skip to main content
10.1145/2789168.2790106acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Kaleido: You Can Watch It But Cannot Record It

Authors Info & Claims
Published:07 September 2015Publication History

ABSTRACT

Recently a number of systems have been developed to implement and improve the visual communication over screen-camera links. In this paper we study an opposite problem: how to prevent unauthorized users from videotaping a video played on a screen, such as in a theater, while do not affect the viewing experience of legitimate audiences. We propose and develop a light-weight hardware-free system, called Kaleido, that ensures these properties by taking advantage of the limited disparities between the screen-eye channel and the screen-camera channel. Kaleido does not require any extra hardware and is purely based on re-encoding the original video frame into multiple frames used for displaying. We extensively test our system Kaleido using a variety of smartphone cameras. Our experiments confirm that Kaleido preserves the high-quality screen-eye channel while reducing the secondary screen-camera channel quality significantly.

References

  1. Cmos image sensors continue march to dominance over ccds. https://technology.ihs.com/389476/cmos-image-sensors-continue-march-to-dominance-over-ccds.Google ScholarGoogle Scholar
  2. Google street view. http://www.google.com/streetview.Google ScholarGoogle Scholar
  3. Image sensors market analysis. http://www.grandviewresearch.com/industry-analysis/image-sensors-market.Google ScholarGoogle Scholar
  4. Pirateeye. http://www.pirateeye.com/.Google ScholarGoogle Scholar
  5. Preventing movie piracy. http://www.technologyreview.com/news/406063/preventing-movie-piracy/.Google ScholarGoogle Scholar
  6. Putting a price tag on film piracy. http://blogs.wsj.com/numbers/putting-a-price-tag-on-film-piracy-1228/.Google ScholarGoogle Scholar
  7. Abdulla, S. New visual cryptography algorithm for colored image. arXiv preprint arXiv:1004.4445 (2010).Google ScholarGoogle Scholar
  8. Anderson, S. J., and Burr, D. C. Spatial and temporal selectivity of the human motion detection system. Vision research 25, 8 (1985), 1147--1154.Google ScholarGoogle Scholar
  9. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., and Starin, D. Persona: an online social network with user-defined privacy. In ACM SIGCOMM Computer Communication Review (2009), vol. 39, ACM, pp. 135--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Besmer, A., and Richter Lipford, H. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2010), ACM, pp. 1563--1572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bo, C., Shen, G., Liu, J., Li, X.-Y., Zhang, Y., and Zhao, F. Privacy.tag: Privacy concern expressed and respected. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems (2014), USENIX, pp. 163--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Buades, A., Coll, B., and Morel, J.-M. Denoising image sequences does not require motion estimation. In Proceedings of Conference on Advanced Video and Signal Based Surveillance (2005), IEEE, pp. 70--74.Google ScholarGoogle ScholarCross RefCross Ref
  13. Buades, A., Coll, B., and Morel, J.-M. A non-local algorithm for image denoising. In Proceedings of Conference on Computer Vision and Pattern Recognition (2005), vol. 2, IEEE, pp. 60--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chen, C., and Mow, W. H. A systematic scheme for measuring the performance of the display-camera channel. arXiv preprint arXiv:1501.02528 (2015).Google ScholarGoogle Scholar
  15. Cisco, I. Cisco visual networking index: Forecast and methodology, 2013--2018. CISCO White paper (2014), 2013--2018.Google ScholarGoogle Scholar
  16. Cox, I. J., Kilian, J., Leighton, T., and Shamoon, T. Secure spread spectrum watermarking for images, audio and video. In International Conference on Image Processing (1996), vol. 3, IEEE, pp. 243--246.Google ScholarGoogle ScholarCross RefCross Ref
  17. Dufaux, F., and Ebrahimi, T. Scrambling for privacy protection in video surveillance systems. IEEE Transactions on Circuits and Systems for Video Technology 18, 8 (2008), 1168--1174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Dufaux, F., and Ebrahimi, T. A framework for the validation of privacy protection solutions in video surveillance. In ICME (2010), pp. 66--71.Google ScholarGoogle ScholarCross RefCross Ref
  19. Fan, J., Luo, H., Hacid, M.-S., and Bertino, E. A novel approach for privacy-preserving video sharing. In Proceedings of International Conference on Information and Knowledge Management (2005), ACM, pp. 609--616. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Farrell, F. Fitting physical screen parameters to the human eye. Vision and visual dysfunction: The man-machine interface. Boca Raton, FL: CRC (1991).Google ScholarGoogle Scholar
  21. Gilbert, G. M. Dynamic psychophysics and the phi phenomenon. Archives of Psychology (Columbia University) (1939).Google ScholarGoogle Scholar
  22. Gross, R., and Acquisti, A. Information revelation and privacy in online social networks. In Proceedings of workshop on Privacy in the electronic society (2005), ACM, pp. 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hao, T., Zhou, R., and Xing, G. Cobra: color barcode streaming for smartphone systems. In Proceedings of International conference on Mobile systems, applications, and services (2012), ACM, pp. 85--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Hou, Y.-C. Visual cryptography for color images. Pattern Recognition 36, 7 (2003), 1619--1629.Google ScholarGoogle ScholarCross RefCross Ref
  25. Hranilovic, S., and Kschischang, F. R. A pixelated mimo wireless optical communication system. IEEE Journal of Selected Topics in Quantum Electronics 12, 4 (2006), 859--874.Google ScholarGoogle ScholarCross RefCross Ref
  26. Hu, W., Gu, H., and Pu, Q. Lightsync: Unsynchronized visual communication over screen-camera links. In Proceedings of International Conference on Mobile Computing & Networking (2013), ACM, pp. 15--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Hu, W., Mao, J., Huang, Z., Xue, Y., She, J., Bian, K., and Shen, G. Strata: layered coding for scalable visual communication. In Proceedings of International conference on Mobile computing and networking (2014), ACM, pp. 79--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Jiang, Y., Zhou, K., and He, S. Human visual cortex responds to invisible chromatic flicker. Nature neuroscience 10, 5 (2007), 657--662.Google ScholarGoogle Scholar
  29. Jo, K., Gupta, M., Nayar, S., Liu, D., Gu, J., Hitomi, Y., Mitsunaga, T., Yin, Q., Iso, D., Smith, B., et al. Disco: Displays that communicate. IEEE Transactions on Pattern Analysis and Machine Intelligence 99 (2013), 1.Google ScholarGoogle Scholar
  30. Kleinberg, J. M. Challenges in mining social network data: processes, privacy, and paradoxes. In Proceedings of International conference on Knowledge discovery and data mining (2007), ACM, pp. 4--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Lee, H.-Y., Lin, H.-M., Wei, Y.-L., Wu, H.-I., Tsai, H.-M., and Lin, K. C.-J. Rollinglight: Enabling line-of-sight light-to-camera communications. In Proceedings of International Conference on Mobile Systems, Applications, and Services (2015), ACM, pp. 167--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Li, T., An, C., Campbell, A. T., and Zhou, X. Hilight: Hiding bits in pixel translucency changes. ACM SIGMOBILE Mobile Computing and Communications Review 18, 3 (2015), 62--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Li, T., An, C., Xiao, X., Campbell, A. T., and Zhou, X. Real-time screen-camera communication behind any scene. In Proceedings of International Conference on Mobile Systems, Applications, and Services (2015), ACM, pp. 197--211. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Li, Z., Du, W., Zheng, Y., Li, M., and Wu, D. O. From rateless to hopless. In Proceedings of International Symposium on Mobile Ad Hoc Networking and Computing (2015), ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Luo, M. R., Cui, G., and Rigg, B. The development of the cie 2000 colour-difference formula: Ciede2000. Color Research & Application 26, 5 (2001), 340--350.Google ScholarGoogle ScholarCross RefCross Ref
  36. Mason, R. J., Snelgar, R. S., Foster, D. H., Heron, J. R., and Jones, R. E. Abnormalities of chromatic and luminance critical flicker frequency in multiple sclerosis. Investigative ophthalmology & visual science 23, 2 (1982), 246--252.Google ScholarGoogle Scholar
  37. Naor, M., and Shamir, A. Visual cryptography. In Advances in Cryptology - EUROCRYPT'94 (1995), Springer, pp. 1--12.Google ScholarGoogle ScholarCross RefCross Ref
  38. Naor, M., and Shamir, A. Visual cryptography ii: Improving the contrast via the cover base. In Security protocols (1997), Springer, pp. 197--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Newton, E. M., Sweeney, L., and Malin, B. Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge and Data Engineering 17, 2 (2005), 232--243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Perli, S. D., Ahmed, N., and Katabi, D. Pixnet: Lcd-camera pairs as communication links. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 451--452. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Poller, A., Steinebach, M., and Liu, H. Robust image obfuscation for privacy protection in web 2.0 applications. In IS&T/SPIE Electronic Imaging (2012), International Society for Optics and Photonics, pp. 830304--830304.Google ScholarGoogle ScholarCross RefCross Ref
  42. Poynton, C. Frequently asked questions about color. Retrieved June 19 (1997), 2004.Google ScholarGoogle Scholar
  43. Ra, M.-R., Govindan, R., and Ortega, A. P3: Toward privacy-preserving photo sharing. In Proceedings of Symposium on Networked Systems Design and Implementation (2013), pp. 515--528. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Rajagopal, N., Lazik, P., and Rowe, A. Visual light landmarks for mobile devices. In Proceedings of international symposium on Information processing in sensor networks (2014), IEEE Press, pp. 249--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Rijmen, V., and Preneel, B. Efficient colour visual encryption or 'shared colors of benetton'. rump session of EUROCRYPT 96 (1996).Google ScholarGoogle Scholar
  46. Sadeghi, A.-R., Schneider, T., and Wehrenberg, I. Efficient privacy-preserving face recognition. In Information, Security and Cryptology. Springer, 2010, pp. 229--244. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.-L., Ekin, A., Connell, J., Shu, C. F., and Lu, M. Enabling video privacy through computer vision. IEEE Security & Privacy 3, 3 (2005), 50--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Simoens, P., Xiao, Y., Pillai, P., Chen, Z., Ha, K., and Satyanarayanan, M. Scalable crowd-sourcing of video from mobile devices. In Proceeding of international conference on Mobile systems, applications, and services (2013), ACM, pp. 139--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Truong, K. N., Patel, S. N., Summet, J. W., and Abowd, G. D. Preventing camera recording by designing a capture-resistant environment. In UbiComp 2005: Ubiquitous Computing. Springer, 2005, pp. 73--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Tyler, C. W., and Hamer, R. D. Analysis of visual modulation sensitivity. iv. validity of the ferry-porter law. JOSA A 7, 4 (1990), 743--758.Google ScholarGoogle ScholarCross RefCross Ref
  51. Wang, A., Li, Z., Peng, C., Shen, G., Fang, G., and Zeng, B. Inframe+: Achieve simultaneous screen-human viewing and hidden screen-camera communication. In Proceedings of International Conference on Mobile Systems, Applications, and Services (2015), ACM, pp. 181--195. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Wang, A., Peng, C., Zhang, O., Shen, G., and Zeng, B. Inframe: Multiflexing full-frame visible communication channel for humans and devices. In Proceedings of Workshop on Hot Topics in Networks (2014), ACM, p. 23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Wang, Y. Survey of objective video quality measurements.Google ScholarGoogle Scholar
  54. Wang, Z., Lu, L., and Bovik, A. C. Video quality assessment based on structural distortion measurement. Signal processing: Image communication 19, 2 (2004), 121--132.Google ScholarGoogle Scholar
  55. Wolfgang, R. B., and Delp, E. J. A watermark for digital images. In International Conference on Image Processing (1996), vol. 3, IEEE, pp. 219--222.Google ScholarGoogle ScholarCross RefCross Ref
  56. Wong, P. W. A public key watermark for image verification and authentication. In International Conference on Image Processing (1998), vol. 1, IEEE, pp. 455--459.Google ScholarGoogle Scholar
  57. Woo, G., Lippman, A., and Raskar, R. Vrcodes: Unobtrusive and active visual codes for interaction by exploiting rolling shutter. In Proceedings of International Symposium on Mixed and Augmented Reality (2012), IEEE, pp. 59--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Yuan, W., Wengrowski, E., Dana, K. J., Ashok, A., Gruteser, M., and Mandayam, N. Optimal radiometric calibration for camera-display communication. arXiv preprint arXiv:1501.01744 (2015).Google ScholarGoogle Scholar
  59. Zhang, L., Jung, T., Feng, P., Liu, K., Li, X.-Y., and Liu, Y. Pic: Enable large-scale privacy preserving content-based image search on cloud. In Proceedings of the International Conference on Parallel Processing (2015), IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Zhang, L., Jung, T., Liu, C., Ding, X., Li, X.-Y., and Liu, Y. Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices. In Proceedings of the International Conference on Distributed Computing Systems (2015), IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  61. Zhang, L., Li, X.-Y., Liu, K., Jung, T., and Liu, Y. Message in a sealed bottle: Privacy preserving friending in mobile social networks. In IEEE Transactions on Mobile Computing (2014), IEEE.Google ScholarGoogle Scholar
  62. Zhang, L., Liu, K., Li, X.-Y., Feng, P., Liu, C., and Liu, Y. Enable portrait privacy protection in photo capturing and sharing. arXiv preprint arXiv:1410.6582 (2014).Google ScholarGoogle Scholar
  63. Zhao, J., and Mercier, G. Transactional video marking system, Mar. 14 2014. US Patent App. 14/214,366.Google ScholarGoogle Scholar

Index Terms

  1. Kaleido: You Can Watch It But Cannot Record It

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
      September 2015
      638 pages
      ISBN:9781450336192
      DOI:10.1145/2789168

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 September 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      MobiCom '15 Paper Acceptance Rate38of207submissions,18%Overall Acceptance Rate440of2,972submissions,15%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    ePub

    View this article in ePub.

    View ePub