Privacy in the Age of Augmented Reality

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

On-the-fly Specific Person Retrieval University of Oxford 24 th May 2012 Omkar M. Parkhi, Andrea Vedaldi and Andrew Zisserman.
Face Processing in Social Networking Services NTIA Privacy Multistakeholder Process: Commercial Facial Recognition Technology March 25, 2014 Olga Raskin.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Social Networks: Facebook “Facebook Grows Up” by Steven Levy “Information Revelation and Privacy in Online Social Networks (The Facebook Case)” by Ralph.
Social Networking.
Data Mining, Information Theory and Image Interpretation Sargur N. Srihari Center of Excellence for Document Analysis and Recognition and Department of.
Methods in Leading Face Verification Algorithms
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
By Kelvin Canela FACIAL RECOGNITION. Facebook Online social networking site. Launched on February 2004 and founded by Mark Zuckerberg, Eduardo Saverin,
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Ubiquitous Advertising: the Killer Application for the 21st Century Author: John Krumm Presenter: Anh P. Nguyen
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Data Mining Techniques
Definition  “Think of regular media as a one-way street where you can read a newspaper or listen to a report on television, but you have very limited.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Privacy issues By: Joshua Junious Date: December 4, 2012 Course: CpSc 420 Instructor: Dr. Grossman.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
80 million tiny images: a large dataset for non-parametric object and scene recognition CS 4763 Multimedia Systems Spring 2008.
Collective Vision: Using Extremely Large Photograph Collections Mark Lenz CameraNet Seminar University of Wisconsin – Madison February 2, 2010 Acknowledgments:
Communication in the Real World SOCIAL MEDIA’S AFFECT ON SOCIETY.
Wil Haywood Rossana Bua Rhishi Katoch Kelvyn Araujo-Valdez Steve Kim.
SOCIAL NETWORKING Nazia Hassan Usman Kamran Sophia Hasan Fahad Zafar 1.
Anonymity and Privacy Issues --- re-identification
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Avoiding (Un)Intentional Discrimination When Recruiting via Social Media Stephanie R. Thomas, Ph.D. Thomas Econometrics
1 Digital Landscape (20 mins ) Coverage of digital market Market Trend Statistic Mobile User Data Mobile User Behavior Statistic Customer bonding Demographic.
ZAGAZIG UNIVERSITY-BENHA BRANCH SHOUBRA FACULTY OF ENGINEERING ELECTRICAL ENGINGEERING DEPT. COMPUTER SYSTEM DIVISION GRAUDATION PROJECT 2003.
Ide kerülhet az előadás címe Julia Sziklay: Facial recognition – a relevant example of biometric data collection Sarajevo,
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Data Mining - Introduction Compiled By: Umair Yaqub Lecturer Govt. Murray College Sialkot.
Facebook privacy policy
Judicial Training on Data Protection and Privacy Rights
Online Social Network: Threats &
Digital in Digital in 2016 Keep asking, how does this help my business?
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Intro to Machine Learning
Utilizing AI & GPUs to Build Cloud-based Real-Time Video Event Detection Solutions Zvika Ashani CTO.
Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the.
APPLIED TECHNIQUES OF IMAGE CONTENT ANALYSIS USING AMAZON REKOGNITION
Biometrics.
FaceNet A Unified Embedding for Face Recognition and Clustering
Chapter 12: Automated data collection methods
State-of-the-art face recognition systems
Facial Recognition [Biometric]
Biometrics.
Privacy and Information
Smart Portal To Protect Child Online
Bolun Wang*, Yuanshun Yao, Bimal Viswanath§ Haitao Zheng, Ben Y. Zhao
Other Sources of Information
E-Commerce and Social Networks
April 2012 iabuk.net/contact 04 December 2018.
TECA 2018.
PREPARED BY: KAMELI BATIWETI
April 2012 iabuk.net/contact 11 January 2019.
Unit# 5: Internet and Worldwide Web
Alessandro Acquisti Heinz College Carnegie Mellon University
Data Warehousing Data Mining Privacy
Privacy and Data Mining
Naval Leadership and Ethics Center
Make it real: Help your customers comply with the GDPR
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy in the Age of Augmented Reality Alessandro Acquisti (with Ralph Gross and Fred Stutzman) Carnegie Mellon University Joint works with: 1) Ralph Gross and Fred Stutzman; 2) Sonam Samat, Eyal Peer, Ralph Gross National Telecommunications and Information Administration March 25, 2014 Privacy Multistakeholder Meeting Facial Recognition Technology

In 2010, the best recognizer scored 0.003 In 1997, the best face recognizer in the FERET program scored an error rate of 0.54 (false reject rate at false accept rate of 1 in 1000) In 2010, the best recognizer scored 0.003 In 2000, 100 billion photos were shot worldwide, but only a minuscule proportion of them would make it online In 2010, 2.5 billion photos per month were uploaded by Facebook users alone – many of them tagged or identified 2

Converging technologies Increasing public self-disclosures through online social networks (especially photos) Continuing improvements in face recognizers’ accuracy Cloud computing Ubiquitous computing Statistical re-identification 3

Can we combine existing, publicly available online social network data with off-the-shelf face recognition technology for the purpose of large-scale, automated, real-time, peer-based… Individual re-identification, online and offline? Inference of additional, and potentially sensitive, personal data? For more info: http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/ or acquisti@andrew.cmu.edu 4

Three Experiments Experiment 1: Online-to-Online Re-Identification Experiment 2: Offline-to-Online Re-Identification Experiment 3: Offline-to-Online Sensitive Inferences In all experiments, we used PittPatt (Nechyba, Brandy, and Schneiderman, 2007) for face detection and recognition “Faces of Facebook: Privacy in the Age of Augmented Reality," Alessandro Acquisti, Ralph Gross, and Fred Stutzman. BlackHat, 2011 5

Experiment 1 Online to online We mined publicly available images from online social network profiles to re-identify profiles on one of the most popular dating sites in the US 6

Experiment 1: Data Identified DB: primary profile photos from Facebook profiles in a North American city, obtained via search engine queries Number of profiles: 277,978 Number of images: 274,540 Number of unique faces detected: 110,984 7

Experiment 1: Data Unidentified DB: Dating site profiles Search pattern: profiles within Urbanized Area of the same North American city Number of profiles: 5,818 Number of faces detected: 4,959 8

Experiment 1: In a nutshell Unidentified Database: Dating site photos Identified Database: Facebook photos Re-Identified Individual Fictional example – not real dating site photos 9

Experiment 1: Evaluation We only considered the best matching pair for each dating site profile (i.e., conservative approach) We compared more than 500 millions pairs using PittPatt and a commercial cloud computing cluster Public data, accessible technologies We crowdsourced (via Amazon Mturk) the validation of PittPatt’s scores (i.e., 1=definitely a match, 2=likely a match, 3=unsure, 4=likely not a match, 5=definitely not a match) 10

One out of 10 dating site members identified Experiment 1: Results Unidentified Database: Dating site Photos Identified Database: Facebook Photos One out of 10 dating site members identified Re-Identified Individual Fictional example – not real dating site photos 11

Experiment 2 Offline to online We used publicly available images from a Facebook college network to identify students walking in a campus building 12

Experiment 2: Results One out of 3 subjects identified CMU Campus Facebook 13

What we have shown so far + = 14

What we had done before (Acquisti and Gross 2009) + = SSN 15

I.e., predicting SSNs (or other sensitive information) from faces Can you do 1+1? Experiment 3 27% of subjects’ first 5 SSN digits identified with four attempts - starting from their faces + = SSN I.e., predicting SSNs (or other sensitive information) from faces 16

Online available information Inferable sensitive information Data “accretion” Facebook, LinkedIn, Org rosters, … Anonymous face Matching face Presumptive name Online available information Inferable sensitive information SSNs, Credit score, Political/sexual orientation, … Demographics, Interests, Friends, … 17

Privacy in the age of augmented reality

Limitations Facial recognition of everyone/everywhere/all the time is not yet feasible Speed and computational costs Creep factor/Uncooperative subjects Data sources (technical and legal availability) Accuracy (false positives increase with size of DB) However: technological and business trends suggest that current limitations will keep rapidly fading over time 19

Extrapolations Today 0.000108 seconds per pair comparison (does not include upload time) Consider target population as including all US residents 14+ yro (about 280M) Assume each person has one identified frontal photo available to public or to Web 2.0 providers Up to more than 4 hours to find a potential match 20

Extrapolations In 10 years US 14+yro population about 300M Assume Moore’s law for cloud computing clusters Merely pre-classify photos into male and female faces Fewer than 5 minutes to find a potential match Or, 10 seconds using larger clusters 21

Developments Improving accuracy Function creep Deep Face’s 97.25% accuracy on the Labeled Faces in the Wild (LFW) dataset (Taigman et al [2014]) Function creep Google's Glass developer policies do not allow for facial recognition technology - NameTag did it anyway The evolution of Facebook’s policies regarding face recognition and tagging 24

Scenarios & trade-offs Stranger in the street? Brick and mortar store? Large-scale real-time surveillance? 25

Solutions? Ideally, optimize trade-offs by finding a balance Problems: I.e.: permit “good” usages of facial recognition, but avoid “creepy” usages Problems: Define good, creepy Then, find out how to achieve that balance 27

Solutions? Stop research on face recognition? Halt data collection? Regulate usage? Do-not-identify-me lists? Notice and consent? (I.e., transparency and control) Paradox of control (Brandimarte et al 2013) Limits of transparency (Adjerid et al 2013) 28

Some key themes Faces as conduits between online and offline data Social network profiles as Real IDs The emergence of PPI: “personally predictable” information Democratization of surveillance The rise of visual, facial searches What will the future of privacy and anonymity be in a world with facial recognition and augmented reality? 29

For More Information Google/Bing: economics privacy Visit: http://www.heinz.cmu.edu/~acquisti/economics-privacy.htm Email: acquisti@andrew.cmu.edu 30