Premium Essay

Large-Scale Privacy Protection in Google

In:

Submitted By 10501760
Words 702
Pages 3
Abstract
The last two years have witnessed the introduction and rapid expansion of products based upon large, systematically-gathered, street-level image collections, such as Google Street View, EveryScape, and Mapjack. In the process of gathering images of public spaces, these projects also capture license plates, faces, and other information considered sensitive from a privacy standpoint.
In this work, we present a system that addresses the challenge of automatically detecting and blurring faces and license plates for the purpose of privacy protection in Google
Street View. Though some in the field would claim face detection is “solved”, we show that state-of-the-art face detectors alone are not sufficient to achieve the recall desired for large-scale privacy protection. In this paper we present a system that combines a standard sliding-window detector tuned for a high recall, low-precision operating point with a fast post-processing stage that is able to remove additional false positives by incorporating domain-specific information not available to the sliding-window detector. Using a completely automatic system, we are able to sufficiently blur more than 89% of faces and 94 96% of license plates in evaluation sets sampled from Google Street View imagery.
1. Introduction
In the last two years, there has been a rapid expansion of systematically-gathered street-level imagery available on the web. The largest and probably most well-known collection to date is Google Street View1 [13]. Street View launched as part of Google Maps in May 2007 and has expanded rapidly since, at last count providing imagery from twelve countries on four continents. Other smaller products have found their niches around the world, including Map-
1http://maps.google.com/help/maps/streetview
jack2, Everyscape3, and Daum’s Road View4. What makes
these

Similar Documents

Free Essay

Big Data

...analysis and data mining, data visualization and data privacy and security, and so on. The reason I select topic about big data My major is computer science and I have taken a few courses about data mining before. Nowadays more and more job positions about big data are showing at job seeking website, such as Monster.com. I am planning to learn some mainstream big data technologies like Hadoop. Therefore, I choose big data as my midterm paper topic. Big data in Google Google's big data analytics intelligence applications include customer sentiment analysis, risk analysis, product recommendations, message routing, customer losing prediction, the classification of the legal copy, email content filtering, political tendency forecast, species identification and other aspects. It is said that big data will generate $23 million every day for Google. Some typical applications are as follows: Based on MapReduce, Google's traditional applications include data storage, data analysis, log analysis, search quality and other data analytical applications. Based on Dremel system, Google introduced its powerful data analysis software and services - BigQuery. It is also a part of Google's Internet search services. Google has started selling online data analysis services. Based on statistical algorithms, Google search engine can provide services like type writing error correction and statistical machine translation. Google Instant. Google Instant will predict...

Words: 1405 - Pages: 6

Premium Essay

Google Privacy

...Internet privacy has become a major issue in today’s society, with technology advancing leaps and bounds faster than laws created by our government. Many companies are now creating policies that are seen as crossing the line. Google’s policies are becoming even more argued and discussed than any other. Many believe that Google is infringing on the rights of both individuals and countries as a whole. The interpretation of these policies, in the legal realm, is very misunderstood and seen as muddy water. Google says that collecting information from its customers, is necessary to better serve, both, it users and advertisers. A wide range of industries have the possibility of being affected with the privacy policy changes of Google, including healthcare, research, education and many more. Information collected by Google comes from nearly all of their services, including, Google Health, which is a service that allows health records to be shared amongst medical professionals and the patient. Google Health, takes the patients personal health record (PHR) and uploads it to a data base, which is easily accessed. This service can expedite health services, but is also seen as a privacy risk. According to Colin P. McCarthy of the William and Merry Law Review, “There is concern that PHR venders, such as Google and Microsoft, are not governed by the strict privacy and security rules of the Health Insurance Portability and Accountability Act of 1996 (HIPPA) and are held to no other...

Words: 1043 - Pages: 5

Premium Essay

The Commodification of Free Speech

...Benjamin Marchman English 122 Cathryn Lawson The Value of Online Privacy Since the September 11th terrorist attacks the United Sates and the world at large has officially entered into an age of counter-terrorism. While the more obvious aspects of this effort against violent extremism, which violate human and constitutional rights, such as drone strikes, waterboarding, and black prison sites, are specifically targeted toward a specific population, it is the subtler aspects of mass surveillance and corporate and governmental intrusion of privacy which present an overwhelming threat to human rights and quality of life. As has been made clear by recent revelations of the scope and depth of these intrusions, internet users specifically have many reasons to suspect that private information entered online is vulnerable to un-ethical intrusions by third parties. However, many groups and individuals have come together to bring resolution to the issue of personal privacy and national security. According to article 12 of the Universal Declaration of Human Rights, no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honor and reputation (Lachmayer 749). However, the more subtle aspects of the new counter-terrorism age include a heightened amount of internet surveillance, video surveillance of public spaces, electronic eavesdropping, and data retention. Additionally governments have access to bank accounts,...

Words: 2685 - Pages: 11

Premium Essay

Cloud Computing

...energy consumption. There are many questions which arise which can be Is cloud secure enough to of intruder attacks? Characteristics 1 Fast Cloud computing is a fast way of providing computing services as equipment (Hardware or Software) is provided within the service 2 Versatile Cloud Computing provides its users versatility as it isn’t focused on one same specific application, a cloud can provide many applications at a same time 3 Virtualization Users get their services from a virtual cloud instead of a visible matter; its services can access by its users through any kind of terminal and can complete tasks which couldn’t be done on a single system. 4 On demand service Cloud computing has a very scale of services pool its users has only to pay what resources they have used. 5 Cost...

Words: 1604 - Pages: 7

Premium Essay

Google Glasses

...The latest technology is causing controversy all over the world, the newest being the Google Glasses. The purpose of this is to show what the glasses are. There are parts of the world that are against the glasses, either by Google itself or the glasses. Then how Google has been at at the front of new technology. Even though people are just seeing the problems with privacy, it was there way before the glasses were even made. First the reader should know what the Glass looks like. According to Google, they have “adjustable nose pads and a frame that allows a one-size-fits-all offering and two extra nose pads are included. The display is said to have the appearance of a 25-inch HD screen viewed from eight feet away. As expected, image capture is a key feature, with 5MP stills and 720p video supported. Also integrated is 16GB of total flash memory, of which 12 GB is usable and synchronised with Google-supplied cloud storage.... The battery allows one day of typical use, but is reduced by power-hungry operations such as video capture.(Google)” If you wear regular prescription glasses, "‘The Glass design is modular, so you will be able to add frames and lenses that match your prescription,’ the Glass team said in a Google+ post. ‘We understand how important this is and we've been working hard on it.’(Albanesius)” Google+ is the social network work site within Google. “Google glasses that overlay the Internet on daily lives should hit the market in a little more than a year -- technology...

Words: 1336 - Pages: 6

Premium Essay

Cloud Computing

...Cloud Computing overview advantage and challenges Overview Silver Lining or storm ahead The future of cloud computing Effective use of cloud computing in education institutions Cloud Computing for beginner Cloud computing Challenges and future directions http://www.businesswire.com/news/home/20110622006602/en/Future-Cloud-Computing-Survey-Reveals-Drivers-Cloud Cloud Computing GAP Task Force http://inews.berkeley.edu/articles/Spring2009/cloud-computing Table of contents 2 0 Relevant Resources 4 0 Relevant Resources 4 1 General guidelines of community design 6 2 Attracting new members 7 2.1 Methods of persuasion of a potential user 7 2.2 Encouraging users to invite friends 8 2.3 Entry barrier 9 2.4 Guidance for new members 9 3 Structure of the community 12 3.1 Member profiles 12 3.2 Member connections 13 3.3 Adding connections 15 3.4 Member reputation 16 3.5 Paid membership 18 3.6 Fake members 18 3.7 Lurkers 18 4 Encouraging user participation 20 4.1 Using uniqueness 20 4.2 Using controversy 20 4.3 Using individual recognition 21 4.4 By discouraging low quality contributions (moderation) 21 4.5 Using goal setting 23 4.6 Using E-Mail notifications 24 4.7 By showing the activity of community 24 5 Stimulating Social Interactions 26 5.1 By common Interests 26 5.3 By common current life transitions 27 5.4 By shared experience 28 5.5 By shared education 29 5.6 By showing the distance 29 5.7 By service: Photo Albums 30 5.8 By service: Profile...

Words: 10086 - Pages: 41

Premium Essay

Cloud Computing

...overview advantage and challenges Overview Silver Lining or storm ahead The future of cloud computing Effective use of cloud computing in education institutions Cloud Computing for beginner Cloud computing Challenges and future directions http://www.businesswire.com/news/home/20110622006602/en/Future-Cloud-Computing-Survey-Reveals-Drivers-Cloud Cloud Computing GAP Task Force http://inews.berkeley.edu/articles/Spring2009/cloud-computing Table of contents 2 0 Relevant Resources 4 0 Relevant Resources 4 1 General guidelines of community design 6 2 Attracting new members 7 2.1 Methods of persuasion of a potential user 7 2.2 Encouraging users to invite friends 8 2.3 Entry barrier 9 2.4 Guidance for new members 9 3 Structure of the community 12 3.1 Member profiles 12 3.2 Member connections 13 3.3 Adding connections 15 3.4 Member reputation 16 3.5 Paid membership 18 3.6 Fake members 18 3.7 Lurkers 18 4 Encouraging user participation 20 4.1 Using uniqueness 20 4.2 Using controversy 20 4.3 Using individual recognition 21 4.4 By discouraging low quality contributions (moderation) 21 4.5 Using goal setting 23 4.6 Using E-Mail notifications 24 4.7 By showing the activity of community 24 5 Stimulating Social Interactions 26 5.1 By common Interests 26 5.3 By common current life transitions 27 5.4 By shared experience 28 5.5 By shared education 29 5.6 By showing the distance 29 5.7 By service: Photo Albums 30 5.8 By service: Profile watching 30 ...

Words: 10084 - Pages: 41

Premium Essay

Mr.Abed

...approach. This thesis summarizes information from various sources gathered on the subject 'cloud computing'. Firstly, it tracks back the evolution of technologies that paved the road for cloud computing and accelerated its further advancements. Secondly, it provides a high level overview of cloud computing technology stack and identifies service layers exposed via on-demand infrastructure. Lastly, it investigates various aspects of cloud computing and its impact on information technology. Any comments and thoughts on this thesis are highly appreciated and you can drop me a line at: tvaruzek@mail.muni.cz Keywords: Cloud computing, Virtualization, Innova.sk, Infrastructure as a Service, Platform as a Service, Amazon Web Services, Google Apps 3 Acknowledgments I would like to thank my supervisor Radek Ošlejšek for providing me the necessary help and guidance. I would like to express many thanks to my friends who helped me and supported me, especially to Rani for her support as well as Evka for saving me in the very last hours of writing of this thesis. And the very last, my thanks go to my parents who have been supporting me during my studies, my brother and my family. 4 Table of Contents 1 Acronyms and Abbreviations...........................................................................................................7...

Words: 14788 - Pages: 60

Premium Essay

Sopa and Pipa (Debate)

...PIPA. In the report, we will introduce the aims of the two bills and debate whether they are reasonable or not. In the end of discussion, we come to the conclusion that the two should not be passed. Both of the supporter and oppose will provide their reasons. And each of them will attack his/her rival’s argument. The aims of SOAP and PIPA The aim of SOPA The full name of SOPA is Stop Online Privacy Act. It is a United States bill which is attempt by lawmakers to combat online privacy and intellectual property theft. The bill is divided into two sections: “Combating Online Privacy” and “Additional Enhancements to Combat Intellectual Property Theft”. The main aim of SOPA is that give the judicial departments of United States more rights to fight online trafficking in copyrighted intellectual property and counterfeit goods in other areas and other countries. “Combating Online Privacy” attempts to provide tools to law enforcement. “Additional Enforcements to Combat Intellectual Property Theft” clarifies criminal law as applied to intellectual property rights. With the protection of SOPA, lawmakers want to encourage new writings, research, products and services. Because in the old day American inventors, authors, and entrepreneurs have been forced to stand by and watch as their works are stolen by foreign infringers beyond the reach of current U.S. law. As the time goes by, more and more people lose the drive of creating innovations. Therefore, United States is badly in need...

Words: 4572 - Pages: 19

Premium Essay

Cloud Computing

...Cloud computing Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. There are many types of public cloud computing:[1] Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a service (SaaS) Storage as a service (STaaS) Security as a service (SECaaS) Data as a service (DaaS) Database as a service (DBaaS) Test environment as a service (TEaaS) Desktop virtualization API as a service (APIaaS) Backend as a service (BaaS) In the business model using software as a service, users are provided access to application software and databases. The cloud providers manage the infrastructure and platforms on which the applications run. SaaS is sometimes referred to as “on-demand software” and is usually priced on a pay-per-use basis. Saas providers generally price applications using a subscription fee. Proponents claim that the SaaS allows a business the potential to reduce IT operational costs by outsourcing hardware and software maintenance and support to the cloud provider. This will enable a business to reallocate IT operations to focus on other IT goals. In addition, the application is hosted centrally, so updates can be released without users...

Words: 5808 - Pages: 24

Premium Essay

Edward Snowden: Hero Or Hero

...Edward Snowden was single handedly responsible for the largest hack in the digital age. He proved the National Security Agency was performing large scale surveillance on United States Citizens and other nations through Verizon telephone records, Google, and Facebook. In a world where a majority of Americans have a life online, this news of surveillance shook the world. And a 29 year old ex-spy for the Central Intelligence Agency and low-level contractor for Dell, Edward Snowden, was behind the leak. He has been named many different names, from hero to traitor. But what is he really? On the scale from traitor to hero, he falls in the middle, closer to the heroic side. The knowing population is divided in its stance in knowing who really is...

Words: 911 - Pages: 4

Premium Essay

Mg650 Managing Info. Tech. Enterprise

... TOPIC: INTERNET CHALLENGES TO PRIVACY Challenges is a way of testing your abilities in an interesting way, what I believe challenges always is a way of moving someone from one point to another or from one level to another. Challenges is a course of promoting our product and services. INTRODUCTION We use social media to electronically communicate with family, friends, customers, and business associates- using web sites for social networking and microblogging such as twitter, LinkedIn, face book, and Instagram. With social media you share and exchange information, ideas, pictures, and videos. The electronic communication strengthens both our personal and professional relationship and all these communications need privacy. Normally privacy can be define as the condition or quality of being private from the occurrence of others. In our days, internet has face different challenges to protect the privacy of its customers. Information passes in different computer systems before reaches the ending target. And every each systems is required to be monitored, capture, and store communications that go by through it. For example there are tiny files set down on a computer called cookies. When a user visits certain website it recognize the visitor. Cookies and other web monitoring tools closely track the activities of the web site visitors. Internet technology has posed new challenges for the protection of individual privacy. Information sent over this vast...

Words: 2199 - Pages: 9

Premium Essay

Sterile Technology

...Farren and Gibb are correct when they say that the only things we can do about surveillance technologies is to get use to them. The advancement of the technology has come so far as to make it all but impossible to contain it. In a larger context this is because we depend on it in the first place. This dependence is encouraged by our own use of surveillance, tracking technologies and our voyeuristic desire to see ourselves and others. The need of these technologies in the commercial and governmental sectors is insatiable. The commercial aspect can be anything from security for your home to selling products on the internet. The desire for more information about consumers drives businesses to seek out more direct ways to target their customers and sell more products. This can be something as simple and personal as recommendations from websites such as Amazon, or Netflix (p. 42, Farren &ump; Gibb, 2007). Super markets use club/loyalty cards which provide discounts in exchange for tracking a person's or households purchases. All of these purchases are matched up to someones name and address. This information can than be cross checked with other records that can form an image of a person (p. 41, Farren &ump; Gibb, 2007) . This data can be sold or mined and reconfigured, it has even provided a tool to be used for political purposes. The political side of consumer purchases allow for direct targeting by political parties such as the Bush campaign in 2004 (p. 43, Farren &ump; Gibb, 2007)...

Words: 1670 - Pages: 7

Premium Essay

Cloud Computing

...Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of „cloud computing‟. The two key advantages of this model are easeof-use and cost-effectiveness. Though there remain questions on aspects such as security and vendor lock-in, the benefits this model offers are many. This paper explores some of the basics of cloud computing with the aim of introducing aspects such as: Realities and risks of the model Components in the model Characteristics and Usage of the model The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs. An Overview Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage. With the advent of this technology, the cost of computation, application hosting, content storage and delivery is reduced significantly. Cloud computing is a practical approach to experience direct cost benefits and it has the potential to transform a data center from a capital-intensive set up to a variable priced environment. The idea of cloud computing is based on a very fundamental principal of „reusability of IT capabilities'. The difference that cloud computing brings compared to traditional concepts of “grid computing”, “distributed computing”, “utility computing”, or “autonomic computing”...

Words: 1441 - Pages: 6

Premium Essay

Characteristics Of Big Data

...INTRODUCTION Big data is described as complex data collections that has very large size beyond the capability of traditional tools to capture, manage and process it efficiently. It is also use in many ways where it usually refers to both of data that being managed and used to store and process it by the technology which it helps to deduce different types of results using the same data that being stored intentionally or unintentionally. There are three characteristics of big data which are volume, velocity and variety. When it comes to volume, the name of big data itself indicates that it is related to its enormous size. Nowadays, data is being produced by networks, machine as well as system such as social media which this is use by human...

Words: 1009 - Pages: 5