Steven Hill, Zhimin Zhou, Lawrence Saul and Hovav Shacham
In many online communities, it is the norm to redact names and other sensitive text from posted screenshots. Sometimes solid bars are used; sometimes a blur or other image transform is used. We consider the effectiveness of two popular image transforms - mosaicing (also known as pixelization) and blurring - for redaction of text. Our main finding is that we can use a simple but powerful class of statistical models - so-called hidden Markov models (HMMs) - to recover both short and indefinitely long instances of redacted text. Our approach borrows on the success of HMMs for automatic speech recognition, where they are used to recover sequences of phonemes from utterances of speech. Here we use HMMs in an analogous way to recover sequences of characters from images of redacted text. We evaluate an implementation of our system against multiple typefaces, font sizes, grid sizes, pixel offsets, and levels of noise. We also decode numerous real-world examples of redacted text. We conclude that mosaicing and blurring, despite their widespread usage, are not viable approaches for text redaction.
William Melicher, Mahmood Sharif, Joshua Tan, Lujo Bauer, Mihai Christodorescu and Pedro Giovanni Leon
. Privacy, trust, and self-disclosure online. Human- Computer Interaction, 25(1):1-24, 2010.
 A. Lambrecht and C. Tucker. When does retargeting work? Information specificity in online advertising. Journal of Marketing Research, 2013.
 P. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, and L. Cranor. Why Johnny can’t opt out: A usability evaluation of tools to limit online behavioral advertising. In Proc. CHI, 2012.
 P. G. Leon, B. Ur, Y. Wang, M. Sleeper, R. Balebako, R. Shay, L. Bauer, M. Christodorescu, and L. F
David Gugelmann, Markus Happe, Bernhard Ager and Vincent Lenders
. Madhyastha, and V. Sekar. Understanding website complexity: Measurements, metrics, and implications. In Proc. IMC ’11 , pages 313–328, 2011.
 R. Cookson. Google, Microsoft and Amazon pay to get around ad blocking tool. Financial Times (2015-02-01), http://www.ft.com/cms/s/0/80a8ce54-a61d-11e4-9bd3-00144feab7de.html . Accessed: 2015-02-15.
 M. E. Crovella and A. Bestavros. Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans. Netw. , 5(6):835–846, 1997.
 J. Demšar, T. Curk, A. Erjavec, Črt Gorup, T. Hočevar
Amit Datta, Michael Carl Tschantz and Anupam Datta
. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, “Scikit-learn: Machine learning in Python,” Journal of Machine Learning Research, vol. 12, pp. 2825-2830, 2011.
 E. Jones, T. Oliphant, P. Peterson et al., “SciPy: Open source scientific tools for Python,” 2001, http://www.scipy.org/.
 M. C. Tschantz, A. Datta, A. Datta, and J. M. Wing, “A methodology for information flow experiments,” ArXiv, Tech. Rep. arXiv:1405.2376v1, 2014.
 P. Good, Permutation, Parametric and
. Cox, “A Hacker Claims to Have Leaked 40GB of Docs on Government Spy Tool FinFisher,” Aug. 2014. [Online]. Available: http://motherboard.vice.com/read/a-hacker-claims-to-have-leaked-40gb-of-docs-on-government-spy-tool-finfisher
 A. Greenberg, “Hacking Team Breach Shows a Global Spying Firm Run Amok,” Jul. 2015. [Online]. Available: https://www.wired.com/2015/07/hacking-team-breach-shows-global-spying-firm-run-amok/
 FinFisher, “Remote Monitoring & Infection Solutions: FinFly ISP,” Spy Files, 2011, accessed: 30-August-2016. [Online]. Available
Mojtaba Eskandari, Bruno Kessler, Maqsood Ahmad, Anderson Santana de Oliveira and Bruno Crispo
Tool. http://developer.android.com/tools/ help/monkey.html, 2015.
 Ben Gruver. Smali/Baksmali Tool. https://github.com/JesusFreke/smali/wiki, 2015.
 Dominik Herrmann and Jens Lindemann. Obtaining personal data and asking for erasure: Do app vendors and website owners honour your privacy rights? CoRR, abs/1602.01804, 2016.
 Paul De Hert and Vagelis Papakonstantinou. The proposed data protection Regulation replacing Directive 95/46/EC: A sound system for the protection of individuals. Computer Law & Security
Detecting Relationships Through Large-scale Photo Analysis
Yan Shoshitaishvili, Christopher Kruegel and Giovanni Vigna
, 1997. Proceedings., 1997 IEEE Computer Society Conference on, pages 130-136. IEEE, 1997.
 B. Rouberol. Comparison of face detection tools. http://bit.ly/1olWs4n.
 H. A. Rowley, S. Baluja, and T. Kanade. Neural networkbased face detection. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 20(1):23-38, 1998.
 M. Turk and A. Pentland. Eigenfaces for recognition. Journal of cognitive neuroscience, 3(1):71-86, 1991.
 T. Verge. The new Snapchat brilliantly mixes video and texting
: a free network mapping and security scanning tool. http://nmap.org/ .
 S.B. Moon, P. Skelly, and D. Towsley. Estimation and removal of clock skew from network delay measurements. In Proceedings of the 18th Annual IEEE International Conference on Computer Communications (INFOCOM) , pages 227–234, 1999.
 Keaton Mowery and Hovav Shacham. Pixel perfect: Fingerprinting canvas in HTML5. In Proceedings of Web 2.0 Security and Privacy Workshop (W2SP) , 2012.
 Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker
Susan E. McGregor, Franziska Roesner and Kelly Caine
-generation onion router,” in Proceedings of the 13th USENIX Security Symposium, 2004.
 N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg, and M. Smith, “SoK: Secure Messaging,” in Proceedings of the IEEE Symposium on Security and Privacy, 2015.
 M. Brennan, K. Metzroth, and R. Stafford, “Building Effective Internet Freedom Tools: Needfinding with the Tibetan Exile Community,” in 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
 Internews Center for Innovation & Learning