TY - GEN
T1 - An Empirical Study on Perceptually Masking Privacy in Graph Visualizations
AU - Chou, Jia Kai
AU - Bryan, Chris
AU - Li, Jing
AU - Ma, Kwan Liu
N1 - Funding Information: This research is supported in part by the U.S. National Science Foundation through grant IIS-1320229 and IIS-1741536.
PY - 2019/5/7
Y1 - 2019/5/7
N2 - Researchers such as sociologists create visualizations of multivariate node-link diagrams to present findings about the relationships in communities. Unfortunately, such visualizations can inadvertently expose the ostensibly private identities of the persons that make up the dataset. By purposely violating graph readability metrics for a small region of the graph, we conjecture that local, exposed privacy leaks may be perceptually masked from easy recognition. In particular, we consider three commonly known metrics∗edge crossing, node clustering, and node-edge overlapping∗as a strategy to hide leaks. We evaluate the effectiveness of violating these metrics by conducting a user study that measures subject performance at visually searching for and identifying a privacy leak. Results show that when more masking operations are applied, participants needed more time to locate the privacy leak, though exhaustive, brute force search can eventually find it. We suggest future directions on how perceptual masking can be a viable strategy, primarily where modifying the underlying network structure is unfeasible.
AB - Researchers such as sociologists create visualizations of multivariate node-link diagrams to present findings about the relationships in communities. Unfortunately, such visualizations can inadvertently expose the ostensibly private identities of the persons that make up the dataset. By purposely violating graph readability metrics for a small region of the graph, we conjecture that local, exposed privacy leaks may be perceptually masked from easy recognition. In particular, we consider three commonly known metrics∗edge crossing, node clustering, and node-edge overlapping∗as a strategy to hide leaks. We evaluate the effectiveness of violating these metrics by conducting a user study that measures subject performance at visually searching for and identifying a privacy leak. Results show that when more masking operations are applied, participants needed more time to locate the privacy leak, though exhaustive, brute force search can eventually find it. We suggest future directions on how perceptual masking can be a viable strategy, primarily where modifying the underlying network structure is unfeasible.
KW - Human-centered computing
KW - Visualization
KW - Visualization design and evaluation methods
UR - http://www.scopus.com/inward/record.url?scp=85066411763&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85066411763&partnerID=8YFLogxK
U2 - 10.1109/VIZSEC.2018.8709181
DO - 10.1109/VIZSEC.2018.8709181
M3 - Conference contribution
T3 - 2018 IEEE Symposium on Visualization for Cyber Security, VizSec 2018
BT - 2018 IEEE Symposium on Visualization for Cyber Security, VizSec 2018
A2 - Trent, Stoney
A2 - Kohlhammer, Jorn
A2 - Sauer, Graig
A2 - Gove, Robert
A2 - Best, Daniel
A2 - Paul, Celeste Lyn
A2 - Prigent, Nicolas
A2 - Staheli, Diane
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 IEEE Symposium on Visualization for Cyber Security, VizSec 2018
Y2 - 22 October 2018
ER -