skip to main content
10.1145/3290605.3300597acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Public Access

Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms

Published: 02 May 2019 Publication History

Abstract

Pervasive photo sharing in online social media platforms can cause unintended privacy violations when elements of an image reveal sensitive information. Prior studies have identified image obfuscation methods (e.g., blurring) to enhance privacy, but many of these methods adversely affect viewers' satisfaction with the photo, which may cause people to avoid using them. In this paper, we study the novel hypothesis that it may be possible to restore viewers' satisfaction by 'boosting' or enhancing the aesthetics of an obscured image, thereby compensating for the negative effects of a privacy transform. Using a between-subjects online experiment, we studied the effects of three artistic transformations on images that had objects obscured using three popular obfuscation methods validated by prior research. Our findings suggest that using artistic transformations can mitigate some negative effects of obfuscation methods, but more exploration is needed to retain viewer satisfaction.

Supplementary Material

ZIP File (paper367.zip)
Supplementary material contains additional plots and analysis results.

References

[1]
T. O. Aydin, A. Smolic, and M. Gross. 2015. Automated Aesthetic Analysis of Photographic Images. IEEE Transactions on Visualization and Computer Graphics 21, 1 (Jan 2015), 31--42.
[2]
Adrien Bousseau, Fabrice Neyret, Joëlle Thollot, and David Salesin. 2007. Video Watercolorization Using Bidirectional Texture Advection. In ACM SIGGRAPH 2007 Papers (SIGGRAPH '07), Vol. 26. ACM, New York, NY, USA, Article 104.
[3]
Jacob Cohen. 1992. A power primer. Psychological bulletin 112, 1 (1992), 155.
[4]
Dianne Cyr, Milena Head, Hector Larios, and Bing Pan. 2009. Exploring Human Images in Website Design: A Multi-Method Approach. MIS Quarterly 33, 3 (2009), 539--566. http://www.jstor.org/stable/20650308
[5]
Ritendra Datta, Dhiraj Joshi, Jia Li, and James Z. Wang. 2006. Studying Aesthetics in Photographic Images Using a Computational Approach. In Computer Vision -- ECCV 2006, Ale? Leonardis, Horst Bischof, and Axel Pinz (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 288-- 301.
[6]
William J. Doll and Gholamreza Torkzadeh. 1988. The Measurement of End-User Computing Satisfaction. MIS Quarterly 12, 2 (1988), 259--274. http://misq.org/ the-measurement-of-end-user-computing-satisfaction.html
[7]
Maeve Duggan. 2013. Photo and video sharing grow online. (2013). http://www.pewinternet.org/2013/10/28/ photo-and-video-sharing-grow-online/.
[8]
Jim Edwards. 2014. PLANET SELFIE: We're Now Posting A Staggering 1.8 Billion Photos Every Day. http://www.businessinsider.com/werenow-posting-a-staggering-18-billion-photos-to-social-media-everyday-2014--5. (2014). Accessed April 19, 2018.
[9]
Ahmed M. Elgammal and Babak Saleh. 2015. Quantifying Creativity in Art Networks. CoRR abs/1506.00711 (2015). arXiv:1506.00711 http: //arxiv.org/abs/1506.00711
[10]
Graham D Finlayson, Michal Mackiewicz, and Anya Hurlbert. 2015. Color correction using root-polynomial regression. IEEE Transactions on Image Processing 24, 5 (2015), 1460--1470.
[11]
J. Gao, S. J. Kim, and M. S. Brown. 2011. Constructing image panoramas using dual-homography warping. In CVPR 2011. 49--56.
[12]
Leon A. Gatys, Alexander S. Ecker, and Matthias Bethge. 2015. A Neural Algorithm of Artistic Style. CoRR abs/1508.06576 (2015). arXiv:1508.06576 http://arxiv.org/abs/1508.06576
[13]
Google Street View. 2018. Image Acceptance and Privacy Policies. (2018). Retrieved March 07, 2018 from https://www.google.com/ streetview/privacy/.
[14]
Rakibul Hasan, Eman Hassan, Yifang Li, Kelly Caine, David J. Crandall, Roberto Hoyle, and Apu Kapadia. 2018. Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 47, 13 pages.
[15]
Eman T. Hassan, Rakibul Hasan, Patrick Shaffer, David Crandall, and Apu Kapadia. 2017. Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshop on Computer Vision Challenges and Opportunities for Privacy and Security (CV-COPS). 29-- 38.
[16]
James Hays and Irfan Essa. 2004. Image and video based painterly animation. In International Symposium on Non-photorealistic Animation and Rendering. ACM, ACM, New York, NY, USA, 113--120.
[17]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing Privacy Leakage From Photos in Social Networks. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). ACM, New York, NY, USA, 781--792.
[18]
Phillip Isola, Jianxiong Xiao, Devi Parikh, Antonio Torralba, and Aude Oliva. 2014. What makes a photograph memorable? IEEE transactions on pattern analysis and machine intelligence 36, 7 (2014), 1469--1482.
[19]
Sanjay Kairam, Joseph 'Jofish' Kaye, John Alexis Guerra-Gomez, and David A. Shamma. 2016. Snap Decisions?: How Users, Content, and Aesthetics Interact to Shape Photo Sharing Behaviors. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 113--124.
[20]
Nima Khademi Kalantari and Ravi Ramamoorthi. 2017. Deep high dynamic range imaging of dynamic scenes. ACM Transactions on Graphics (TOG) 36, 4 (2017), 144.
[21]
Y. Kao, R. He, and K. Huang. 2017. Deep Aesthetic Quality Assessment With Semantic Information. IEEE Transactions on Image Processing 26, 3 (March 2017), 1482--1495.
[22]
RM Khan and MA Khan. 2007. Academic sojourners, culture shock and intercultural adaptation: A trend analysis. Studies About Languages 10 (2007), 38--46.
[23]
Hope King. 2016. Wildly popular Prisma app just made a major breakthrough. CNN. http://money.cnn.com/2016/08/23/technology/ prisma-offline/index.html
[24]
Jan Eric Kyprianidis and Jürgen Döllner. 2008. Image Abstraction by Structure Adaptive Filtering. In Proc. EG UK Theory and Practice of Computer Graphics. Eurographics Association, Manchester, UK, 51--58.
[25]
Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Effectiveness and Users' Experience of Obfuscation As a Privacy-Enhancing Technology for Sharing Photos. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 67 (Dec. 2017), 24 pages.
[26]
Di Liu, Randolph G. Bias, Matthew Lease, and Rebecca Kuipers. 2012. Crowdsourcing for usability testing. Proceedings of the American Society for Information Science and Technology 49, 1 (2012), 1--10.
[27]
Yabing Liu, Krishna P. Gummadi, Balachander Krishnamurthy, and Alan Mislove. 2011. Analyzing Facebook Privacy Settings: User Expectations vs. Reality. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC '11). ACM, New York, NY, USA, 61--70.
[28]
Xin Lu, Zhe Lin, Xiaohui Shen, Radomir Mech, and James Z Wang. 2015. Deep multi-patch aggregation network for image style, aesthetics, and quality estimation. In Proceedings of the IEEE International Conference on Computer Vision. 990--998.
[29]
Michelle Madejski, Maritza Johnson, and Steven M Bellovin. 2011. The failure of online social network privacy settings. Department of Computer Science, Columbia University, Tech. Rep. CUCS-010--11 (2011).
[30]
Aqdas Malik, Amandeep Dhir, and Marko Nieminen. 2016. Uses and Gratifications of digital photo sharing on Facebook. Telematics and Informatics 33, 1 (2016), 129 -- 138.
[31]
Farhad Manjoo. 2017. Why Instagram Is Becoming Facebook's Next Facebook). https://www.nytimes.com/2017/04/26/technology/ why-instagram-is-becoming-facebooks-next-facebook.html
[32]
Adam W Meade and S Bartholomew Craig. 2012. Identifying careless responses in survey data. Psychological methods 17, 3 (Sept 2012), 437--455.
[33]
N Murray, L Marchesotti, and F Perronnin. 2012. AVA: A large-scale database for aesthetic visual analysis. Proceedings / CVPR, IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2408--2415.
[34]
M. Nishiyama, T. Okabe, I. Sato, and Y. Sato. 2011. Aesthetic quality classification of photographs based on color harmony. In CVPR 2011. 33--40.
[35]
Anne Oeldorf-Hirsch and S. Shyam Sundar. 2016. Social and Technological Motivations for Online Photo Sharing. Journal of Broadcasting & Electronic Media 60, 4 (2016), 624--642. arXiv:https://doi.org/10.1080/08838151.2016.1234478
[36]
Mark R Phillips, Bradley D McAuliff, Margaret Bull Kovera, and Brian L Cutler. 1999. Double-blind photoarray administration as a safeguard against investigator bias. Journal of Applied Psychology 84, 6 (1999), 940.
[37]
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. 2018. "You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 143--157. https://www.usenix.org/conference/soups2018/ presentation/rashidi
[38]
E M Redmiles, S Kross, and M L Mazurek. 2019. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples. In 2019 2019 IEEE Symposium on Security and Privacy (SP), Vol. 00. IEEE, 227--244.
[39]
Andra Siibak. 2009. Constructing the self through the photo selectionvisual impression management on social networking websites. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 3, 1 (2009).
[40]
Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The Post That Wasn'T: Exploring Self-censorship on Facebook. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, New York, NY, USA, 793--802.
[41]
Manya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2013. "I Read My Twitter the Next Morning and Was Astonished": A Conversational Perspective on Twitter Regrets. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, New York, NY, USA, 3277--3286.
[42]
Jose M. Such, Joel Porter, Sören Preibusch, and Adam Joinson. 2017. Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 3821--3832.
[43]
C. Tomasi and R. Manduchi. 1998. Bilateral filtering for gray and color images. In Sixth International Conference on Computer Vision (IEEE Cat. No.98CH36271). 839--846.
[44]
Leman Pinar Tosun. 2012. Motives for Facebook use and expressing "true self" on the Internet. Computers in Human Behavior 28, 4 (2012), 1510 -- 1517.
[45]
Luam Catao Totti, Felipe Almeida Costa, Sandra Avila, Eduardo Valle, Wagner Meira, Jr., and Virgilio Almeida. 2014. The Impact of Visual Attributes on Online Image Diffusion. In Proceedings of the 2014 ACM Conference on Web Science (WebSci '14). ACM, New York, NY, USA, 42--51.
[46]
Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. "I Regretted the Minute I Pressed Share": A Qualitative Study of Regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11). ACM, New York, NY, USA, Article 10, 16 pages.
[47]
Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for My Space: Coping Mechanisms for sns Boundary Regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, USA, 609--618.
[48]
Hang Zhang and Kristin J. Dana. 2017. Multi-style Generative Network for Real-time Transfer. CoRR abs/1703.06953 (2017). arXiv:1703.06953 http://arxiv.org/abs/1703.06953

Cited By

View all
  • (2024)Perspectives on DeepFakes for Privacy: Comparing Perceptions of Photo Owners and Obfuscated Individuals towards DeepFake Versus Traditional Privacy-Enhancing ObfuscationProceedings of the International Conference on Mobile and Ubiquitous Multimedia10.1145/3701571.3701602(300-312)Online publication date: 1-Dec-2024
  • (2024)Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-UsersAdjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3672539.3686778(1-3)Online publication date: 13-Oct-2024
  • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
      May 2019
      9077 pages
      ISBN:9781450359702
      DOI:10.1145/3290605
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. image filtering
      2. image obfuscation
      3. privacy

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CHI '19
      Sponsor:

      Acceptance Rates

      CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)227
      • Downloads (Last 6 weeks)28
      Reflects downloads up to 09 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Perspectives on DeepFakes for Privacy: Comparing Perceptions of Photo Owners and Obfuscated Individuals towards DeepFake Versus Traditional Privacy-Enhancing ObfuscationProceedings of the International Conference on Mobile and Ubiquitous Multimedia10.1145/3701571.3701602(300-312)Online publication date: 1-Dec-2024
      • (2024)Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-UsersAdjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3672539.3686778(1-3)Online publication date: 13-Oct-2024
      • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
      • (2024)Sharenting on TikTok: Exploring Parental Sharing Behaviors and the Discourse Around Children’s Online PrivacyProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642447(1-17)Online publication date: 11-May-2024
      • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
      • (2023)Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social MediaACM Transactions on Computer-Human Interaction10.1145/357701430:3(1-32)Online publication date: 2-Jan-2023
      • (2023)Is cartoonized life-vlogging the key to increasing adoption of activity-oriented wearable camera systems?Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3585812(1-8)Online publication date: 19-Apr-2023
      • (2023)A Psychometric Scale to Measure Individuals’ Value of Other People’s Privacy (VOPP)Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581496(1-14)Online publication date: 19-Apr-2023
      • (2023)Multiuser Privacy and Security Conflicts in the CloudProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581307(1-16)Online publication date: 19-Apr-2023
      • (2023)Understanding and Mitigating Technology-Facilitated Privacy Violations in the Physical WorldProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580909(1-16)Online publication date: 19-Apr-2023
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media