scholarly journals CLEANIR: Controllable Attribute-Preserving Natural Identity Remover

2020 ◽  
Vol 10 (3) ◽  
pp. 1120
Author(s):  
Durkhyun Cho ◽  
Jin Han Lee ◽  
Il Hong Suh

We live in an era of privacy concerns. As smart devices such as smartphones, service robots and surveillance cameras spread, preservation of our privacy becomes one of the major concerns in our daily life. Traditionally, the problem was resolved by simple approaches such as image masking or blurring. While these provide effective ways to remove identities from images, there are certain limitations when it comes to a matter of recognition from the processed images. For example, one may want to get ambient information from scenes even when privacy-related information such as facial appearance is removed or changed. To address the issue, our goal in this paper is not only to modify identity from faces but also keeps facial attributes such as color, pose and facial expression for further applications. We propose a novel face de-identification method based on a deep generative model in which we design the output vector from an encoder to be disentangled into two parts: identity-related part and the rest representing facial attributes. We show that by solely modifying the identity-related part from the latent vector, our method effectively modifies the facial identity to a completely new one while the other attributes that are loosely related to personal identity are preserved. To validate the proposed method, we provide results from experiments that measure two different aspects: effectiveness of personal identity modification and facial attribute preservation.

Author(s):  
Jet Gabrielle Sanders ◽  
Yoshiyuki Ueda ◽  
Sakiko Yoshikawa ◽  
Rob Jenkins

Abstract Background Recent experimental work has shown that hyper-realistic face masks can pass for real faces during live viewing. However, live viewing embeds the perceptual task (mask detection) in a powerful social context that may influence respondents’ behaviour. To remove this social context, we assessed viewers’ ability to distinguish photos of hyper-realistic masks from photos of real faces in a computerised two-alternative forced choice (2AFC) procedure. Results In experiment 1 (N = 120), we observed an error rate of 33% when viewing time was restricted to 500 ms. In experiment 2 (N = 120), we observed an error rate of 20% when viewing time was unlimited. In both experiments we saw a significant performance cost for other-race comparisons relative to own-race comparisons. Conclusions We conclude that viewers could not reliably distinguish hyper-realistic face masks from real faces in photographic presentations. As well as its theoretical interest, failure to detect synthetic faces has important implications for security and crime prevention, which often rely on facial appearance and personal identity being related.


Comunicar ◽  
2019 ◽  
Vol 27 (60) ◽  
pp. 61-70
Author(s):  
Yi-Ning Katherine-Chen ◽  
Chia-Ho Ryan-Wen

With the prevalence of smart devices and wireless Internet, privacy has become a pivotal matter in governmental, academic, and technological fields. Our study aims to understand Taiwanese university students’ privacy concerns and protective behaviours in relation to online targeting ads and their habitual smartphone usage. Surveying 810 valid subjects, our results first propose that ad relevance has direct bearing on attention to ads. Second, ad relevance inversely correlates with privacy concerns (i.e. descending personal control and surging corporate power) and protective behaviours (self-filtering and ad evasion). Third and finally, neither privacy concerns nor protective behaviours have a negative bearing on habitual smartphone usage. Opposite to previous research, our study concludes that Taiwanese college students exhibit zero privacy paradox, owing to no signs of privacy concern incited by mobile targeting ads, no evidence of significant protective behaviours, and no decreasing habitual smartphone usage out of privacy concern and protection. Our findings indicate Taiwanese university students’ shaky awareness of potential risks and crises from exposure to vulnerable online privacy management. To deal with this, we suggest educating youths’ understandings of digital jeopardy by experts is urgently needed more so than just technical tutorials of privacy settings. Con la prevalencia de dispositivos inteligentes e Internet inalámbrico, la privacidad se ha convertido en un tema esencial en materias gubernamentales, académicas y tecnológicas. Nuestro estudio se dedica específicamente a entender las preocupaciones de los estudiantes universitarios taiwaneses en privacidad y comportamientos protectores en relación con la publicidad online y el uso habitual de teléfonos inteligentes. Con 810 muestras válidas encuestadas, nuestros resultados revelan que: 1) La relevancia de la publicidad tiene un efecto directo en su atención; 2) Está asociada inversamente a las preocupaciones de privacidad (por ejemplo, control personal descendiente y poder corporativo ascendiente) y comportamientos protectores (evasión de anuncios y autocensura); 3) La preocupación por ña privacidad ni los comportamientos protectores tuvieron efecto negativo en el uso habitual de los smartphones. Nuestro estudio concluye que no hay paradojas de la privacidad halladas en estos jóvenes taiwaneses debido a cambios en su preocupación por la privacidad, generada por la publicidad personalizada en su móvil. Ello evidencia un cambio significativo en los comportamientos protectores. En suma, estos universitarios taiwaneses tienen una débil apreciación de los riesgos potenciales y crisis a los que una vulnerable gestión de la privacidad online les podría exponer. Para abordarlo, una educación que cultive la comprensión de los peligros digitales para los jóvenes es muy recomendable y requiere urgentemente tutoriales técnicos sobre privacidad.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


2020 ◽  
Vol 10 (22) ◽  
pp. 7992
Author(s):  
Jinseok Woo ◽  
Yasuhiro Ohyama ◽  
Naoyuki Kubota

This paper presents a robot partner development platform based on smart devices. Humans communicate with others based on the basic motivations of human cooperation and have communicative motives based on social attributes. Understanding and applying these communicative motives become important in the development of socially-embedded robot partners. Therefore, it is becoming more important to develop robots that can be applied according to needs while taking these human communication elements into consideration. The role of a robot partner is more important in not only on the industrial sector but also in households. However, it seems that it will take time to disseminate robots. In the field of service robots, the development of robots according to various needs is important and the system integration of hardware and software becomes crucial. Therefore, in this paper, we propose a robot partner development platform for human-robot interaction. Firstly, we propose a modularized architecture of robot partners using a smart device to realize a flexible update based on the re-usability of hardware and software modules. In addition, we show examples of implementing a robot system using the proposed architecture. Next, we focus on the development of various robots using the modular robot partner system. Finally, we discuss the effectiveness of the proposed robot partner system through social implementation and experiments.


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 927-928
Author(s):  
Kuan-Yuan Wang ◽  
Cheng-Sheng Chen ◽  
Hui-Mei Chen ◽  
I-Te Chen

Abstract Background: The telehealth approach offers enhanced service delivery for older patients living in rural areas. Purpose: We conducted a pilot study to evaluate the feasibility of using the Zenbo robot to improve the quality of care of elderly individuals with dementia. Methodology: In this study, we developed a digital solution on service robots and smart devices, which can leverage the capacity of the user-friendly interactive interface and digital dialog system. A group of eleven volunteered older adults was selected for this study. To assess the likability and acceptance of the Zenbo, we conducted a one-on-one (robot vs human) pilot study in our long-term care stations. Each participant engaged in conversational interactions for five consecutive days and completed a survey of 12 questions about the experiences they had with the Zenbo, at the beginning and the end of the study respectively. Results: Subjects with lower GDS-15 scores have more positive attitudes toward the robot before the intervention. 27% of older adults had an increase in positive attitudes toward the interaction with the Zenbo robot. With the aid of teleoperated mobile robotic systems at home, the innovative service model can be achieved through telecommunication between primary health professionals or caregivers at remote locations and psychiatrists at the medical center to make the seamless care environment real. Conclusion: The IoT technologies can be used to assist physicians in switching from a hospital-centered model of care to a home-based service for older people with dementia. It merits more future clinical trials and usability tests.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jakob Wirth ◽  
Christian Maier ◽  
Sven Laumer ◽  
Tim Weitzel

Purpose“Smart devices think you're “too lazy” to opt out of privacy defaults” was the headline of a recent news report indicating that individuals might be too lazy to stop disclosing their private information and therefore to protect their information privacy. In current privacy research, privacy concerns and self-disclosure are central constructs regarding protecting privacy. One might assume that being concerned about protecting privacy would lead individuals to disclose less personal information. However, past research has shown that individuals continue to disclose personal information despite high privacy concerns, which is commonly referred to as the privacy paradox. This study introduces laziness as a personality trait in the privacy context, asking to what degree individual laziness influences privacy issues.Design/methodology/approachAfter conceptualizing, defining and operationalizing laziness, the authors analyzed information collected in a longitudinal empirical study and evaluated the results through structural equation modeling.FindingsThe findings show that the privacy paradox holds true, yet the level of laziness influences it. In particular, the privacy paradox applies to very lazy individuals but not to less lazy individuals.Research limitations/implicationsWith these results one can better explain the privacy paradox and self-disclosure behavior.Practical implicationsThe state might want to introduce laws that not only bring organizations to handle information in a private manner but also make it as easy as possible for individuals to protect their privacy.Originality/valueBased on a literature review, a clear research gap has been identified, filled by this research study.


Author(s):  
Sharon Gilad-Gutnick ◽  
Pawan Sinha

The effectiveness of the presidential illusion underscores the important point that by excluding external facial features, such as the head and hair shape, we lose critical information about the way faces are represented in real life. This chapter considers the question of whether whole-head processing is a general principle that can be extended to all face processes or if it specifically reflects the nature of facial encoding used by the visual system for the identification of individuals. For example, would supplementing the internal features of one face with those of another affect the perception of other common facial attributes, such as gender, race, or age? The eyes, nose, and mouth are believed to be the primary purveyors of facial identity. The presidential illusion challenges this dogma and suggests that external head features (the hair and jawline) are also crucial constituents of facial representation and strongly influence identity judgments.


PLoS ONE ◽  
2021 ◽  
Vol 16 (9) ◽  
pp. e0257601
Author(s):  
Joey F. George ◽  
Rui Chen ◽  
Lingyao Yuan

The Internet of Things (IoT) is a widely hyped concept, with its focus on the connection of smart devices to the Internet rather than on people. IoT for consumers is often called the smart home market, and a large part of that market consists of home security devices. Consumers are often motivated to purchase smart home security devices to prevent burglaries, which they fear may lead to damage to their property or threats to their families. However, they also understand that IoT home security devices may be a threat to the privacy of their personal information. To determine the relative roles of fear and privacy concerns in the decision to purchase IoT home security devices, we conducted a survey of American consumers. We used the Theory of Reasoned Action as the theoretical basis for the study. We found that fear positively affected consumer attitudes toward purchasing smart home security devices, while concerns about privacy negatively affected attitudes. We found that attitudes toward purchase, the opinions of important others, and experience with burglaries all affected intent to purchase. We also found that the relationship between privacy concerns and intent to purchase is completely mediated by attitudes, while fear has both direct and indirect effects on intent.


Author(s):  
Arnaud D'Argembeau

When one’s mind wanders, one frequently experiences thoughts, images, and feelings about oneself and one’s life. These self-referential thoughts involve diverse contents and take various forms, but most often focus on specific future events that are closely related to one’s personal goals and concerns. Neuroimaging studies show that such spontaneous thoughts recruit many of the same brain regions—largely corresponding to the default network—as directed self-referential thought. The medial prefrontal cortex is most consistently involved and might contribute to assign value and to integrate processed contents with autobiographical knowledge. The tendency of the wandering mind to focus on self-related information might foster a sense of personal identity and lay the foundation for long-term goal pursuit.


Sign in / Sign up

Export Citation Format

Share Document