The Bright and Dark Sides of Computer Vision:
Challenges and Opportunities for Privacy and Security
(CV-COPS 2018)


Salt Lake City, Utah — Friday June 22, 2018

In conjunction with the 2018 IEEE Conference on Computer Vision and Pattern Recognition

News and Updates

  • Mar 31: Extended abstract deadline is now April 15.
  • Mar 20: We anticipate being able to offer a limited number of student travel grants. Check back later for details!
  • Mar 7: Due to several requests, we've extended the full paper submission deadline until March 20.
  • Feb 9: Call for papers released! Please consider submitting a full paper or extended abstract.
  • Dec 4: Workshop accepted at CVPR! We'll post more details here soon.

Overview

Computer vision is finally working in the real world, but what are the consequences on privacy and security? For example, recent work shows that vision algorithms can spy on smartphone keypresses from meters away, steal information from inside homes via hacked cameras, exploit social media to de-anonymize blurred faces, and reconstruct images from features like SIFT. Vision could also enhance privacy and security, for example through assistive devices for people with disabilities, phishing detection techniques that incorporate visual features, and image forensic tools. Some technologies present both challenges and opportunities: biometrics techniques could enhance security but may be spoofed, while surveillance systems enhance safety but create potential for abuse.

We need to understand the potential threats and opportunities of vision to avoid creating detrimental societal effects and/or facing public backlash. Following up on last year's very successful workshop at CVPR 2017, this workshop will continue to explore the intersection between computer vision and security and privacy to address these issues.

Call for Papers and Extended Abstracts

We welcome original research papers and extended abstracts on topics including, but not limited to:

  • Computer vision-based security and privacy attacks
  • Biometric spoofing, defenses and liveness detection
  • Impact of ubiquitous cameras on society
  • Captchas and other visual Turing tests for online security
  • Privacy of visual data
  • Privacy-preserving visual features and representations
  • Reversibility of image transformations
  • Secure/encrypted computer vision and image processing
  • Wearable camera privacy
  • Attacks against computer vision systems
  • Copyright violation detection
  • Counterfeit and forgery detection
  • Privacy implications of large-scale visual social media
  • Other relevant topics


Research papers should contain original, unpublished research, and be 4-8 pages (excluding references). Research papers will be published in the CVPR Workshop Proceedings and archived on IEEE eXplore and the Computer Vision Foundation websites.

Extended abstracts about preliminary, ongoing or published work should be up to 2 pages (including references). Extended abstracts will be published and archived on this website.

All submissions should be anonymized and will undergo double-blind peer review. Papers and abstracts must be formatted according to the CVPR guidelines and submitted via the Conference Management Toolkit website. Accepted submissions will be invited for oral or poster presentation at the workshop.

Full Paper Submission Deadline: March 9 March 20, 11:59PM Pacific Daylight Time (PDT), via CMT.
Author Notification Date: April 2
Extended Abstract Deadline: April 1 April 15, 11:59PM Pacific Daylight Time (PDT), via CMT.
Camera ready deadline: April 15, 11:59PM PDT

Organizers

David Crandall

David Crandall
Indiana University

Jan-Michael Frahm

Jan-Michael Frahm
University of North Carolina at Chapel Hill

Mario Fritz

Mario Fritz
MPI Informatics

Apu Kapadia

Apu Kapadia
Indiana University

Vitaly Shmatikov

Vitaly Shmatikov
Cornell Tech

Program Committee

Eshan Adeli

Ehsan Adeli
Stanford University

Tousif Ahmed

Tousif Ahmed
Indiana University

Lujo Bauer

Lujo Bauer
Carnegie Mellon University

Vishnu Boddeti

Vishnu Boddeti
Michigan State University

Terrance Boult

Terrance Boult
University of Colorado - Colorado Springs

Karla Brkić

Karla Brkić
University of Zagreb

Ayan Chakrabarti

Ayan Chakrabarti
Washington University in St. Louis

Cunjian Chen

Cunjian Chen
Michigan State University

Moustapha Cissé

Moustapha Cissé
Facebook Artificial Intelligence Research

Anupam Das

Anupam Das
Carnegie Mellon University

Bill Freeman

Bill Freeman
Massachusetts Institute of Technology

Timnit Gebru

Timnit Gebru
Microsoft Research

Roberto Hoyle

Roberto Hoyle
Oberlin College

Suman Jana

Suman Jana
Columbia University

Sanjeev Koppal

Sanjeev Koppal
University of Florida

Ashwin Machanavajjhala

Ashwin Machanavajjhala
Duke University

Emanuela Marasco

Emanuela Marasco
George Mason University

Fabian Monrose

Fabian Monrose
University of North Carolina at Chapel Hill

Seong Joon Oh

Seong Joon Oh
MPI Informatics

Nicolas Papernot

Nicolas Papernot
Pennsylvania State University

True Price

True Price
University of North Carolina at Chapel Hill

Raymond Ptucha

Raymond Ptucha
Rochester Institute of Technology

Gang Qian

Gang Qian
ObjectVideo Labs

Michael Ryoo

Michael Ryoo
Indiana University

Karl Ricanek Jr.

Karl Ricanek Jr.
University of North Carolina at Wilmington

Yoichi Sato

Yoichi Sato
University of Tokyo

Luke Stark

Luke Stark
Dartmouth College

Qianru Sun

Qianru Sun
MPI Informatics

Robert Templeman

Robert Templeman
U.S. Navy

Tom Yeh

Tom Yeh
University of Colorado at Boulder

Ryo Yonetani

Ryo Yonetani
University of Tokyo