BLINDSPOT: Enabling Bystander-Controlled Privacy Signaling for Camera-Enabled Devices
- URL: http://arxiv.org/abs/2512.14746v1
- Date: Fri, 12 Dec 2025 19:12:04 GMT
- Title: BLINDSPOT: Enabling Bystander-Controlled Privacy Signaling for Camera-Enabled Devices
- Authors: Jad Al Aaraj, Athina Markopoulou,
- Abstract summary: We present BlindSpot, an on-device system that enables bystanders to manage their own privacy by signaling their privacy preferences in real-time.<n>Our main contribution is the design and comparative evaluation of three distinct signaling modalities.<n>We implement the complete system (BlindSpot) on a commodity smartphone and conduct a comprehensive evaluation of each modality's accuracy and latency.
- Score: 1.713098606679826
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Camera-equipped mobile devices, such as phones, smart glasses, and AR headsets, pose a privacy challenge for bystanders, who currently lack effective real-time mechanisms to control the capture of their picture, video, including their face. We present BlindSpot, an on-device system that enables bystanders to manage their own privacy by signaling their privacy preferences in real-time without previously sharing any sensitive information. Our main contribution is the design and comparative evaluation of three distinct signaling modalities: a hand gesture mechanism, a significantly improved visible light communication (VLC) protocol, and a novel ultra-wideband (UWB) communication protocol. For all these modalities, we also design a validation mechanism that uses geometric consistency checks to verify the origin of a signal relative to the sending bystander, and defend against impersonation attacks. We implement the complete system (BlindSpot) on a commodity smartphone and conduct a comprehensive evaluation of each modality's accuracy and latency across various distances, lighting conditions, and user movements. Our results demonstrate the feasibility of these novel bystander signaling techniques and their trade-offs in terms of system performance and convenience.
Related papers
- Interpretable Multimodal Gesture Recognition for Drone and Mobile Robot Teleoperation via Log-Likelihood Ratio Fusion [14.332919759770645]
Vision-based gesture recognition has been explored as one method for hands-free teleoperation.<n>We propose a multimodal gesture recognition framework that integrates inertial data from Apple Watches on both wrists with capacitive sensing signals from custom gloves.<n>We show that our framework achieves performance comparable to a state-of-the-art vision-based baseline.
arXiv Detail & Related papers (2026-02-27T05:52:04Z) - Privacy-Preserving Covert Communication Using Encrypted Wearable Gesture Recognition [0.0]
This work proposes a privacy-preserving gesture-based covert communication system.<n>The system employs a multi-party homomorphic learning pipeline for gesture recognition directly over encrypted motion data.<n>To our knowledge, this work is the first to apply encrypted gesture recognition in a wearable-based covert communication setting.
arXiv Detail & Related papers (2026-02-08T12:06:01Z) - CONTEX-T: Contextual Privacy Exploitation via Transformer Spectral Analysis for IoT Device Fingerprinting [0.8164433158925591]
The rapid expansion of internet of things (IoT) devices have created a pervasive ecosystem where encrypted wireless communications serve as the primary privacy and security protection mechanism.<n>While encryption effectively protects message content, packet metadata and statistics inadvertently expose device identities and user contexts.<n>This paper presents CONTEX-T, a novel framework that exploits contextual privacy vulnerabilities using spectral representation of encrypted wireless traffic for IoT device characterization.
arXiv Detail & Related papers (2026-01-22T18:03:34Z) - Adversary-Aware Private Inference over Wireless Channels [51.93574339176914]
AI-based sensing at wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.<n>As sensitive personal data can be reconstructed by an adversary, transformation of the features are required to reduce the risk of privacy violations.<n>We propose a novel framework for privacy-preserving AI-based sensing, where devices apply transformations of extracted features before transmission to a model server.
arXiv Detail & Related papers (2025-10-23T13:02:14Z) - Finding Phones Fast: Low-Latency and Scalable Monitoring of Cellular Communications in Sensitive Areas [6.422892494095325]
Low-latency systems are crucial to allow for timely detection, decision (e.g., geofencing or localization) and disruption of unauthorized communication in sensitive areas.<n>We propose LTag, the first low-latency, operator-independent and scalable system designed to monitor cellular connections across all operators prior to any user data transmission.
arXiv Detail & Related papers (2025-09-29T19:39:12Z) - Privacy-Preserving Secure Neighbor Discovery for Wireless Networks [0.0]
Traditional Neighbor Discovery (ND) and Secure Neighbor Discovery (SND) are key elements for network functionality.<n>We present a novel Privacy-Preserving Secure Neighbor Discovery (PP-SND) protocol, enabling devices to perform SND without revealing their actual identities and locations.
arXiv Detail & Related papers (2025-03-28T08:27:47Z) - Privacy-Preserving Gesture Tracking System Utilizing Frequency-Hopping RFID Signals [1.178454425594117]
This study aims to develop a gesture tracking system based on frequency hopping RFID signals.<n>By introducing frequency hopping technology, we have designed a mechanism that prevents potential eavesdroppers from obtaining raw RFID signals.
arXiv Detail & Related papers (2024-12-05T08:51:02Z) - Collaborative Inference over Wireless Channels with Feature Differential Privacy [57.68286389879283]
Collaborative inference among multiple wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.
transmitting extracted features poses a significant privacy risk, as sensitive personal data can be exposed during the process.
We propose a novel privacy-preserving collaborative inference mechanism, wherein each edge device in the network secures the privacy of extracted features before transmitting them to a central server for inference.
arXiv Detail & Related papers (2024-10-25T18:11:02Z) - Agile gesture recognition for capacitive sensing devices: adapting
on-the-job [55.40855017016652]
We demonstrate a hand gesture recognition system that uses signals from capacitive sensors embedded into the etee hand controller.
The controller generates real-time signals from each of the wearer five fingers.
We use a machine learning technique to analyse the time series signals and identify three features that can represent 5 fingers within 500 ms.
arXiv Detail & Related papers (2023-05-12T17:24:02Z) - mmSense: Detecting Concealed Weapons with a Miniature Radar Sensor [2.963928676363629]
mmSense is an end-to-end portable miniaturised real-time system that can accurately detect the presence of concealed metallic objects on persons.
mmSense features millimeter wave radar technology, provided by Google's Soli sensor for its data acquisition, and TransDope, our real-time neural network, capable of processing a single radar data frame in 19 ms.
arXiv Detail & Related papers (2023-02-28T15:06:03Z) - Privacy-Preserving Action Recognition via Motion Difference Quantization [22.31448780032675]
This paper proposes a simple, yet robust privacy-preserving encoder called BDQ.
It is composed of three modules: Blur, Difference, and Quantization.
Experiments on three benchmark datasets show that the proposed encoder design can achieve state-of-the-art trade-off.
arXiv Detail & Related papers (2022-08-04T05:03:27Z) - PrivHAR: Recognizing Human Actions From Privacy-preserving Lens [58.23806385216332]
We propose an optimizing framework to provide robust visual privacy protection along the human action recognition pipeline.
Our framework parameterizes the camera lens to successfully degrade the quality of the videos to inhibit privacy attributes and protect against adversarial attacks.
arXiv Detail & Related papers (2022-06-08T13:43:29Z) - A Wireless-Vision Dataset for Privacy Preserving Human Activity
Recognition [53.41825941088989]
A new WiFi-based and video-based neural network (WiNN) is proposed to improve the robustness of activity recognition.
Our results show that WiVi data set satisfies the primary demand and all three branches in the proposed pipeline keep more than $80%$ of activity recognition accuracy.
arXiv Detail & Related papers (2022-05-24T10:49:11Z) - SPAct: Self-supervised Privacy Preservation for Action Recognition [73.79886509500409]
Existing approaches for mitigating privacy leakage in action recognition require privacy labels along with the action labels from the video dataset.
Recent developments of self-supervised learning (SSL) have unleashed the untapped potential of the unlabeled data.
We present a novel training framework which removes privacy information from input video in a self-supervised manner without requiring privacy labels.
arXiv Detail & Related papers (2022-03-29T02:56:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.