Change search
ReferencesLink to record
Permanent link

Direct link
Personal rights management - Taming camera-phones for individual privacy enforcement
Goethe University.
2006 (English)In: PRIVACY ENHANCING TECHNOLOGIES, Katholieke Univ Leuven, ESAT COSIC, B-3001 Louvain, Belgium.: Springer, 2006, 172-189 p.Conference paper (Refereed)
Abstract [en]

With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who could take and distribute pictures of an individual with no risk and little cost in any situation in public or private spaces. Fast distribution via web based photo albums, online communities and web pages expose an individual's private life to the public. Social and legal measures are increasingly taken to deal with this problem, but they are hard to enforce in practice. In this paper, we proposed a model for privacy infrastructures aiming for the distribution channel such that as soon as the picture is publicly available, the exposed individual has a chance to find it and take proper action in the first place. The implementation issues of the proposed protocol are discussed. Digital rights management techniques are applied in our proposed infrastructure, and data identification techniques such as digital watermarking and robust perceptual hashing are proposed to enhance the distributed content identification.

Place, publisher, year, edition, pages
Katholieke Univ Leuven, ESAT COSIC, B-3001 Louvain, Belgium.: Springer, 2006. 172-189 p.
Lecture Notes in Computer Science, ISSN 0302-9743 ; 4258
Keyword [en]
privacy protection, model for privacy infrastructures, mobile camera phones, data identification techniques
National Category
Computer Science
URN: urn:nbn:se:kau:diva-46653ISI: 000244711400010ISBN: 978-3-540-68790-0 (print)OAI: diva2:1034901
6th International Workshop on Privacy Enhancing Technologies, JUN 28-30, 2006, Robinson Coll, Cambridge, ENGLAND
Available from: 2016-10-13 Created: 2016-10-13 Last updated: 2016-10-14

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Fritsch, Lothar
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

Total: 4 hits
ReferencesLink to record
Permanent link

Direct link