This invention relates to a technique for preventing unauthorized recording.
Electronic voyeurism, as used herein constitutes the act of making an unauthorized recording of a subject (i.e., a victim) by a person (i.e., a “voyeur”). Such unauthorized recording by the voyeur can comprise the recording of audio, video, audio-video, or even the taking of a still picture by means of a recording device. Such recording devices can take any form, such as a cellular camera phone, a personal data assistance (PDA), or other types of devices, wireless or otherwise, that possess the ability to record audio and/or video and/or to capture still images. Thus, for purposes of discussion, image capture devices such as digital cameras constitute recording devices. As electronic recording devices have become smaller in size, the ability of a victim to detect surreptitious recording by such devices has become commensurately more difficult. Many jurisdictions have laws and regulations that afford individuals a zone of privacy, even in a public space. In addition, many jurisdictions afford individuals an exclusive right to their image. Surreptitious recording of victims and the subsequent publication of such recordings can not only subject such victims to unwanted publicity or embarrassment, but can also constitute a breach of the victims' right to privacy.
As an example of such an unauthorized surreptitious recording, consider a voyeur who uses a mobile phone with integrated high resolution camera and high quality microphone, in a semi-public environment, such as a locker room, public rest-room, or a sauna, to record images of the victim in a state of undress. Unwanted publication such images could expose the victim to significant embarrassment for which no amount of economic recovery could compensate.
Within the prior art, several proposals exist to inhibit unauthorized use of electronic recording devices. One suggested approach relies upon the introduction of “nuisance signals” which interact in specific ways with the recording device. One approach utilized to interfere with undesired mobile or cellular communications, and in particular, unauthorized recording, relies on the broadcast of a nuisance signal (in this case, radio frequency noise in the cellular frequency range) that will jam the cellular device and alter the quality of the useful signal received thereby, which will not always affect recording.
This approach does not rely on the presence of the recording device, and thus constitutes a passive approach because of continuous transmission of the jamming signal. Moreover, this approach generally defeats all useful signaling within the targeted frequency range, including any signaling during an emergency. Moreover, generating such nuisance signals typically require license from the appropriate governmental authority depending on the signal strength. In addition, this approach does not serve to defeat unauthorized or audio recording or photography because any nuisance signal needed to interfere with such recording would likely fall within the ranges of human hearing and vision, respectively, and be considered objectionable by most individuals.
Another approach to restricting unauthorized recording involves altering a displayed video image in such a way that the interaction of the altered video image and the recording device yields a recording of unacceptable quality. This approach serves as the basis for many of the camcorder-defeat technologies for prohibiting unauthorized recording of theatrical film. With many of the camcorder-defeat technologies, the displayed image contains distortions introduced in such a way that they appear generally imperceptible to humans but they deteriorate the quality of a recording by introducing nuisance signals detected by the camcorder.
The above-described approaches require selection of a nuisance signal in accordance with the specific characteristics of the recording device. Thus, such approaches degrade the user experience. However, because the degradation strategy depends upon the characteristics of the recording device, modifications to the recording device can negate the presence of the nuisance signal. For example, the use of visible or electronic filters which detect and correct for the nuisance signal could allow recording of an acceptable copy despite the presence of the nuisance signal. Moreover, the above-described approach does not operate in response to the actual presence of an unwanted recording device.
More recently, a system has been proposed which enables the recording device to operate in response to attention clues from a potential victim indicative of whether or not he or she authorizes recording. For example, if the recording device detects a smile or other favorable expression from the victim signifying consent to the recording, the device would allow recording by the voyeur at that moment. The operation of such recording devices relies on a challenging hypothesis; namely that algorithms exist which possess the necessary sophistication to interpret human clues that signally consent to recording. Further, the voyeur could easily defeat this approach by waiting for any attention clues to disappear that prevent recording.
A number of other systems have been proposed to alter the recording devices in such a way to prevent recording of a victim's private information. One approach requires the victim carry a transmitter that broadcasts a signal to alert a recording device that the victim does not consent to being recorded or photographed. The detection of such signal by the recording device triggers algorithms that render unrecognizable critical body parts of the victim such as the face. This proposed approach suffers from the limitation that the victim must wear some kind of transmitter to prevent recording.
A variant of the previous approach enables the victim to signal his or her willingness to be photographed by transmitting a first signal (i.e., a “photograph” signal) which would enable any recording device to record the victim. Alternatively, if the victim chooses not to be photographed, the victim would transmit a second signal (i.e., a “paparazzi” signal) which would prevent the recording device from recording. This approach incurs a number of difficulties. First, the victim must carry a compliant transmitter, and must remember to set the transmitter in the proper transmission mode (“photograph” or “paparazzi”). Second, in the event that two victims come into proximity with each other and appear as one in the field of capture of the voyeur's recording device, the voyeur could make a recording as long as one of the two victims broadcasts a “photograph” signal, despite the “paparazzi” signal broadcast by the other victim. Third, the presence of a victim broadcasting a “paparazzi” signal could impede the voyeur from operating his or her recording device in a legitimate manner.
A variant of the above-described approach proposes to automatically detect “hot spots” in an image, such as a victim's face, upon activation of the zoom function of a visual recording device, such as a camcorder or digital still camera. The image of tie victim's face then undergoes automatic darkening by the recording device using simple pixel manipulation. This approach incurs certain limitations. First, this approach impairs taking the picture of some one who willingly wants his or her picture taken. Second, a voyeur can easily defeat this technique by making sure the victim's image appears out of locus. Under such conditions, the recording device probably would lack the ability to detect the victim's face, thereby avoiding pixel darkening. After taking the picture, the voyeur could make use commonly available photo software to reconstitute the crispness of the victim's face.
Thus, a need exists for a technique that provides a victim with protection against unauthorized recording, and enables any institution hosting the potential victim to reliably assert that potential victims enjoy protection against unauthorized recording. In other words, a need exists for a technique can detect the presence of a voyeur's recording device and to alert the victim or the institution hosting the victim accordingly, and/or to prevent the voyeur's recording device from recording.
Briefly, in accordance with a first aspect of the present principles, there is provided a method for communicating recording restrictions to a recording device. The method comprises the step of broadcasting, within a defined environment a recording device restriction signal for reception by a recording device. The broadcasted signal serves to alert the recording device of one or more recording restrictions in the defined environment.
In accordance with another aspect of the invention, there is provided a method for alerting a monitoring system of the presence of at least one recording device in a monitored environment. The method comprises the step of broadcasting from the recording device a recording device presence signal that alerts monitoring system of the presence of the recording device.
In accordance with yet another aspect of the present principles, the presence of a recording device within the monitored environment, as detected by a monitoring system can trigger one or more responses. For example, upon detecting the presence of recording device presence signal from at least one device in the monitored environment, the monitoring system broadcast an alert, typically in the form or either an aural and/or visual signal, to alert potential victims of the presence of such recording devices. In addition to, or in place of generating a warning signal, the monitoring system could generate a recording device inhibit signal, which, upon receipt of the recording device, would inhibit recording.
In accordance with the present principles, the use of a monitoring system serves to address the problem of unauthorized recording of a victim by an electronic voyeur. The monitoring system can broadcast a recording device restriction signal alert to a recording device of recording restrictions. In place of or in addition to broadcasting a recording device restriction signal, the monitoring system can broadcast a recording device disable signal that will inhibit a recording device from recording. In place of, or in addition to, either alerting and/or disabling a recording device, the monitoring system can detect the presence of a recording device and generate a warning to potential victims who do not want to be recorded.
Typically, although not necessarily, receive-compliant recording devices will possess an indicator for providing a visual or sensory indication of a recording restriction that exists within the monitored environment 100. For example, a receive-compliant recording device could include a light or other type of for indicating receipt of a recording device restriction signal. A receive-compliant recording device could generate an auditory signal or generate a vibration to indicate receipt of a recording device restriction signal. Receive-compliant recording devices can include, but are not limited to, cellular telephones with cameras and/or audio microphones, personal data assistant (PDA) devices with audio and/or video capture capability, audio: recorders, video recorders, digital still cameras and the like.
In response to the recording device restriction signal broadcast by the monitoring system 100 of
The recording device restriction signal transmitted by the monitoring system 100 to indicate recording restrictions can comprise an auditory signal, a visible light, an invisible light (e.g., infrared light), a radio-frequency signal, a wireless signal, and/or any 25 combination of such signals. As a general rule, radio frequency or wireless signals likely will prove most versatile because auditory and visible light signals lie within the range of human perception and likely will not prove generally acceptable. Moreover, the transmission of auditory and light signals from a recording device can cause interference, and “shadow” deficiencies as compared to transmitting radio-frequency and wireless signals.
The recording device restriction signal could have different characteristics to indicate different recording restrictions. For example, the recording device restriction signal could indicate to a receive-compliant recording device of the existence of restriction against all recording. A recording device restriction signal with different characteristics could indicate a restriction against video and still image capture, but no restriction against audio recording.
Upon receipt of the recording device restriction signal from the monitoring system 100, each of the recording devices could have the obligation to acknowledge receipt of such a signal by way of an audio signal, a visual signal, an audio visual signal, a radio frequency or wireless signal, or any combination of the above. Such an acknowledgement signal would indicate that some or all the recording capabilities of the compliant recording device no longer remain operative. Note that receipt of the acknowledgement signal by the monitoring system 100 does not constitute all essential feature of the present principles. However, receipt of an acknowledgement from a particular recording device at the monitoring system 100 could constitute legal proof that the recording device sought to comply with the recording restrictions then in existence within the monitored environment 300.
Rather than simply send an acknowledgement signal, each recording device of
The recording device presence signal broadcast by the recording device 200 of
In response to receipt of the recording device presence signal from the transmit-compliant recording device 200, the monitoring system 100 typically will generate a warning 400 to alert potential victims of the presence of the recording device within the monitored environment 300. The warning could take the form of an auditory signal, such as a single frequency tone modulated or not, a buzzer, a bell, or even a voice message, or a combination of such signals. Other auditory signals are also possible. Also, the warning could take the form of a visual signal, such as a light or image for example. Indeed, the warning could take other forms, e.g., an e-mail or a telephone call to potential victims within the monitored environment 300. The warning 400 could also take the form of a disruption to the monitored environment, such as but not limited to, the dimming of lights or the broadcast of recording device restriction signal that would interfere with the recording quality of the recording device.
Upon receipt of the recording device present signal from the transmit-compliant recording device 200, the monitoring system 100 of
The recording device disable signal from the monitoring system 100 of
Furthermore, the recording device disable signal broadcast by the monitoring system 100 to the recording device 200 of
In response to the recording device presence signal from the recording device 200, the monitoring system of
The monitoring process described above with respect to
Each of recording devices 2001-2004 of the present principles, in addition to being receive-compliant, transmit compliant, and/or duplex compliant, could also possess the ability to act as a repeater to relay a signal between monitoring system 100 and another device. Thus, for example, a recording device could relay a recording device restriction signal from the monitoring system 100 to another recording device. By the same token, a recording device also could relay a recording device presence signal from another recording device to the monitoring system.
The monitoring system 100 of
The monitoring techniques described with respect to
The foregoing describes a technique addressing the problem of unauthorized recording of a victim by an electronic voyeur.
This application claims priority under 35 U.S.C. 119(e) to U.S. Provisional Patent Application Ser. No. 60/653,172 filed Feb. 15, 2004, the teachings of which are incorporated herein.
Number | Date | Country | |
---|---|---|---|
60653172 | Feb 2005 | US |