1007/BF00994018.
Downloads: | 1630 |
---|---|
Visits: | 117113 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks