Targeted obstrufication of an image

ABSTRACT

Embodiments include a system, a device, an apparatus, a method, and a computer program product. An embodiment provides a device that includes an anonymization module operable to produce in response to an anonymization policy an anonymized image by causing a reduction in fidelity of a feature of a subject depicted in a received image. The device also includes a communications module operable to send a signal indicative of the anonymization policy.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is related to and claims the benefit of theearliest available effective filing date(s) from the following listedapplication(s) (the “Related Applications”) (e.g., claims earliestavailable priority dates for other than provisional patent applicationsor claims benefits under 35 USC §119(e) for provisional patentapplications, for any and all parent, grandparent, great-grandparent,etc. applications of the Related Application(s)).

RELATED APPLICATIONS

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation-in-part of U.S. patentapplication Ser. No. 11/701,527, entitled IMAGE ANONYMIZATION, namingEDWARD K. Y. JUNG; ROYCE A. LEVIEN; ROBERT W. LORD; MARK A. MALAMUD;WILLIAM HENRY MANGIONE-SMITH; JOHN D. RINALDO, JR. as inventors, filedJan. 31, 2007, which is currently co-pending, or is an application ofwhich a currently co-pending application is entitled to the benefit ofthe filing date.

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation-in-part of U.S. patentapplication Ser. No. 11/701,524, entitled ANONYMIZATION PURSUANT TO ABROADCASTED POLICY, naming EDWARD K. Y. JUNG; ROYCE A. LEVIEN; ROBERT W.LORD; MARK A. MALAMUD; WILLIAM HENRY MANGIONE-SMITH; JOHN D. RINALDO,JR. as inventors, filed Jan. 31, 2007, which is currently co-pending, oris an application of which a currently co-pending application isentitled to the benefit of the filing date.

The United States Patent Office (USPTO) has published a notice to theeffect that the USPTO's computer programs require that patent applicantsreference both a serial number and indicate whether an application is acontinuation or continuation-in-part. Stephen G. Kunin, Benefit ofPrior-Filed Application, USPTO Official Gazette Mar. 18, 2003, availableat http://www.uspto.gov/web/offices/com/sol/og/2003/week11/patbene.htm.The present Applicant Entity (hereinafter “Applicant”) has providedabove a specific reference to the application(s) from which priority isbeing claimed as recited by statute. Applicant understands that thestatute is unambiguous in its specific reference language and does notrequire either a serial number or any characterization, such as“continuation” or “continuation-in-part,” for claiming priority to U.S.patent applications. Notwithstanding the foregoing, Applicantunderstands that the USPTO's computer programs have certain data entryrequirements, and hence Applicant is designating the present applicationas a continuation-in-part of its parent applications as set forth above,but expressly points out that such designations are not to be construedin any way as any type of commentary and/or admission as to whether ornot the present application contains any new matter in addition to thematter of its parent application(s).

All subject matter of the Related Applications and of any and allparent, grandparent, great-grandparent, etc. applications of the RelatedApplications is incorporated herein by reference to the extent suchsubject matter is not inconsistent herewith.

SUMMARY

An embodiment provides a system. The system includes an imaging deviceoperable to acquire an image of a subject. The system also includes ananonymizer circuit operable to generate an anonymized image thatincludes a decreased fidelity of a property of a subject of the acquiredimage in response to an anonymization policy. The system furtherincludes a display operable to provide a human-perceivable indication ofthe anonymization policy. In an embodiment, the system further includesa storage media configurable by data corresponding to the anonymizedimage. In addition to the foregoing, other system embodiments aredescribed in the claims, drawings, and text that form a part of thepresent application.

Another embodiment provides a method. The method includes capturing animage of a subject. The method also includes producing an obscureddigital image of the subject by reducing a fidelity of a property of thesubject in the captured image in response to an ambiguity policy. Themethod further includes broadcasting an indication of the ambiguitypolicy. The method may include saving the obscured image. In addition tothe foregoing, other method embodiments are described in the claims,drawings, and text that form a part of the present application.

A further embodiment provides a device. The device includes means forcapturing a digital image of a subject. The device also includes meansfor producing an obscured digital image of the subject by reducing afidelity of a property of the subject in the captured image in responseto an ambiguity policy. The device further includes means forbroadcasting an indication of the ambiguity policy. The device mayinclude means for saving the obscured digital image in a digital storagemedium. In addition to the foregoing, other device embodiments aredescribed in the claims, drawings, and text that form a part of thepresent application.

An embodiment provides a computer program product. The computer programproduct includes program instructions operable to perform a process in acomputing device. The process includes receiving an image of a subject,and reducing a fidelity of a property of the subject in the capturedimage in response to an ambiguity policy. The process also includesbroadcasting an indication of the ambiguity policy. The process mayfurther include saving data representative of the received image of asubject having the reduced fidelity of the property. The computerprogram product further includes a computer-readable signal bearingmedium bearing the program instructions. In addition to the foregoing,other computer program product embodiments are described in the claims,drawings, and text that form a part of the present application.

Another embodiment provides a system. The system includes an imagingdevice operable to capture an image of a subject. The system alsoincludes an alteration circuit operable to generate an anonymized imageby obscuring a property of the captured image of a subject in responseto a privacy policy. The system further includes a computer-readablestorage media configurable by the anonymized image, and a displayoperable to provide a human-perceivable indication of the privacypolicy. In addition to the foregoing, other system embodiments aredescribed in the claims, drawings, and text that form a part of thepresent application.

A further embodiment provides a system. The system includes a sensordevice operable to capture from a subject information corresponding tothe subject. The system also includes an anonymizer circuit operable togenerate an anonymized image that includes a decreased fidelity of aproperty of a subject of the captured information in response to ananonymization policy. The anonymizer circuit is also operable to informa display device of the anonymization policy. The system furtherincludes the display device operable to broadcast an indication of theanonymization policy perceivable by a human at least nearby the subject.The system may further include a non-volatile computer storage mediaconfigurable by data corresponding to the anonymized image. In additionto the foregoing, other system embodiments are described in the claims,drawings, and text that form a part of the present application.

An embodiment provides a method. The method includes capturinginformation corresponding to a subject from the subject. The method alsoincludes generating an anonymized image that includes a decreasedfidelity of a property of a subject of the captured information inresponse to an anonymization policy. The method further includesbroadcasting an indication of the anonymization policy perceivable bythe subject. The method may further include informing a display deviceof the anonymization policy. In addition to the foregoing, other methodembodiments are described in the claims, drawings, and text that form apart of the present application.

Another embodiment provides a device. The device includes means forcapturing information corresponding to a subject from the subject. Thedevice also includes means for generating an anonymized image thatincludes a decreased fidelity of a property of a subject of the capturedinformation in response to an anonymization policy. The device furtherincludes means for broadcasting an indication of the anonymizationpolicy perceivable by a person proximate to the subject. The device mayinclude means for informing a display device of the anonymizationpolicy. In addition to the foregoing, other device embodiments aredescribed in the claims, drawings, and text that form a part of thepresent application.

A further embodiment provides a device. The device includes ananonymization module operable to produce in response to an anonymizationpolicy an anonymized image by causing a reduction in fidelity of afeature of a subject depicted in a received image. The device furtherincludes a communications module operable to send a signal indicative ofthe anonymization policy. The device may include a selector moduleoperable to designate the anonymization policy. The device may include aselector module operable to choose the anonymization policy from atleast two anonymization policies. The device may include a digitalstorage media configurable by the anonymized image. The device mayinclude a computing device. The computing device may include theanonymization module. In addition to the foregoing, other deviceembodiments are described in the claims, drawings, and text that form apart of the present application.

An embodiment provides a method. The method includes obscuring aproperty of a subject depicted in a received image in response to aprivacy policy. The method also includes sending a signal indicative ofthe privacy policy. The method may include displaying an indication ofthe privacy policy perceivable by a human proximate to the subject andnear in time to a capture of the received image. The method may includedisplaying an indication of the privacy policy perceivable by a humanproximate to the subject and prior to a capture of the received image.The method may include receiving the image depicting the subject. Themethod may include saving digital data representative of the subjectdepicted in the received image with the property obscured in response tothe privacy policy. In addition to the foregoing, other methodembodiments are described in the claims, drawings, and text that form apart of the present application.

Another embodiment provides a device. The device includes means forobscuring in response to a privacy policy a property of a subjectdepicted in a received image. The device also includes means for sendinga signal indicative of the privacy policy receivable by ahuman-perceivable display. The device may include means for displayingan indication of the privacy policy perceivable by a human proximate tothe subject and near in time to a capture of the received image. Thedevice may include means for displaying an indication of the privacypolicy perceivable by a human proximate to the subject and prior to acapture of the received image. The device may include means for savingdigital data representative of the subject depicted in the receivedimage with the property obscured in response to the privacy policy. Inaddition to the foregoing, other device embodiments are described in theclaims, drawings, and text that form a part of the present application.

A further embodiment provides a computer-program product. The computerprogram product includes program instructions operable to perform aprocess in a computing device, and a computer-readable signal bearingmedium bearing the program instructions. The process includes sending asignal indicative of a privacy policy, and obscuring a property of asubject depicted in a received image in response to the privacy policy.The process may further include displaying an indication of the privacypolicy perceivable by a human proximate to the subject and near in timeto a capture of the received image. The process may further includereceiving the image depicting the subject. The process may furtherinclude data representative of the subject depicted in the receivedimage with the property obscured in response to the privacy policy. Inaddition to the foregoing, other computer-program product embodimentsare described in the claims, drawings, and text that form a part of thepresent application.

An embodiment provides a system. The system includes an imaging deviceoperable to capture an image depicting a member of a class of subjectsthat may have a temporal presence in an area. The system also includesan anonymization device having a selector circuit operable to select ananonymization policy, the anonymization policy includes obscuring aproperty of the class of subjects depicted in the captured image. Thesystem further includes a broadcast device operable to display ahuman-perceivable indication of the selected anonymization policy to atleast a portion of the area. The system also includes an anonymizationcircuit operable to generate an anonymized image by applying theselected anonymization policy to an image captured by the imaging deviceand depicting a member of the class of subjects. The system may includea persistent storage media configurable by a digital file representativeof the anonymized image. In addition to the foregoing, other systemembodiments are described in the claims, drawings, and text that form apart of the present application.

Another embodiment provides a method. The method includes receiving ananonymization policy in an image capture device operable to capture animage of a class of subjects having a temporal presence in an area. Theanonymization policy includes obscuring a property of a class ofsubjects depicted in an image. The method also includes broadcasting ahuman-perceivable indication of the anonymization policy to at least aportion of the area. The method further includes generating an obscuredimage of a member of the class of subjects by applying the selectedanonymization policy to an image captured by the image capture deviceand depicting the member of the class of subjects. The method mayinclude selecting the anonymization policy. The method may includeconfiguring a persistent computer-readable storage media with datarepresentative of the obscured image. In addition to the foregoing,other method embodiments are described in the claims, drawings, and textthat form a part of the present application.

A further embodiment provides a system. The system includes means forwirelessly receiving an anonymization policy in an image capture deviceoperable to capture an image of a class of subjects having a temporalpresence in an area. The anonymization policy including obscuring aproperty of a class of subjects depicted in an image. The system alsoincludes means for broadcasting a human-perceivable indication of theanonymization policy to at least a portion of the area. The systemfurther includes means for generating an obscured image of a member ofthe class of subjects by applying the selected anonymization policy toan image captured by the image capture device and depicting the memberof the class of subjects. The system may include means for selecting theanonymization policy from at least two anonymization policies. Thesystem may include means for configuring a persistent computer-readablestorage media with a file representative of the obscured image. Inaddition to the foregoing, other system embodiments are described in theclaims, drawings, and text that form a part of the present application.

Another embodiment provides a method. The method includes receiving asignal corresponding to an anonymization policy. The anonymizationpolicy includes obscuring a property of a class of subjects depicted inan image. The method also includes broadcasting a human-perceivableindication of the anonymization policy to at least a portion of an area.The method further includes capturing an image depicting a member of theclass of subjects having a presence in an area. The method also includesgenerating an obscured image of the member of the class of subjects byapplying the anonymization policy to the captured image depicting themember of the class of subjects.

The foregoing summary is illustrative only and is not intended to be inany way limiting. In addition to the illustrative aspects, embodiments,and features described above, further aspects, embodiments, and featureswill become apparent by reference to the drawings and the followingdetailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an exemplary embodiment of a thin computing device inwhich embodiments may be implemented;

FIG. 2 illustrates an exemplary embodiment of a general-purposecomputing system in which embodiments may be implemented;

FIG. 3 illustrates an exemplary embodiment of an environment in which anembodiment may be implemented;

FIG. 4 illustrates an exemplary embodiment of an environment in whichembodiments may be implemented;

FIG. 5 illustrates an image of the exemplary embodiment of anenvironment of FIG. 4 with a decreased fidelity of a property of asubject;

FIG. 6 illustrates an exemplary embodiment of an operational flow;

FIG. 7 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 6;

FIG. 8 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 6;

FIG. 9 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 6;

FIG. 10 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 6;

FIG. 11 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 6;

FIG. 12 illustrates an exemplary embodiment of an device;

FIG. 13 illustrates an exemplary embodiment of a computer programproduct;

FIG. 14 illustrates an exemplary embodiment of a system;

FIG. 15 illustrates an exemplary embodiment of a system;

FIG. 16 illustrates an exemplary embodiment of an operational flow;

FIG. 17 illustrates an exemplary embodiment of a device;

FIG. 18 illustrates an exemplary embodiment of a device;

FIG. 19 illustrates an exemplary embodiment of an operational flow;

FIG. 20 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 19;

FIG. 21 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 19;

FIG. 22 illustrates an exemplary embodiment of a device;

FIG. 23 illustrates an exemplary embodiment of an computer-programproduct;

FIG. 24 illustrates an exemplary embodiment of a system;

FIG. 25 illustrates an exemplary operational flow;

FIG. 26 illustrates an alternative embodiment of the exemplaryoperational flow of FIG. 25;

FIG. 27 illustrates another alternative embodiment of the exemplaryoperational flow of FIG. 25;

FIG. 28 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 25;

FIG. 29 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 25;

FIG. 30 illustrates a further alternative embodiment of the exemplaryoperational flow of FIG. 25;

FIG. 31 illustrates an embodiment of an exemplary system; and

FIG. 32 illustrates an exemplary operational flow.

DETAILED DESCRIPTION

In the following detailed description, reference is made to theaccompanying drawings, which form a part hereof. In the drawings,similar symbols typically identify similar components, unless contextdictates otherwise. The illustrated embodiments described in thedetailed description, drawings, and claims are not meant to be limiting.Other embodiments may be utilized, and other changes may be made,without departing from the spirit or scope of the subject matterpresented here.

FIG. 1 and the following discussion are intended to provide a brief,general description of an environment in which embodiments may beimplemented. FIG. 1 illustrates an exemplary system that includes a thincomputing device 20, which may be included in an electronic device thatalso includes a device functional element 50. For example, theelectronic device may include any item having electrical and/orelectronic components playing a role in a functionality of the item,such as a limited resource computing device, an electronic pen, ahandheld electronic writing device, a digital camera, a scanner, anultrasound device, an x-ray machine, a non-invasive imaging device, acell phone, a printer, a refrigerator, a car, and an airplane. The thincomputing device 20 includes a processing unit 21, a system memory 22,and a system bus 23 that couples various system components including thesystem memory 22 to the processing unit 21. The system bus 23 may be anyof several types of bus structures including a memory bus or memorycontroller, a peripheral bus, and a local bus using any of a variety ofbus architectures. The system memory includes read-only memory (ROM) 24and random access memory (RAM) 25. A basic input/output system (BIOS)26, containing the basic routines that help to transfer informationbetween sub-components within the thin computing device 20, such asduring start-up, is stored in the ROM 24. A number of program modulesmay be stored in the ROM 24 and/or RAM 25, including an operating system28, one or more application programs 29, other program modules 30 andprogram data 31.

A user may enter commands and information into the computing device 20through input devices, such as a number of switches and buttons,illustrated as hardware buttons 44, connected to the system via asuitable interface 45. Input devices may further include atouch-sensitive display screen 32 with suitable input detectioncircuitry 33. The output circuitry of the touch-sensitive display 32 isconnected to the system bus 23 via a video driver 37. Other inputdevices may include a microphone 34 connected through a suitable audiointerface 35, and a physical hardware keyboard (not shown). In additionto the display 32, the computing device 20 may include other peripheraloutput devices, such as at least one speaker 38.

Other external input or output devices 39, such as a joystick, game pad,satellite dish, scanner or the like may be connected to the processingunit 21 through a USB port 40 and USB port interface 41, to the systembus 23. Alternatively, the other external input and output devices 39may be connected by other interfaces, such as a parallel port, game portor other port. The computing device 20 may further include or be capableof connecting to a flash card memory (not shown) through an appropriateconnection port (not shown). The computing device 20 may further includeor be capable of connecting with a network through a network port 42 andnetwork interface 43, and through wireless port 46 and correspondingwireless interface 47 may be provided to facilitate communication withother peripheral devices, including other computers, printers, and so on(not shown). It will be appreciated that the various components andconnections shown are exemplary and other components and means ofestablishing communications links may be used.

The computing device 20 may be primarily designed to include a userinterface. The user interface may include a character, a key-based,and/or another user data input via the touch sensitive display 32. Theuser interface may include using a stylus (not shown). Moreover, theuser interface is not limited to an actual touch-sensitive panelarranged for directly receiving input, but may alternatively or inaddition respond to another input device such as the microphone 34. Forexample, spoken words may be received at the microphone 34 andrecognized. Alternatively, the computing device 20 may be designed toinclude a user interface having a physical keyboard (not shown).

The device functional elements 50 are typically application specific andrelated to a function of the electronic device, and is coupled with thesystem bus 23 through an interface (not shown). The functional elementsmay typically perform a single well-defined task with little or no userconfiguration or setup, such as a refrigerator keeping food cold, a cellphone connecting with an appropriate tower and transceiving voice ordata information, and a camera capturing and saving an image.

FIG. 2 illustrates an exemplary embodiment of a general-purposecomputing system in which embodiments may be implemented, shown as acomputing system environment 100. Components of the computing systemenvironment 100 may include, but are not limited to, a computing device110 having a processing unit 120, a system memory 130, and a system bus121 that couples various system components including the system memoryto the processing unit 120. The system bus 121 may be any of severaltypes of bus structures including a memory bus or memory controller, aperipheral bus, and a local bus using any of a variety of busarchitectures. By way of example, and not limitation, such architecturesinclude Industry Standard Architecture (ISA) bus, Micro ChannelArchitecture (MCA) bus, Enhanced ISA (EISA) bus, Video ElectronicsStandards Association (VESA) local bus, and Peripheral ComponentInterconnect (PCI) bus, also known as Mezzanine bus.

The computing system environment 100 typically includes a variety ofcomputer-readable media products. Computer-readable media may includeany media that can be accessed by the computing device 110 and includeboth volatile and nonvolatile media, removable and non-removable media.By way of example, and not of limitation, computer-readable media mayinclude computer storage media and communications media. Computerstorage media includes volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer-readable instructions, data structures,program modules, or other data. Computer storage media includes, but isnot limited to, random-access memory (RAM), read-only memory (ROM),electrically erasable programmable read-only memory (EEPROM), flashmemory, or other memory technology, CD-ROM, digital versatile disks(DVD), or other optical disk storage, magnetic cassettes, magnetic tape,magnetic disk storage, or other magnetic storage devices, or any othermedium which can be used to store the desired information and which canbe accessed by the computing device 110. In a further embodiment, acomputer storage media may include a group of computer storage mediadevices. In another embodiment, an information store may include acomputer storage media. In another embodiment, an information store mayinclude a quantum memory, a photonic quantum memory, and/or atomicquantum memory. Combinations of any of the above may also be includedwithin the scope of computer-readable media.

Communications media may typically embody computer-readableinstructions, data structures, program modules, or other data in amodulated data signal such as a carrier wave or other transportmechanism and include any information delivery media. The term“modulated data signal” means a signal that has one or more of itscharacteristics set or changed in such a manner as to encode informationin the signal. By way of example, and not limitation, communicationsmedia include wired media such as a wired network and a direct-wiredconnection and wireless media such as acoustic, RF, optical, andinfrared media.

The system memory 130 includes computer storage media in the form ofvolatile and nonvolatile memory such as ROM 131 and RAM 132. A RAM mayinclude at least one of a DRAM, an EDO DRAM, a SDRAM, a RDRAM, a VRAM,and/or a DDR DRAM. A basic input/output system (BIOS) 133, containingthe basic routines that help to transfer information between elementswithin the computing device 110, such as during start-up, is typicallystored in ROM 131. RAM 132 typically contains data and program modulesthat are immediately accessible to or presently being operated on byprocessing unit 120. By way of example, and not limitation, FIG. 2illustrates an operating system 134, application programs 135, otherprogram modules 136, and program data 137. Often, the operating system134 offers services to applications programs 135 by way of one or moreapplication programming interfaces (APIs) (not shown). Because theoperating system 134 incorporates these services, developers ofapplications programs 135 need not redevelop code to use the services.Examples of APIs provided by operating systems such as Microsoft's“WINDOWS” are well known in the art.

The computing device 110 may also include other removable/non-removable,volatile/nonvolatile computer storage media products. By way of exampleonly, FIG. 2 illustrates a non-removable non-volatile memory interface(hard disk interface) 140 that reads from and writes for example tonon-removable, non-volatile magnetic media. FIG. 2 also illustrates aremovable non-volatile memory interface 150 that, for example, iscoupled to a magnetic disk drive 151 that reads from and writes to aremovable, non-volatile magnetic disk 152, and/or is coupled to anoptical disk drive 155 that reads from and writes to a removable,non-volatile optical disk 156, such as a CD ROM. Otherremovable/nonremovable, volatile/non-volatile computer storage mediathat can be used in the exemplary operating environment include, but arenot limited to, magnetic tape cassettes, memory cards, flash memorycards, DVDs, digital video tape, solid state RAM, and solid state ROM.The hard disk drive 141 is typically connected to the system bus 121through a non-removable memory interface, such as the interface 140, andmagnetic disk drive 151 and optical disk drive 155 are typicallyconnected to the system bus 121 by a removable non-volatile memoryinterface, such as interface 150.

The drives and their associated computer storage media discussed aboveand illustrated in FIG. 2 provide storage of computer-readableinstructions, data structures, program modules, and other data for thecomputing device 110. In FIG. 2, for example, hard disk drive 141 isillustrated as storing an operating system 144, application programs145, other program modules 146, and program data 147. Note that thesecomponents can either be the same as or different from the operatingsystem 134, application programs 135, other program modules 136, andprogram data 137. The operating system 144, application programs 145,other program modules 146, and program data 147 are given differentnumbers here to illustrate that, at a minimum, they are differentcopies. A user may enter commands and information into the computingdevice 110 through input devices such as a microphone 163, keyboard 162,and pointing device 161, commonly referred to as a mouse, trackball, ortouch pad. Other input devices (not shown) may include a joystick, gamepad, satellite dish, and scanner. These and other input devices areoften connected to the processing unit 120 through a user inputinterface 160 that is coupled to the system bus, but may be connected byother interface and bus structures, such as a parallel port, game port,or a universal serial bus (USB). A monitor 191 or other type of displaydevice is also connected to the system bus 121 via an interface, such asa video interface 190. In addition to the monitor, computers may alsoinclude other peripheral output devices such as speakers 197 and printer196, which may be connected through an output peripheral interface 195.

The computing system environment 100 may operate in a networkedenvironment using logical connections to one or more remote computers,such as a remote computer 180. The remote computer 180 may be a personalcomputer, a server, a router, a network PC, a peer device, or othercommon network node, and typically includes many or all of the elementsdescribed above relative to the computing device 110, although only amemory storage device 181 has been illustrated in FIG. 2. The logicalconnections depicted in FIG. 2 include a local area network (LAN) 171and a wide area network (WAN) 173, but may also include other networkssuch as a personal area network (PAN) (not shown). Such networkingenvironments are commonplace in offices, enterprise-wide computernetworks, intranets, and the Internet.

When used in a LAN networking environment, the computing systemenvironment 100 is connected to the LAN 171 through a network interfaceor adapter 170. When used in a WAN networking environment, the computingdevice 110 typically includes a modem 172 or other means forestablishing communications over the WAN 173, such as the Internet. Themodem 172, which may be internal or external, may be connected to thesystem bus 121 via the user input interface 160, or via anotherappropriate mechanism. In a networked environment, program modulesdepicted relative to the computing device 110, or portions thereof, maybe stored in a remote memory storage device. By way of example, and notlimitation, FIG. 2 illustrates remote application programs 185 asresiding on computer storage medium 181. It will be appreciated that thenetwork connections shown are exemplary and other means of establishinga communications link between the computers may be used.

FIGS. 1 and 2 are intended to provide a brief, general description of anillustrative and/or suitable exemplary environment in which embodimentsmay be implemented. An exemplary system may include the thin computingdevice 20 of FIG. 1 and/or the computing system environment 100 of FIG.2. FIGS. 1 and 2 are examples of a suitable environment and is notintended to suggest any limitation as to the structure, scope of use, orfunctionality of an embodiment. A particular environment should not beinterpreted as having any dependency or requirement relating to any oneor combination of components illustrated in an exemplary environment.For example, in certain instances, one or more elements of anenvironment may be deemed not necessary and omitted. In other instances,one or more other elements may be deemed necessary and added. Further,it will be appreciated that device(s) and/or environment(s) describedherein may include numerous electrical, mechanical, and/or digitalcomponents that may necessary to operate the device, but are not neededto illustrate the subject matter described herein. As such, some ofthese electrical, mechanical, and/or digital components may be omittedfrom the specification for clarity.

In the description that follows, certain embodiments may be describedwith reference to acts and symbolic representations of operations thatare performed by one or more computing devices, such as the computingdevice 110 of FIG. 2. As such, it will be understood that such acts andoperations, which are at times referred to as being computer-executed,include the manipulation by the processing unit of the computer ofelectrical signals representing data in a structured form. Thismanipulation transforms the data or maintains them at locations in thememory system of the computer, which reconfigures or otherwise altersthe operation of the computer in a manner well understood by thoseskilled in the art. The data structures in which data is maintained arephysical locations of the memory that have particular properties definedby the format of the data. However, while an embodiment is beingdescribed in the foregoing context, it is not meant to be limiting asthose of skill in the art will appreciate that the acts and operationsdescribed hereinafter may also be implemented in hardware.

Embodiments may be implemented with numerous other general-purpose orspecial-purpose computing devices and computing system environments orconfigurations. Examples of well-known computing systems, environments,and configurations that may be suitable for use with an embodimentinclude, but are not limited to, personal computers, handheld or laptopdevices, personal digital assistants, multiprocessor systems,microprocessor-based systems, set top boxes, programmable consumerelectronics, network, minicomputers, server computers, game servercomputers, web server computers, mainframe computers, and distributedcomputing environments that include any of the above systems or devices.

Embodiments may be described in a general context of computer-executableinstructions, such as program modules, being executed by a computer.Generally, program modules include routines, programs, objects,components, data structures, etc., that perform particular tasks orimplement particular abstract data types. An embodiment may also bepracticed in a distributed computing environment where tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules may be located in both local and remote computer storage mediaincluding memory storage devices.

FIG. 3 illustrates an exemplary embodiment of an environment 300 inwhich an embodiment may be implemented. The exemplary environmentincludes an area 303 that includes, or that may include, one or moresubjects 305 whose image may be acquired by an imaging device. Theenvironment also includes a system 310 that includes an imaging device320, an anonymizer circuit 330, and a display 340. The imaging device isoperable to acquire an image of a subject. The anonymizer circuit isoperable to generate an anonymized image that includes a decreasedfidelity of a property of a subject of the acquired image in response toan anonymization policy. The display is operable to provide ahuman-perceivable indication of the anonymization policy. In anembodiment, the display includes colored lights indicating theanonymization policy then in effect. For example, in FIG. 3, the coloredlights include a green light (G), a yellow light (Y), and a red light(R) that respectively may indicate a green, a yellow, and a redanonymization policy. Continuing with the example, a “green”anonymization policy decreases a fidelity of facial properties and oflicense plate properties depicted in acquired images. For example, thefidelity may be decreased to a point where facial properties areindistinguishable and license plate properties are indistinguishable. A“yellow” anonymization policy decreases a fidelity of facial propertiesdepicted in acquired images, and a “red” anonymization policy does notdecrease a fidelity of facial properties and a fidelity of license plateproperties. For example, decreasing a fidelity of a facial property mayinclude removing all facial features from an acquired image. In anotherexample, decreasing a fidelity of a license plate may include obscuringa license plate number.

In an embodiment, the imaging device 320 operable to acquire an image ofa subject further includes a digital imaging device operable to acquirean image of a subject of the potential image subject(s) 305. In anotherembodiment, the imaging device operable to acquire an image of a subjectfurther includes a digital camera operable to acquire an image of asubject. For example, the digital camera may include a lens 322, animaging element 324, an analog to digital converter 326, and/or aprocessor 328. In a further embodiment, the imaging device operable toacquire an image of a subject further includes an imaging deviceoperable to capture an image of a subject of the potential imagesubject(s) 305.

In an embodiment, the imaging device 320 operable to acquire an image ofa subject further includes an imaging device operable to receive animage of a subject of the of the potential image subject(s) 305. Inanother embodiment, the imaging device operable to acquire an image of asubject further includes an imaging device operable to acquire at leastone of a digital and/or an analog image of a subject. In a furtherembodiment, the imaging device operable to acquire an image of a subjectfurther includes an imaging device operable to acquire a digital imageof a subject, the digital image including a representation of adimensional image as a finite set of digital values called pictureelements or pixels. In an embodiment, the imaging device operable toacquire an image of a subject further includes an imaging deviceoperable to acquire at least one of a still and/or a streaming image ofa subject. In a further embodiment, the imaging device operable toacquire an image of a subject further includes an imaging deviceoperable to acquire an image of at least one of a person, a patron, ashopper, a spectator, a car, a truck, a ship, and/or an aircraft. Inanother embodiment, the imaging device operable to acquire an image of asubject further includes an imaging device operable to capture an imageof a subject and to create a digital signal representative of theacquired image.

In an embodiment, the anonymizer circuit 330 operable to generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policyfurther includes an anonymizer circuit operable to: generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policy;and restrict a dissemination of the acquired image. For example, arestriction of a dissemination of the acquired image may includeblocking a dissemination of the image where the image does not includethe decreased fidelity of a property of a subject of the acquired imagein response to an anonymization policy. By way of further example, arestriction of a dissemination of the acquired image may includerequiring a special permission before a dissemination of the image wherethe image does not include the decreased fidelity of a property of asubject of the acquired image in response to an anonymization policy. Inanother embodiment, the anonymizer circuit operable to generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policyfurther includes an anonymizer circuit operable to generate ananonymized digital image that includes a decreased fidelity of aproperty of the subject of the acquired image in response to ananonymization policy. In a further embodiment, the anonymizer circuitoperable to generate an anonymized image that includes a decreasedfidelity of a property of the subject of the acquired image in responseto an anonymization policy further includes an anonymizer circuitoperable to generate an anonymized image that includes a decreased atleast one of accuracy in describing or reporting facts or details,and/or faithfulness in a depiction of a property of the subject of theacquired image in response to an anonymization policy.

In an embodiment, the anonymizer circuit 330 operable to generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policyfurther includes an anonymizer circuit operable to generate ananonymized image that includes at least one of a decreased resolution ofa property, an obscuring of a property, a blackout of a property, and/ora removal of a property of the subject of the acquired image in responseto an anonymization policy. In a further embodiment, the anonymizercircuit further includes an anonymizer circuit operable to generate ananonymized image that includes a decreased fidelity of an aspect, aproperty, and/or an attribute of the subject of the acquired image inresponse to an anonymization policy. In another embodiment, theanonymizer circuit further includes an anonymizer circuit operable togenerate an anonymized image that includes a decreased fidelity of atleast one of a face, a license plate, a label, and/or a recognizableproperty associated with the subject of the acquired image in responseto an anonymization policy.

In an embodiment, the anonymizer circuit 330 operable to generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policyfurther includes an anonymizer circuit operable to generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policy.The anonymization policy being selected from among at least twoanonymization policies. In another embodiment, the anonymizer circuitfurther includes an anonymizer circuit operable to generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policy.The anonymization policy being selected in response to at least one of areceived human-initiated input, in response to a signal received from aremote device, and/or a selection algorithm. In a further embodiment,the anonymizer circuit further includes an anonymizer circuit operableto generate an anonymized image that includes a decreased fidelity of aproperty of the subject of the acquired image in response to ananonymization policy, the anonymization policy persisting for apredetermined time.

In an embodiment, the anonymizer circuit 330 operable to generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policyfurther includes an anonymizer circuit operable to generate ananonymized image that includes a decreased fidelity of a property of thesubject of the acquired image in response to an anonymization policy.The decreased fidelity including a non-storage, a temporary storage,and/or other rule and/or behavior that results in the property not beingsavable and/or transmittable. For example, the anonymization policy mayblock transmittal of recognizable face portions of an image to a remotelocation and/or to an image storage device. In another embodiment, theanonymizer circuit further includes an anonymizer circuit operable togenerate an anonymized image that includes a decreased fidelity of aproperty of the subject of the acquired image in response to ananonymization policy. The anonymization policy including a set of rulesor behaviors that characterize the way properties are handled thatresults in a reduction of fidelity.

In an embodiment, the display 340 operable to provide ahuman-perceivable indication of the anonymization policy furtherincludes a display operable to provide a human-perceivable visualindication of the anonymization policy. In another embodiment, thedisplay further includes a display operable to provide ahuman-perceivable indication of the anonymization policy at least closein time to the acquisition of the image. In a further embodiment, thedisplay further includes a display operable to provide a color-basedvisual indication of the anonymization policy. In another embodiment,the display further includes a display operable to provide ahuman-perceivable audio indication of the anonymization policy.

In an embodiment, the system 300 further includes a storage media 350configurable by data corresponding to the anonymized image. In anotherembodiment, the storage media configurable by data corresponding to theanonymized image further includes at least one of a quantum, an atomic,a magnetic, and/or an optical storage media configurable by digital datacorresponding to the anonymized image.

FIG. 4 illustrates an exemplary embodiment of an environment 400 inwhich embodiments may be implemented. The environment includes an area403 (not delineated), illustrated as a portion of Mt. Rainier NationalPark. The area may include any locale, a portion of which may bedepicted in an image captured by an image capture device 420. Forexample, in an embodiment, the area may include at least one of a singleroom, a building, a geographic locale, a mall, a park, an intersection,two or more spaced apart intersections, and/or a stadium. Theenvironment also includes at least one subject 406, 408A-C eachrespectively having at least one common property. In an embodiment, theat least one subject includes at least two human subjects, illustratedas an adult and two children. In another embodiment, the at least onesubject includes a car having a license plate with properties thatinclude an identification number and an issuing state, illustrated as aWashington State license plate bearing identification number “XYZ 123.”The environment also includes display operable to provide ahuman-perceivable indication of an anonymization policy in effect forthe area. In an embodiment, the display includes a display 440A. In anembodiment, the display 440A may include at least two visual indicatorlights, such as the red, yellow, and green lights described inconjunction with the display 340 of FIG. 3. In another embodiment, thedisplay includes a display 440B coupled with the image capture device420 and perceivable by humans in at least a portion of the area.

FIG. 5 illustrates an image of 401 the exemplary embodiment of anenvironment 400 of FIG. 4 with a decreased fidelity of a property of asubject. In an embodiment, the decreased fidelity may be implementedand/or practiced using systems, devices, apparatus, and/or methodsdisclosed herein. For example, the system 300 described in conjunctionwith FIG. 3 may be used to implement and/or practice the decreasedfidelity of a property of a subject depicted in an image 405. Forexample, FIG. 5 illustrates an embodiment where the display 440B of theimage capture device 420 indicating a “Green” color-based visualindication of the anonymization policy, corresponding to decreasing afidelity of facial properties and license plate properties depicted inacquired images to be indistinguishable. The decreased fidelity of theillustrated embodiment includes a decreased fidelity of facialproperties of human subjects 408A, 408B, and 408C implemented byobscuring portions of their faces and/or heads. The faces and/or headsof human subjects may be located in the image using techniques known tothose skilled in the art, including artificial intelligence, and/orfacial recognition techniques. FIG. 5 also illustrates a decreasedfidelity of the identification number “XYZ 123” property of a licenseplate of a car subject 406 in the image that was implemented by anobscuring portion over the license identification number. In anembodiment, the image 401 may be used to study human and/or vehicletraffic patterns in the area 403 while preserving the anonymity of humansubjects and/or registered owners of vehicles.

In another embodiment, instead of decreasing a fidelity of a property ofa subject by obscuring or blacking out the property, a fidelity of aproperty may decreased by extracting information corresponding to theproperty from a raw image acquired by the imaging device 320 of FIG. 3,and then saving only the image post information extraction.

FIG. 6 illustrates an exemplary embodiment of an operational flow 500.After a start operation, the operational flow moves to a depictionoperation 510. The depiction operation captures an image of a subject. Amasking operation 520 produces an obscured digital image of the subjectby reducing a fidelity of a property of the subject in the capturedimage in response to an ambiguity policy. A dissemination operation 540broadcasts an indication of the ambiguity policy. The operational flowthen moves to an end operation.

FIG. 7 illustrates an alternative embodiment of the exemplaryoperational flow 500. The depiction operation 510 may include at leastone additional operation. The at least one additional operation mayinclude an operation 512 and/or an operation 514. The operation 512automatically causes a capture of an image of a subject. Theautomatically causing may include causing a capture of an image of asubject in response to at least one of time, movement, and/or event. Forexample, the capture of an image may be caused once each minute. By wayof further example, the capture of an image may be caused in response toa detected movement of a subject in a monitored area, such a detectedcar movement. In another example, the capture of an image may be causedin response to a detected audible event in a monitored area, such as acar collision. The operation 514 acquires an image of a subject.

FIG. 8 illustrates another alternative embodiment of the exemplaryoperational flow 500. The masking operation 520 may include at least oneadditional operation. The at least one additional operation may includean operation 522 and/or an operation 524. The operation 522 produces anobscured digital image of the subject by reducing a fidelity of aproperty of the subject in the captured image in response to a selectedambiguity policy. The operation 524 produces an obscured digital imageof the subject by reducing a fidelity of a property of the subject inthe captured image in response to an ambiguity policy. The propertybeing at least one of substantially anonymized, obscured, and/orincomprehensible.

FIG. 9 illustrates a further alternative embodiment of the exemplaryoperational flow 500. The masking operation 520 may include at least oneadditional operation, such as an operation 526. The operation 526produces an obscured digital image of the subject by reducing a fidelityof a property of the subject in the captured image in response to anambiguity policy. The reducing a fidelity of a property includes atleast one of substantially anonymizing the property, substantiallyobscuring the property, and/or making the property incomprehensible.

FIG. 10 illustrates an alternative embodiment of the exemplaryoperational flow 500. The dissemination operation 540 may include atleast one additional operation. The at least one additional operationmay include an operation 542 and/or an operation 544. The operation 542broadcasts a human perceivable indication of the ambiguity policy. Theoperation 544 broadcasts a signal indicative of the ambiguity policy.

FIG. 11 illustrates another alternative embodiment of the exemplaryoperational flow 500. The operational flow may include at least oneadditional operation, such as an operation 550. The operation 550 savesthe obscured digital image. The operation 550 may include an operation552 and/or an operation 554. The operation 552 configures a digitalstorage information with data representative of the obscured digitalimage. The operation 554 configures a computer-readable medium with datarepresentative of the obscured digital image.

FIG. 12 illustrates an exemplary embodiment of a device 600. The deviceincludes means 610 for capturing a digital image of a subject. Thedevice further includes means 620 for producing an obscured digitalimage of the subject by reducing a fidelity of a property of the subjectin the captured image in response to an ambiguity policy. The devicealso includes means 630 for broadcasting an indication of the ambiguitypolicy. In an alternative embodiment, the device includes means 640 forsaving the obscured digital image in a digital storage medium.

FIG. 13 illustrates an exemplary embodiment of a computer programproduct 700. The computer program product includes a computer-readablesignal bearing medium 710 bearing program instructions 720. The programinstructions are operable to perform a process in a computing device.The process includes receiving an image of a subject. The processfurther includes reducing a fidelity of a property of the subject in thecaptured image in response to an ambiguity policy. The process alsoincludes broadcasting an indication of the ambiguity policy.

In an alternative embodiment, the process of the program instruction 720further includes saving data representative of the received image of asubject having the reduced fidelity of the property. In a furtherembodiment, the computer-readable signal bearing medium 710 furtherincludes a computer storage medium 712. In another embodiment, thecomputer-readable signal bearing medium further includes acommunications medium 714.

FIG. 14 illustrates an exemplary embodiment of a system 800. The systemincludes an imaging device operable to capture an image of a subject 805in an area 803. An embodiment of the imaging device is illustrated as acamera 820. The system also includes an alteration circuit 830 operableto generate an anonymized image(s) 844 by obscuring a property of thesubject in the captured image in response to a privacy policy 842. Thesystem further includes a computer-readable storage media 840configurable by the anonymized image. The system additionally includes adisplay operable to provide a human-perceivable indication of theprivacy policy. An embodiment of the display is illustrated as a screen850.

FIG. 15 illustrates an exemplary embodiment of a system 900. The systemincludes a sensor device 920 operable to capture from a subject 905information corresponding to the subject. For example, in an embodiment,the information is captured by acquiring imaging information directlyfrom the subject, such as with a camera acquiring a visible light, aninfrared light, and/or another portion of the light spectrum and/orradio spectrum. In another embodiment, the information corresponding toa subject may be captured by acquiring information from radiofrequencies passing through or reflecting from the subject, such asx-ray and/or computer aided tomography. In a further embodiment, theinformation corresponding to a subject may be captured by a radiationsensor, and/or a chemical sniffer.

The system 900 also includes an anonymizer circuit 930 operable togenerate an anonymized image that includes a decreased fidelity of aproperty of the subject 905 of the captured information in response toan anonymization policy. The anonymized image may include a visual imageof the subject, a graphical image of the subject, and/or an image of thesubject embodied in data. In an embodiment, the anonymization policy maybe a single policy implementable by the anonymization circuit. Inanother embodiment, the anonymization policy may include ananonymization policy selected from at least two anonymization policies.The selection may be in response to a human input and/or a machineinput. The anonymizer circuit is also operable to inform a displaydevice 950 of the anonymization policy. The system further includes thedisplay device operable to broadcast an indication of the anonymizationpolicy perceivable by a human at least nearby the subject. Theindication may be broadcast before, during, and/or after the capture ofinformation corresponding to a subject.

In an embodiment, the sensor device 920 operable to capture from asubject information corresponding to the subject further includes asensor device operable to capture at least one of optical, acoustical,x-ray, radiation, chemical, and/or ultrasound information correspondingto a subject from the subject. In another embodiment, the sensor devicefurther includes a sensor device operable to capture informationcorresponding to at least one of a human subject and/or object subject.In a further embodiment, the sensor device further includes a sensordevice operable to capture information corresponding to a subject from asignal emitted by and/or reflected from the subject. In anotherembodiment, the sensor device further includes a sensor device operableto capture information corresponding to a subject from at least one of alight, an electromagnetic, and/or an acoustical spectrum signal.

In an embodiment, the system 900 further includes a non-volatilecomputer storage media 940 configurable by data corresponding to theanonymized image.

FIG. 16 illustrates an exemplary embodiment of an operational flow 1000.After a start operation, the flow moves to an acquiring operation 1010.The acquiring operation captures information corresponding to a subjectfrom the subject. An obscuring operation 1020 generates an anonymizedimage that includes a decreased fidelity of a property of the subject ofthe captured information in response to an anonymization policy. Acommunication operation 1030 broadcasts an indication of theanonymization policy perceivable by the subject. In an embodiment, theindication of the anonymization is broadcast from a display device, suchas the display device 340 described in conjunction with FIG. 3, and/orthe display device 800 described in conjunction with FIG. 14.

In an embodiment, the communication operation 1030 broadcasting anindication of the anonymization policy perceivable by the subjectfurther includes broadcasting an indication of the anonymization policyperceivable by a person proximate to the subject 1032. In anotherembodiment, the operational flow 1000 further includes a transmissionoperation 1040 informing a display device of the anonymization policy.

FIG. 17 illustrates an exemplary embodiment of a device 1100. The deviceincludes means 1110 for capturing information corresponding to a subjectfrom the subject. The device also includes means 1120 for generating ananonymized image that includes a decreased fidelity of a property of thesubject of the captured information in response to an anonymizationpolicy. The device further includes means 1130 for broadcasting anindication of the anonymization policy perceivable by a person proximateto the subject. In another embodiment, the device further includes means1140 for informing a display device of the anonymization policy.

FIG. 18 illustrates an exemplary embodiment of a device 1200. The deviceincludes an anonymization module 1210 operable to produce in response toan anonymization policy an anonymized image by causing a reduction infidelity of a feature of a subject depicted in a received image. Thedevice also includes a communications module 1220 operable to send asignal indicative of the anonymization policy.

In an embodiment, the anonymization module 1210 further includes ananonymization module operable to produce in response to an anonymizationpolicy an anonymized image by causing a reduction in fidelity of atleast one of a distinguishing part, aspect, and/or characteristic of asubject depicted in a received image. In another embodiment, theanonymization module further includes an anonymization module operableto produce, in response to an anonymization policy, an anonymized imageby causing a reduction in fidelity of at least one of a person, face,article, license plate, and/or label associated with a subject depictedin a received image. In a further embodiment, the anonymization modulefurther includes an anonymization module operable to produce, inresponse to an anonymization policy, an anonymized image by causing, areduction in fidelity of a feature of a subject depicted in a receiveddigital and/or analog image.

In an embodiment, the anonymization module 1210 further includes ananonymization module operable to produce in response to an anonymizationpolicy an anonymized image by causing a reduction in fidelity of afeature of a subject represented in a received digital signal. In afurther embodiment, the anonymization module further includes ananonymization module operable to produce an anonymized image by at leastone of initiating, triggering, instigating, bringing about, and/oraffecting a reduction in fidelity of a feature of a subject depicted ina received image in response to an anonymization policy.

In an embodiment, the communications module 1220 operable to send asignal indicative of the anonymization policy further includes acommunications module operable to send a signal indicative of theanonymization policy and receivable by a local image capture device. Inanother embodiment, the communications module further includes acommunications module operable to send a signal indicative of theanonymization policy and receivable by a remotely located image capturedevice. In a further embodiment, the communications module furtherincludes a communications module operable to send a signal indicative ofthe anonymization policy and receivable by an anonymization indicatorlocated at a location physically removed from the anonymization module.

In an embodiment, the communications module 1220 further includes acommunications module operable to send a signal indicative of theanonymization policy and receivable by a remotely located anonymizationindicator that is coupled with an image capture system operable tocapture and transmit the image. In another embodiment, thecommunications module further includes a communications module operableto send a signal indicative of the anonymization policy and to receivethe image depicting a subject. In another embodiment, the device 1200further includes an anonymization policy selector module 1230 operableto designate the anonymization policy.

In an embodiment, the device 1200 further includes an anonymizationpolicy selector module 1230 operable to choose the anonymization policyfrom at least two anonymization policies. In another embodiment, the ananonymization policy selector module operable to choose theanonymization policy from at least two anonymization policies furtherincludes a selector module operable to implement the anonymizationpolicy from at least two anonymization policies. In a furtherembodiment, the an anonymization policy selector module operable tochoose the anonymization policy from at least two anonymization policiesfurther includes a selector module operable to designate theanonymization policy in response to at least one of a received humaninput, a selection received from an anonymization controller, and/or aselection algorithm. In an embodiment, the anonymization policy selectormodule operable to choose the anonymization policy from at least twoanonymization policies further includes a selector module operable tochoose the anonymization policy from a library of at least twoanonymization policies. In another embodiment, the anonymization policyselector module operable to choose the anonymization policy from atleast two anonymization policies further includes a selector moduleoperable to choose the anonymization policy from at least twoanonymization policies, the selected policy persisting as the selectedpolicy for a time.

In an embodiment, the anonymization module 1210 further includes theanonymization policy selector module 1230 operable to designate theanonymization policy. In another embodiment, the anonymization modulefurther includes an anonymization policy selector module operable tochoose the anonymization policy from at least two anonymizationpolicies.

In an embodiment, the device 1200 further includes a digital storagemedia 1250 configurable by the anonymized image. In another embodiment,the device further includes a computing device 1240. In a furtherembodiment, the device further includes a computing device that includesthe anonymization module.

In use, an embodiment of the device 1200 may be operationally combinedwith an image capture device, such as the image capture device 420 and adisplay, such as the display 440A and/or the display 440B as describedin conjunction with the exemplary environment 400 of FIG. 4. The deviceand the display 440A and/or the display 440B may be both present withinthe area 403. Alternatively, the device 1200 may be remote to the area.In use, the communications module 1220 of the device 1200 sends a signalindicative of an anonymization policy to the display 440A and/or thedisplay 440B. At least one of the anonymization indicator 1270, thedisplay 440A, and/or the display 440B displays an indication of ananonymization policy in effect for the area in a manner that isperceivable by humans in the area. This display provides persons in thearea with information about what degree of anonymization if any will beapplied to pictures taken of them and/or their property by an imagecapture device, such as the image capture device 420. In an embodiment,the anonymization may apply only to pictures acquired by the imagecapture device, and/or the anonymization policy may apply to picturesacquired by the image capture device and personal cameras used by othersin the area. In response to such information about the anonymizationpolicy in effect, persons may make a decision whether to remain in thearea or not, and/or whether to allow their cars to remain in the area ornot. The anonymization module 1210 produces in response to theanonymization policy an anonymized image by causing a reduction infidelity of a feature of a subject depicted in a received image from thedevice. Any persistent image saved on the device is also anonymized. Theanonymized image may be persistently stored in digital storage media1250 configurable by the anonymized image.

FIG. 19 illustrates an exemplary embodiment of an operational flow 1300.After a start operation, the operational flow moves to an ambiguationoperation 1310. The ambiguation operation obscures a property of asubject depicted in a received image in response to a privacy policy. Acommunication operation 1320 sends a signal indicative of the privacypolicy. The operational flow then moves to an end operation.

FIG. 20 illustrates an alternative embodiment of the exemplaryoperational flow 1300 of FIG. 19. The ambiguation operation 1310 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 1312 and/or an operation 1314. Theoperation 1312 obscures a person, article, object, face, license plate,and/or label of a subject depicted in a received image in response to aprivacy policy. The operation 1314 obscures a property of a subjectdepicted in a received digital, and/or analog image in response to aprivacy policy. The communication operation 1320 may include at leastone additional operation, such as the operation 1322. The operation 1322sends a signal indicative of the privacy policy and is receivable by atleast one of a remotely located image capture device, a privacy policyindicator at a location physically distant from the device, and/or alocal privacy policy indicator.

FIG. 21 illustrates an alternative embodiment of the exemplaryoperational flow 1300 of FIG. 19. The operational flow may include atleast one additional operation 1350. The at least one additionaloperation may include an operation 1352, an operation 1354, an operation1356, and/or an operation 1358. The operation 1352 displays anindication of the privacy policy perceivable by a human proximate to thesubject and near in time to a capture of the received image. Theoperation 1354 displays an indication of the privacy policy perceivableby a human proximate to the subject and prior to a capture of thereceived image. The operation 1356 receives the image depicting thesubject. The operation 1358 saves digital data representative of thereceived image having an aspect of the subject obscured in response tothe privacy policy.

FIG. 22 illustrates an exemplary embodiment of a device 1400. The deviceincludes means 1410 for obscuring in response to a privacy policy aproperty of a subject depicted in a received image. The device alsoincludes means 1420 for sending a signal indicative of the privacypolicy receivable by a human-perceivable display.

In an embodiment, the device further includes means 1430 for displayingan indication of the privacy policy perceivable by a human proximate tothe subject and near in time to a capture of the received image. Inanother embodiment, the device further includes means 1440 fordisplaying an indication of the privacy policy perceivable by a humanproximate to the subject and prior to a capture of the received image.In a further embodiment, the device includes means 1450 for savingdigital data representative of the subject depicted in the receivedimage with the property obscured in response to the privacy policy.

FIG. 23 illustrates an exemplary embodiment of a computer-programproduct 1500. The computer program product includes a computer-readablesignal bearing medium 1510 bearing program instructions 1520. Theprogram instructions are operable to perform a process in a computingdevice. The process includes sending a signal indicative of a privacypolicy. In an embodiment, the signal indicative of a privacy policy isreceivable by a device operable to indicate the privacy policy, and/orreceivable by an image capture device. The process also includesobscuring a property of a subject depicted in a received image inresponse to the privacy policy.

In another embodiment, the process of the program instructions 1520further includes causing a displayed indication of the privacy policyperceivable by a human proximate to the subject and near in time to acapture of the received image 1522. In a further embodiment, the processof the program instructions further includes receiving the imagedepicting the subject 1524. In another embodiment, the process of theprogram instructions further includes saving digital data representativeof the subject depicted in the received image with the property obscuredin response to the privacy policy 1526.

In an embodiment, the computer-readable signal bearing medium 1510further includes a computer storage medium. In another embodiment, thecomputer-readable signal bearing medium further includes acommunications medium 1514.

FIG. 24 illustrates an exemplary embodiment of a system 1600. The systemincludes an imaging device 1610, an anonymization device 1650, and abroadcast device. The imaging device is operable to capture an imagedepicting a class of subjects 1605 that may have a temporal presence inan area 1603. The broadcast device is operable to display ahuman-perceivable indication of a selected anonymization policy to atleast a portion of the area. The anonymization policy includes obscuringa property of the class of subjects depicted in the captured image. Inan embodiment, the broadcast device includes a broadcast device 1612that is physically coupled with the imaging device. In anotherembodiment, the broadcast device includes a broadcast device 1652 thatis physically coupled with the anonymization device. In anotherembodiment, the broadcast device includes a broadcast device physicallyseparated from both the imaging device and the anonymization device,such as the display 440A of FIG. 4. The anonymization device includes ananonymization circuit 1680 operable to generate an anonymized image byapplying the selected anonymization policy to an image captured by theimaging device and depicting a member of the class of subjects.

In an embodiment, the imaging device 1610 operable to capture an imagedepicting a class of subjects 1605 that may have a temporal presence inan area 1603 further includes an imaging device operable to capture animage depicting at least one instance of a class of subjects that mayhave a temporal presence in an area. In another embodiment, the imagingdevice further includes an imaging device operable to capture an imagedepicting a class of humans, adults, children, patrons, animals,objects, inanimate objects, cars, boats, airplanes, and/or vessels thatmay have a temporal presence in an area. In a further embodiment, theimaging device further includes an imaging device operable to capture animage depicting a class of subjects that may have a temporal presence ina room, a building, a geographic locale, a mall, a park, anintersection, two or more spaced apart intersections, and/or a stadium.

In an embodiment, the imaging device 1610 further includes theanonymization circuit, illustrated as an anonymization circuit 1630. Inanother embodiment, the anonymization device 1650 further includes theanonymization circuit, illustrated as an anonymization circuit 1680.

In an embodiment, the anonymization device 1650 having a selectorcircuit 1660 operable to select an anonymization policy further includesan anonymization device having a selector circuit operable to select theanonymization policy from at least two anonymization policies. The atleast two anonymization policies may include at least two anonymizationpolicies of an anonymization policy library 1692. In another embodiment,the anonymization device further includes an anonymization device havinga selector circuit operable to select an anonymization policy inresponse to a received human originated input, and/or a selectionmethodology. The human originated input may be received from any humanuser interface, such as for example, the screen input detector 33,hardware buttons 44, and/or microphone 34 described in conjunction withFIG. 1, and/or the user input interface 160 and devices coupled theretodescribed in conjunction with FIG. 2.

In an embodiment, the anonymization device 1650 having a selectorcircuit 1660 operable to select an anonymization policy further includesan anonymization device having a selector circuit operable to select ananonymization policy, where the selected anonymization policy includesdecreasing a fidelity of a property of the class of subjects 1605depicted in the captured image. In a further embodiment, theanonymization device further includes an anonymization device having aselector circuit operable to select an anonymization policy, where theanonymization policy includes obscuring at least one of a variable, arecognizable, a distinguishable, and/or a unique aspect of a property ofthe class of subjects depicted in the captured image. In anotherembodiment, the anonymization device further includes an anonymizationdevice having a selector circuit operable to select an anonymizationpolicy, where the anonymization policy includes obscuring at least oneof a variable, a recognizable, a distinguishable, and/or a unique aspectof a property of each instance of the class of subjects depicted in thecaptured image. In a further embodiment, the anonymization devicefurther includes an anonymization device having a selector circuitoperable to select an anonymization policy, where the anonymizationpolicy includes obscuring at least one of a face, an age, and/or aracial aspect of at least one person depicted in the captured image. Forexample, if the anonymization includes decreasing a fidelity of a faceof a member of the class of subjects, a fidelity is reduced of eachhuman face depicted in the captured image. An example of such decreasedfidelity includes the decreased fidelity of human faces 408A-408Cillustrated in conjunction with FIG. 5. In another embodiment, theanonymization device further includes an anonymization device having aselector circuit operable to select an anonymization policy, where theanonymization policy includes obscuring a property of the class ofsubjects depicted in the captured image before at least one of apersistent storage of the captured image, and/or a transmission of thecaptured image. For example, the anonymization policy may be applied tothe class of subjects depicted in the captured image before the capturedimage is saved in a storage device, such as before an anonymizedcaptured image 1642 is saved in a storage device 1640 of the imagingdevice 1610 and/or before an anonymized captured image 1694 is saved ina storage device 1690 of the anonymization device 1650. In anotherexample, a captured image may be transitorily saved in a volatile memory(not shown) before the anonymization policy is applied and the imagepersistently saved in a more permanent memory and/or non-volatile media,such as the storage 1640 and/or the storage 1690.

In an embodiment, the broadcast device (1612, 1652) operable to displaya human-perceivable indication of the selected anonymization policy toat least a portion of the area 1603 further includes a broadcast deviceoperable to display at least one of an audio, a visual, and/or a tactilehuman-perceivable indication of the selected anonymization policy to atleast a portion of the area. In a further embodiment, the imaging device1610 further includes the broadcast device 1612 operable to display ahuman-perceivable indication of the selected anonymization policy to atleast a portion of the area. In another embodiment, the anonymizationdevice further includes the broadcast device 1652 operable to display ahuman-perceivable indication of the selected anonymization policy to atleast a portion of the area.

In an embodiment, the anonymization circuit (1630, 1680) operable togenerate an anonymized image by applying the selected anonymizationpolicy to an image captured by the imaging device 1610 and depicting amember of the class of subjects further includes an anonymizationcircuit operable to generate an anonymized image by applying theselected anonymization policy to an image captured by the imaging deviceand depicting a member of the class of subjects. The anonymizationpolicy is applied before the image is persistently saved. In anotherembodiment, the anonymization policy is applied after the image ispersistently saved. In a further embodiment, the anonymization policy isapplied contemporaneously with a saving the image to a persistentlystorage. In another embodiment, the anonymization circuit furtherincludes an anonymization circuit operable to generate an anonymizedimage by applying the selected anonymization policy to asemi-permanently or permanently saved image captured by the imagingdevice and depicting a member of the class of subjects.

In an embodiment, the system 1600 further includes a persistent storagemedia configurable by a digital file representative of the anonymizedimage. In another embodiment, the imaging device 1610 further includes apersistent storage media 1640 configurable by a digital filerepresentative of the anonymized image 1642. In a further embodiment,the anonymization device 1650 further includes a persistent storagemedia 1690 configurable by a digital file representative of theanonymized image 1694.

A use of an embodiment of the system 1600 may be illustrated inconjunction with FIGS. 4 and 5. For example, one or more instances ofthe imaging device 1610 may be located in the area 403 in a mannersimilar to the image capture device 420, and coupled with theanonymization device 1650, which may be remote to the area 403. Thebroadcast device may be physically associated with a structure in thearea, such as illustrated in FIG. 3 as the display 440A, and/or may bethe broadcast device 1612 associated with the imaging device. In thisexample, the anonymizer circuit is associated with the anonymizationdevice. The selector circuit 1660 selects an anonymization policy forapplication to the area. The anonymization policy includes obscuring aproperty of the class of subjects depicted in a captured image. Anindication of the selected anonymization policy is transmitted by acommunications module 1695 of the anonymization device to acommunications module 1645 of the imaging device and/or a communicationsmodule (not shown) associated with the display 440A. The broadcastdevice is then activated and displays a human-perceivable indication ofthe selected anonymization policy to at least a portion of the area.

An image captured by the imaging device 1610 is subjected to theselected anonymization policy. For example, the selected anonymizationpolicy may be applied to the captured image by the anonymization circuit1630, and then may be saved in the storage 1640 of the imaging device.FIG. 5 illustrates a possible result of an application of the selectedanonymization policy. Alternatively, the captured image may becommunicated via the communications modules 1645 and 1695 to theanonymization device 1650 without an unanonymized version beingpersistently saved at the imaging device 1610. The selectedanonymization policy is then applied to the captured image by theanonymization circuit 1680 and then may saved to the storage 1690 orcommunicated to another storage device.

FIG. 25 illustrates an exemplary operational flow 1700. After a startoperation, the operational flow moves to a dissemination operation 1710.The dissemination operation receives an anonymization policy in an imagecapture device operable to capture an image of a class of subjectshaving a temporal presence in an area. In a further embodiment, thedissemination operation wirelessly receives an anonymization policy inan image capture device operable to capture an image of a class ofsubjects having a temporal presence in an area. In an alternativeembodiment, the dissemination operation receives an anonymization policyin at least one image capture device operable to capture an image of aclass of subjects having a temporal presence in an area. In anotherembodiment, the dissemination operation receives via a wired coupling ananonymization policy in at least one image capture device operable tocapture an image of a class of subjects having a temporal presence in anarea. The anonymization policy includes obscuring a property of a classof subjects depicted in an image. A notification operation 1720broadcasts a human-perceivable indication of the anonymization policy toat least a portion of the area. A de-personalizing operation 1740generates an obscured image of a member of the class of subjects byapplying the selected anonymization policy to an image captured by theimage capture device and depicting the member of the class of subjects.The operational flow then moves to an end operation.

FIG. 26 illustrates an alternative embodiment of the exemplaryoperational flow 1700 of FIG. 25. The dissemination operation 1710 mayinclude at least one additional operation, such as the operation 1712.The operation 1712 receives an anonymization policy in at least twoimage capture devices each operable to capture an image of a class ofsubjects having a temporal presence in an area. In an alternativeembodiment, the dissemination operation may include wirelessly receivingan anonymization policy in at least two image capture devices eachoperable to capture an image of a class of subjects having a temporalpresence in an area (not shown). The notification operation 1720 mayinclude at least one additional operation. The at least one additionaloperation may include an operation 1722, and/or the operation 1724. Theoperation 1722 broadcasts a human-perceivable indication of theanonymization policy to at least a portion of the area from a displaycoupled with the image capture device. The operation 1724 broadcasts ahuman-perceivable indication of the anonymization policy to at least aportion of the area from a display not coupled with the image capturedevice.

FIG. 27 illustrates another alternative embodiment of the exemplaryoperational flow 1700 of FIG. 25. The de-personalizing operation 1740may include at least one additional operation. The at least oneadditional operation may include an operation 1742, and/or the operation1744. The operation 1742 generates using a processor associated with theimage capture device an obscured image of a member of the class ofsubjects by applying the selected anonymization policy to an imagecaptured by the image capture device and depicting the member of theclass of subjects. The operation 1744 receives an image depicting amember of a class of subjects captured by the image capture device andgenerating an obscured image of the member of the class of subjects byapplying the selected anonymization policy to the received imagedepicting a member of the class of subjects. In an alternativeembodiment, the operation 1744 wirelessly receives an image depicting amember of a class of subjects captured by the image capture device andgenerating an obscured image of the member of the class of subjects byapplying the selected anonymization policy to the received imagedepicting a member of the class of subjects.

FIG. 28 illustrates a further alternative embodiment of the exemplaryoperational flow 1700 of FIG. 25. The de-personalizing operation 1740may include at least one additional operation. The at least oneadditional operation may include an operation 1746. The operation 1746generates an obscured image of a member of the class of subjects byobscuring at least one of a person, an article, an object, a face, alicense plate, and/or a label in an image captured by the image capturedevice and depicting the member of the class of subjects.

FIG. 29 illustrates a further alternative embodiment of the exemplaryoperational flow 1700 of FIG. 25. The operational flow may include atleast one additional operation, such as a choosing operation 1760. Thechoosing operation selects the anonymization policy. The choosingoperation may include at least one additional operation. The at leastone additional operation may include an operation 1762, and/or theoperation 1764. The operation 1762 selects the anonymization policy fromat least two anonymization policies. The operation 1764 selects theanonymization policy from at least two anonymization policies inresponse to at least one of a received human-initiated input, inresponse to a signal received from a remote device, and/or a selectionalgorithm.

FIG. 30 illustrates a further alternative embodiment of the exemplaryoperational flow 1700 of FIG. 25. The operational flow may include atleast one additional operation, such as a storage operation 1770. Thestorage operation configures a persistent computer-readable storagemedia with data representative of the obscured image. A persistentcomputer-readable storage media may include a non-volatile computerstorage media, which may include a removable and/or a non-removablemedia. The persistent computer-readable storage media may be implementedin any method or technology for storage of information such ascomputer-readable instructions, data structures, program modules, orother data, such as CD-ROM, digital versatile disks (DVD), or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage, or other magnetic storage devices, or any other medium whichcan be used to store the desired information and which can be accessedby a computing device. Combinations of any of the above may also beincluded within the scope of computer-readable media. A persistentcomputer-readable storage media may include a group of persistentcomputer-readable storage. In another embodiment, a persistentcomputer-readable storage may include a quantum memory, a photonicquantum memory, and/or atomic quantum memory.

FIG. 31 illustrates an embodiment of an exemplary system 1800. Thesystem includes means 1810 for wirelessly receiving an anonymizationpolicy to an image capture device operable to capture an image of aclass of subjects having a temporal presence in an area. Theanonymization policy includes obscuring a property of a class ofsubjects depicted in an image. The system also includes means 1820 forbroadcasting a human-perceivable indication of the anonymization policyto at least a portion of the area. The system further includes means1830 for generating an obscured image of a member of the class ofsubjects by applying the selected anonymization policy to an imagecaptured by the image capture device and depicting the member of theclass of subjects.

In an alternative embodiment, the system further includes means 1840 forselecting the anonymization policy from at least two anonymizationpolicies. In another embodiment, the system further includes means 1850for configuring a persistent computer-readable storage media with a filerepresentative of the obscured image.

FIG. 32 illustrates an exemplary operational flow 1900. After a startoperation, the operational flow moves to an operation 1910. Theoperation 1910 receives a signal corresponding to an anonymizationpolicy. The anonymization policy includes obscuring a property of aclass of subjects depicted in an image. An operation 1920 broadcasts ahuman-perceivable indication of the anonymization policy to at least aportion of an area. An operation 1930 captures an image depicting amember of the class of subjects having a presence in an area. Anoperation 1940 generates an obscured image of the member of the class ofsubjects by applying the anonymization policy to the captured imagedepicting the member of the class of subjects. The operational flow thenmoves to an end operation.

In an alternative embodiment, the operation 1910 further includeswirelessly receiving a signal corresponding to an anonymization policy.In a further embodiment, the operation 1910 further includes receiving asignal corresponding to an anonymization policy in a communicationsdevice operable to broadcast the human-perceivable indication of theanonymization policy to at least a portion of an area. In anotherembodiment, the operation 1920 further includes broadcasting ahuman-perceivable indication of the anonymization policy to at least aportion of an area from a communications device.

It will be understood by those skilled in the art that the variouscomponents and elements disclosed herein and in the drawings, as well asthe various steps and substeps disclosed herein and in the drawings, maybe incorporated together in different combinations to implementembodiments and enhance possible benefits and advantages. The exemplarysystem, apparatus, and device embodiment disclosed herein, includingFIGS. 1-5, 12, 14-15, 17-18, 22-24, and 31, along with other components,devices, know-how, skill, and techniques that are known in the art maybe individually or in a combination to implement and/or practice one ormore methods and processes illustrated in FIGS. 6-11, 13, 16, 19-21,25-30, and 32. It is to be understood that the methods and processes canbe incorporated in one or more different types of computer programproducts with a carrier medium having program instructions encodedthereon. However, it is to be further understood by those skilled in theart that other systems, apparatus, and technology may be used toimplement and practice such methods and processes.

The foregoing detailed description has set forth various embodiments ofthe devices and/or processes via the use of block diagrams, flowdiagrams, operation diagrams, flowcharts, illustrations, and/orexamples. Insofar as such block diagrams, operation diagrams,flowcharts, illustrations, and/or examples contain one or more functionsand/or operations, it will be understood that each function and/oroperation within such block diagrams, operation diagrams, flowcharts,illustrations, or examples can be implemented, individually and/orcollectively, by a wide range of hardware, software, firmware, orvirtually any combination thereof unless otherwise indicated. Aparticular block diagram, operation diagram, flowchart, illustration,environment, and/or example should not be interpreted as having anydependency or requirement relating to any one or combination ofcomponents illustrated therein. For example, in certain instances, oneor more elements of an environment may be deemed not necessary andomitted. In other instances, one or more other elements may be deemednecessary and added.

Those having skill in the art will recognize that the state of the arthas progressed to the point where there is little distinction leftbetween hardware and software implementations of aspects of systems; theuse of hardware or software is generally (but not always, in that incertain contexts the choice between hardware and software can becomesignificant) a design choice representing cost vs. efficiency tradeoffs.Those having skill in the art will appreciate that there are variousvehicles by which processes and/or systems and/or other technologiesdescribed herein can be effected (e.g., hardware, software, and/orfirmware), and that the preferred vehicle will vary with the context inwhich the processes and/or systems and/or other technologies aredeployed. For example, if an implementer determines that speed andaccuracy are paramount, the implementer may opt for a mainly hardwareand/or firmware vehicle; alternatively, if flexibility is paramount, theimplementer may opt for a mainly software implementation; or, yet againalternatively, the implementer may opt for some combination of hardware,software, and/or firmware. Hence, there are several possible vehicles bywhich the processes and/or devices and/or other technologies describedherein may be effected, none of which is inherently superior to theother in that any vehicle to be utilized is a choice dependent upon thecontext in which the vehicle will be deployed and the specific concerns(e.g., speed, flexibility, or predictability) of the implementer, any ofwhich may vary. Those skilled in the art will recognize that opticalaspects of implementations will typically employ optically-orientedhardware, software, and or firmware.

In addition, those skilled in the art will appreciate that themechanisms of the subject matter described herein are capable of beingdistributed as a program product in a variety of forms, and that anillustrative embodiment of the subject matter described herein appliesequally regardless of the particular type of signal-bearing media usedto actually carry out the distribution. Examples of a signal-bearingmedia include, but are not limited to, the following: recordable typemedia such as floppy disks, hard disk drives, CD ROMs, digital tape, andcomputer memory; and transmission type media such as digital and analogcommunication links using TDM or IP based communication links (e.g.,packet links).

It will be understood by those within the art that, in general, termsused herein, and especially in the appended claims (e.g., bodies of theappended claims) are generally intended as “open” terms (e.g., the term“including” should be interpreted as “including but not limited to,” theterm “having” should be interpreted as “having at least,” the term“includes” should be interpreted as “includes but is not limited to,”etc.). It will be further understood by those within the art that if aspecific number of an introduced claim recitation is intended, such anintent will be explicitly recited in the claim, and in the absence ofsuch recitation no such intent is present. For example, as an aid tounderstanding, the following appended claims may contain usage of theintroductory phrases “at least one” and “one or more” to introduce claimrecitations. However, the use of such phrases should not be construed toimply that the introduction of a claim recitation by the indefinitearticles “a” or “an” limits any particular claim containing suchintroduced claim recitation to inventions containing only one suchrecitation, even when the same claim includes the introductory phrases“one or more” or “at least one” and indefinite articles such as “a” or“an” (e.g., “a” and/or “an” should typically be interpreted to mean “atleast one” or “one or more”); the same holds true for the use ofdefinite articles used to introduce claim recitations. In addition, evenif a specific number of an introduced claim recitation is explicitlyrecited, those skilled in the art will recognize that such recitationshould typically be interpreted to mean at least the recited number(e.g., the bare recitation of “two recitations,” without othermodifiers, typically means at least two recitations, or two or morerecitations). Furthermore, in those instances where a conventionanalogous to “at least one of A, B, and C, etc.” is used, in generalsuch a construction is intended in the sense one having skill in the artwould understand the convention (e.g., “a system having at least one ofA, B, and C” would include but not be limited to systems that have Aalone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.). In those instances where aconvention analogous to “at least one of A, B, or C, etc.” is used, ingeneral such a construction is intended in the sense one having skill inthe art would understand the convention (e.g., “a system having at leastone of A, B, or C” would include but not be limited to systems that haveA alone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.).

The herein described aspects depict different components containedwithin, or connected with, different other components. It is to beunderstood that such depicted architectures are merely exemplary, andthat in fact many other architectures can be implemented which achievethe same functionality. In a conceptual sense, any arrangement ofcomponents to achieve the same functionality is effectively “associated”such that the desired functionality is achieved. Hence, any twocomponents herein combined to achieve a particular functionality can beseen as “associated with” each other such that the desired functionalityis achieved, irrespective of architectures or intermedial components.Likewise, any two components so associated can also be viewed as being“operably connected,” or “operably coupled,” to each other to achievethe desired functionality. Any two components capable of being soassociated can also be viewed as being “operably couplable” to eachother to achieve the desired functionality. Specific examples ofoperably couplable include but are not limited to physically mateableand/or physically interacting components and/or wirelessly interactableand/or wirelessly interacting components.

While various aspects and embodiments have been disclosed herein, otheraspects and embodiments will be apparent to those skilled in the art.The various aspects and embodiments disclosed herein are for purposes ofillustration and are not intended to be limiting, with the true scopeand spirit being indicated by the following claims.

What is claimed is:
 1. A device comprising: an anonymization moduledisposed in the device operable to produce in response to ananonymization policy an anonymized image by causing a reduction infidelity of a feature of a subject depicted in a received digital and/oranalog image; and a communications module disposed in the deviceoperable to send a signal indicative of the anonymization policy; and adisplay module coupled to the anonymization module, the display moduleoperable to display an indication of anonymization policy perceivable bya human proximate to the subject and prior to a capture of the receivedimage.
 2. The device of claim 1, wherein the anonymization moduleoperable to produce in response to an anonymization policy an anonymizedimage by causing a reduction in fidelity of a feature of a subjectdepicted in a received image further includes: an anonymization moduleoperable to produce in response to an anonymization policy an anonymizedimage by causing a reduction in fidelity of at least one of adistinguishing part, aspect, and/or characteristic of a subject depictedin a received image.
 3. The device of claim 1, wherein the anonymizationmodule operable to produce in response to an anonymization policy ananonymized image by causing a reduction in fidelity of a feature of asubject depicted in a received image further includes: an anonymizationmodule operable to produce in response to an anonymization policy ananonymized image by causing a reduction in fidelity of at least one of aperson, face, article, license plate, and/or label associated with asubject depicted in a received image.
 4. The device of claim 1, whereinthe anonymization module operable to produce in response to ananonymization policy an anonymized image by causing a reduction infidelity of a feature of a subject depicted in a received image furtherincludes: an anonymization module operable to produce in response to ananonymization policy an anonymized image by causing a reduction infidelity of a feature of a subject represented in a received digitalsignal.
 5. The device of claim 1, wherein the anonymization moduleoperable to produce an anonymized image by causing in response to ananonymization policy a reduction in fidelity of a feature of a subjectdepicted in a received image further includes: an anonymization moduleoperable to produce an anonymized image by at least one of initiating,triggering, instigating, bringing about, and/or affecting a reduction infidelity of a feature of a subject depicted in a received image inresponse to an anonymization policy.
 6. The device of claim 1, whereinthe communications module operable to send a signal indicative of theanonymization policy further includes: a communications module operableto send a signal indicative of the anonymization policy and receivableby a local image capture device.
 7. The device of claim 1, wherein thecommunications module operable to send a signal indicative of theanonymization policy further includes: a communications module operableto send a signal indicative of the anonymization policy and receivableby a remotely located image capture device.
 8. The device of claim 1,wherein the communications module operable to send a signal indicativeof the anonymization policy further includes: a communications moduleoperable to send a signal indicative of the anonymization policy andreceivable by an anonymization indicator located at a locationphysically removed from the anonymization module.
 9. The device of claim1, wherein the communications module operable to send a signalindicative of the anonymization policy further includes: acommunications module operable to send a signal indicative of theanonymization policy and receivable by a remotely located anonymizationindicator that is coupled with an image capture system operable tocapture and transmit the image.
 10. The device of claim 1, wherein thecommunications module operable to send a signal indicative of theanonymization policy further includes: a communications module operableto send a signal indicative of the anonymization policy and to receivethe image depicting a subject.
 11. The device of claim 1, furthercomprising: a selector module operable to designate the anonymizationpolicy.
 12. The device of claim 1, further comprising: a selector moduleoperable to choose the anonymization policy from at least twoanonymization policies.
 13. The device of claim 12, wherein the selectormodule operable to choose the anonymization policy from at least twoanonymization policies further includes: a selector module operable toimplement the anonymization policy from at least two anonymizationpolicies.
 14. The device of claim 12, wherein the selector moduleoperable to choose the anonymization policy from at least twoanonymization policies further includes: a selector module operable todesignate the anonymization policy in response to at least one of areceived human input, a selection received from an anonymizationcontroller, and/or a selection algorithm.
 15. The device of claim 12,wherein the selector module operable to choose the anonymization policyfrom at least two anonymization policies further includes: a selectormodule operable to choose the anonymization policy from a library of atleast two anonymization policies.
 16. The device of claim 12, whereinthe selector module operable to choose the anonymization policy from atleast two anonymization policies further includes: a selector moduleoperable to choose the anonymization policy from at least twoanonymization policies, the selected policy persisting as the selectedpolicy for a time.
 17. The device of claim 1, wherein the anonymizationmodule further includes a selector module operable to designate theanonymization policy.
 18. The device of claim 1, wherein theanonymization module further includes a selector module operable tochoose the anonymization policy from at least two anonymizationpolicies.
 19. The device of claim 1, further comprising: a digitalstorage media configurable by the anonymized image.
 20. The device ofclaim 1, further comprising: a computing device.
 21. The device of claim1, further comprising: a computing device that includes theanonymization module.
 22. A method comprising: obscuring a property of asubject depicted in a received image in response to a privacy policy;and displaying an indication of the privacy policy perceivable by ahuman proximate to the subject and prior to a capture of the receivedimage; and sending a signal indicative of the privacy policy to at leasta human-perceivable display.
 23. The method of claim 22, wherein theobscuring a property of a subject depicted in a received image inresponse to a privacy policy further includes: obscuring a person,article, object, face, license plate, and/or label of a subject depictedin a received image in response to a privacy policy.
 24. The method ofclaim 22, wherein the obscuring a property of a subject depicted in areceived image in response to a privacy policy further includes:obscuring a property of a subject depicted in a received digital, and/oranalog image in response to a privacy policy.
 25. The method of claim22, wherein the sending a signal indicative of the privacy policyfurther includes: sending a signal indicative of the privacy policy andreceivable by at least one of a remotely located image capture device, aprivacy policy indicator at a location physically distant from thedevice, and/or a local privacy policy indicator.
 26. The method of claim22, further comprising: displaying an indication of the privacy policyperceivable by a human proximate to the subject and prior to a captureof the received image.
 27. The method of claim 22, further comprising:receiving the image depicting the subject.
 28. The method of claim 22,further comprising: saving digital data representative of the subjectdepicted in the received image with the property obscured in response tothe privacy policy.
 29. A device comprising: means for obscuring inresponse to a privacy policy a property of a subject depicted in areceived image; means for displaying an indication of the privacy policyperceivable by a human proximate to the subject and near in time to acapture of the received image; and means for sending a signal indicativeof the privacy policy receivable by a human-perceivable display andmeans for displaying an indication of the privacy policy perceivable bya human proximate to the subject and prior to a capture of the receivedimage.
 30. The device of claim 29, wherein the means for sending asignal indicative of the privacy policy receivable by ahuman-perceivable display include: means for broadcasting the privacypolicy.
 31. The device of claim 29, further comprising: means for savingdigital data representative of the subject depicted in the receivedimage with the property obscured in response to the privacy policy. 32.A computer-program product comprising a non-transitory computer-readablemedium: a) program instructions operable to perform a process via acomputing device, the process comprising: sending a signal indicative ofa privacy policy receivable by at least a human-perceivable display;obscuring a property of a subject depicted in a received image inresponse to the privacy policy; and causing a displayed indication ofthe privacy policy perceivable by a human proximate to the subject andprior to a capture of the received image; and b) a computer-readablesignal bearing medium bearing the program instructions.
 33. The computerprogram product of claim 32, wherein the process further includes:receiving the image depicting the subject.
 34. The computer programproduct of claim 32, wherein the process further includes: savingdigital data representative of the subject depicted in the receivedimage with the property obscured in response to the privacy policy. 35.The computer program product of claim 32, wherein the computer-readablesignal bearing medium further includes: a computer storage medium.