Demo: Protecting visual secrets with privateeye

Animesh Srivastava, Landon P. Cox
{"title":"Demo: Protecting visual secrets with privateeye","authors":"Animesh Srivastava, Landon P. Cox","doi":"10.1145/2594368.2601467","DOIUrl":null,"url":null,"abstract":"Consider the following scenario from the not-too-distant future: the CEO of a company is presenting his vision for the next quarter to a small group of co-workers. The CEO trusts everyone in the room, but many in attendance have smartphones and camera-equipped wearable computing devices running third-party apps. The CEO is worried that this third-party software could leak the highly confidential information in his slides and on the whiteboard. This raises the question: how can the CEO prevent apps with camera access from leaking company secrets? First, the CEO must have a way of identifying or marking visual secrets. Markings should be: (1) easy to create by hand and with digital tools, and (2) easy and efficient to recognize by software. Marking visual secrets by placing QR-codes or badges near them makes real-time recognition difficult due to scaling problems (particularly at far distances). Moreover, precisely encoding a two-dimensional region surrounding a visual secret in a QR-code or badge would be too awkward and slow for users. Finally, general-purpose object recognition is too slow and consumes too much energy. In this demo, we present PrivateEye, a system that prevents visual secrets from inadvertently leaking. PrivateEye consists of two pieces: (1) a specification for marking a two-dimensional space as secret, and (2) software on a recording device for recognizing markings and obscuring visual secrets in real-time. Figure 1(a) and 2(a) show examples of how PrivateEye users can define a region containing visual secrets by combining solid and dotted lines. Depending on the medium, users can define secret regions by hand (e.g., on a whiteboard) or use digital tools (e.g., within a presentation). PrivateEye is based on the principle that preventing leaks requires visual information to be withheld from third-party apps until the system can be confident that it is safe to reveal. As a result, PrivateEye works in three phases. Phase 1 requires the camera view to stabilize. During this phase, PrivateEye completely blurs the camera view so that apps cannot infer secret information from an image capture. Once the camera view stabilizes, PrivateEye enters Phase 2, in which the system detects all the rectangles in the camera view. At this point, all the detected rectangles appear blocked to the user (Figure 1(b) and 2(b)). PrivateEye then moves on to Phase 3. In this phase, the system searches each blocked rectangle for secret markings (i.e., dotted rectangles). PrivateEye can safely reveal the content of rectangles without secret markings to an app; however, the system must continue to block any rectangles containing secret markings. If PrivateEye detects that the camera view has changed, then it must return to Phase 1. During the demo, PrivateEye will be running on Google Nexus 4 and Google Glass. We plan to invite the audience to use one of these devices and view some of the objects already marked secret. We will also let them draw the markers around some text on a whiteboard. This will help the audience to understand the usability and effectiveness of PrivateEye.","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2594368.2601467","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Consider the following scenario from the not-too-distant future: the CEO of a company is presenting his vision for the next quarter to a small group of co-workers. The CEO trusts everyone in the room, but many in attendance have smartphones and camera-equipped wearable computing devices running third-party apps. The CEO is worried that this third-party software could leak the highly confidential information in his slides and on the whiteboard. This raises the question: how can the CEO prevent apps with camera access from leaking company secrets? First, the CEO must have a way of identifying or marking visual secrets. Markings should be: (1) easy to create by hand and with digital tools, and (2) easy and efficient to recognize by software. Marking visual secrets by placing QR-codes or badges near them makes real-time recognition difficult due to scaling problems (particularly at far distances). Moreover, precisely encoding a two-dimensional region surrounding a visual secret in a QR-code or badge would be too awkward and slow for users. Finally, general-purpose object recognition is too slow and consumes too much energy. In this demo, we present PrivateEye, a system that prevents visual secrets from inadvertently leaking. PrivateEye consists of two pieces: (1) a specification for marking a two-dimensional space as secret, and (2) software on a recording device for recognizing markings and obscuring visual secrets in real-time. Figure 1(a) and 2(a) show examples of how PrivateEye users can define a region containing visual secrets by combining solid and dotted lines. Depending on the medium, users can define secret regions by hand (e.g., on a whiteboard) or use digital tools (e.g., within a presentation). PrivateEye is based on the principle that preventing leaks requires visual information to be withheld from third-party apps until the system can be confident that it is safe to reveal. As a result, PrivateEye works in three phases. Phase 1 requires the camera view to stabilize. During this phase, PrivateEye completely blurs the camera view so that apps cannot infer secret information from an image capture. Once the camera view stabilizes, PrivateEye enters Phase 2, in which the system detects all the rectangles in the camera view. At this point, all the detected rectangles appear blocked to the user (Figure 1(b) and 2(b)). PrivateEye then moves on to Phase 3. In this phase, the system searches each blocked rectangle for secret markings (i.e., dotted rectangles). PrivateEye can safely reveal the content of rectangles without secret markings to an app; however, the system must continue to block any rectangles containing secret markings. If PrivateEye detects that the camera view has changed, then it must return to Phase 1. During the demo, PrivateEye will be running on Google Nexus 4 and Google Glass. We plan to invite the audience to use one of these devices and view some of the objects already marked secret. We will also let them draw the markers around some text on a whiteboard. This will help the audience to understand the usability and effectiveness of PrivateEye.
演示:用私眼保护视觉秘密
考虑一下在不久的将来的场景:一家公司的首席执行官正在向一小群同事介绍他对下一个季度的愿景。这位首席执行官信任在场的每一个人,但许多与会者都有智能手机和配备摄像头的可穿戴计算设备,运行第三方应用程序。首席执行官担心这个第三方软件会泄露他的幻灯片和白板上的高度机密信息。这就提出了一个问题:这位首席执行官该如何防止带有摄像头访问权限的应用泄露公司机密?首先,首席执行官必须有一种识别或标记视觉秘密的方法。标记应该:(1)易于手工和使用数字工具创建,(2)易于通过软件识别。通过放置qr码或徽章来标记视觉秘密,由于缩放问题(特别是在远距离),使得实时识别变得困难。此外,在qr码或徽章中精确编码视觉秘密周围的二维区域对用户来说过于笨拙和缓慢。最后,通用目标识别速度太慢,能耗大。在这个演示中,我们展示了PrivateEye,一个防止视觉秘密无意中泄露的系统。PrivateEye由两部分组成:(1)将二维空间标记为秘密的规范;(2)记录设备上用于实时识别标记和掩盖视觉秘密的软件。图1(a)和2(a)展示了PrivateEye用户如何通过组合实线和虚线来定义包含视觉秘密的区域的示例。根据媒介的不同,用户可以手工定义秘密区域(例如,在白板上)或使用数字工具(例如,在演示文稿中)。PrivateEye基于防止泄露的原则,要求对第三方应用程序保留视觉信息,直到系统能够确信它是安全的。因此,PrivateEye的工作分为三个阶段。第一阶段需要相机视角稳定。在这个阶段,PrivateEye完全模糊了相机视图,这样应用程序就不能从图像捕获中推断出秘密信息。一旦摄像头视图稳定下来,PrivateEye进入第二阶段,系统会检测摄像头视图中的所有矩形。此时,所有检测到的矩形对用户来说都是阻塞的(图1(b)和2(b))。然后PrivateEye进入第三阶段。在这个阶段,系统搜索每个被封锁的矩形以寻找秘密标记(即,虚线矩形)。PrivateEye可以安全地向应用程序显示没有秘密标记的矩形的内容;然而,系统必须继续阻止任何包含秘密标记的矩形。如果PrivateEye检测到摄像机视图已经改变,那么它必须返回到阶段1。在演示期间,PrivateEye将在谷歌Nexus 4和谷歌Glass上运行。我们计划邀请观众使用其中一个设备,观看一些已经标记为“秘密”的物体。我们也会让他们在白板上的一些文本周围画上标记。这将有助于观众了解PrivateEye的可用性和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信