{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:25:24Z","timestamp":1742973924557,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030057091"},{"type":"electronic","value":"9783030057107"}],"license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05710-7_14","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T07:48:55Z","timestamp":1544168935000},"page":"169-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Face Swapping for Solving Collateral Privacy Issues in Multimedia Analytics"],"prefix":"10.1007","author":[{"given":"Werner","family":"Bailer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Singh, R., Vatsa, M., Noore, A.: Swapped! digital face presentation attack detection via weighted local magnitude pattern. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 659\u2013665. IEEE (2017)","DOI":"10.1109\/BTAS.2017.8272754"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Ahonen, T., Rahtu, E., Ojansivu, V., Heikkila, J.: Recognition of blurred faces using local phase quantization. In: 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1\u20134. IEEE (2008)","DOI":"10.1109\/ICPR.2008.4761847"},{"key":"14_CR3","unstructured":"Badii, A., Einig, M., Piatrik, T., et al.: Overview of the mediaeval 2013 visual privacy task. In: MediaEval (2014)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Bergeron, C., Sidaty, N., Hamidouche, W., Boyadjis, B., Le Feuvre, J., Lim, Y.: Real-time selective encryption solution based on ROI for MPEG-a visual identity management AF. In: 2017 22nd International Conference on Digital Signal Processing (DSP), pp. 1\u20135, Aug 2017","DOI":"10.1109\/ICDSP.2017.8096144"},{"issue":"3","key":"14_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1360612.1360638","volume":"27","author":"Dmitri Bitouk","year":"2008","unstructured":"Bitouk, D., Kumar, N., Dhillon, S., Belhumeur, P., Nayar, S.K.: Face swapping: automatically replacing faces in photographs. In: ACM Transactions on Graphics (TOG), vol. 27, p. 39. ACM (2008)","journal-title":"ACM Transactions on Graphics"},{"key":"14_CR6","unstructured":"Evaluation framework for compact descriptors for video analysis - search and retrieval - version 2.0. Technical report ISO\/IEC JTC1\/SC29\/WG11\/N15729 (2015)"},{"key":"14_CR7","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union, L119:1\u201388, May 2016"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Hadid, A., Nishiyama, M., Sato, Y.: Recognition of blurred faces via facial deblurring combined with blur-tolerant descriptors. In: 2010 20th International Conference on Pattern Recognition (ICPR), pp. 1160\u20131163. IEEE (2010)","DOI":"10.1109\/ICPR.2010.290"},{"key":"14_CR9","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1002\/1099-0720(200101\/02)15:1<101::AID-ACP697>3.0.CO;2-7","volume":"15","author":"K Lander","year":"2001","unstructured":"Lander, K., Bruce, V., Hill, H.: Evaluating the effectiveness of pixelation and blurring on masking the identity of familiar faces. Appl. Cogn. Psychol. 15(1), 101\u2013116 (2001)","journal-title":"Appl. Cogn. Psychol."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Letournel, G., Bugeau, A., Ta, V.T., Domenger, J.P.: Face de-identification with expressions preservation. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 4366\u20134370. IEEE (2015)","DOI":"10.1109\/ICIP.2015.7351631"},{"issue":"2","key":"14_CR12","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/LSP.2013.2296532","volume":"21","author":"J Lin","year":"2014","unstructured":"Lin, J., Duan, L.-Y., Huang, Y., Luo, S., Huang, T., Gao, W.: Rate-adaptive compact fisher codes for mobile visual search. IEEE Signal Process. Lett. 21(2), 195\u2013198 (2014)","journal-title":"IEEE Signal Process. Lett."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of International Conference on Computer Vision (ICCV) (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Lou, Y., et al.: Compact deep invariant descriptors for video retrieval. In: Data Compression Conference (DCC), pp. 420\u2013429, April 2017","DOI":"10.1109\/DCC.2017.31"},{"issue":"2","key":"14_CR15","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Mahajan, S., Chen, L.J., Tsai, T.C.: SwapItUP: a face swap application for privacy protection. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 46\u201350. IEEE (2017)","DOI":"10.1109\/AINA.2017.53"},{"issue":"9","key":"14_CR17","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1049\/iet-spr.2016.0761","volume":"11","author":"L Meng","year":"2017","unstructured":"Meng, L., Sun, Z., Collado, O.T.: Efficient approach to de-identifying faces in videos. IET Sig. Process. 11(9), 1039\u20131045 (2017)","journal-title":"IET Sig. Process."},{"issue":"2","key":"14_CR18","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s00530-011-0244-y","volume":"18","author":"Y Nakashima","year":"2012","unstructured":"Nakashima, Y., Babaguchi, N., Fan, J.: Intended human object detection for automatically protecting privacy in mobile video surveillance. Multimed. Syst. 18(2), 157\u2013173 (2012)","journal-title":"Multimed. Syst."},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Natsume, R., Yatagawa, T., Morishima, S.: RSGAN: face swapping and editing using face and hair representation in latent spaces. arXiv preprint \n                      arXiv:1804.03447\n                      \n                     (2018)","DOI":"10.1145\/3230744.3230818"},{"issue":"2","key":"14_CR20","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"EM Newton","year":"2005","unstructured":"Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232\u2013243 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Masi, I., Tuan, A.T., Hassner, T., Medioni, G.: On face segmentation, face swapping, and face perception. In: 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition, FG 2018, pp. 98\u2013105. IEEE (2018)","DOI":"10.1109\/FG.2018.00024"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Nishiyama, M., Takeshima, H., Shotton, J., Kozakaya, T., Yamaguchi, O.: Facial deblur inference to improve recognition of blurred faces. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2009, pp. 1115\u20131122. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206750"},{"issue":"9","key":"14_CR23","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1016\/j.eswa.2015.01.041","volume":"42","author":"JR Padilla-L\u00f3pez","year":"2015","unstructured":"Padilla-L\u00f3pez, J.R., Chaaraoui, A.A., Fl\u00f3rez-Revuelta, F.: Visual privacy protection methods: a survey. Expert. Syst. Appl. 42(9), 4177\u20134195 (2015)","journal-title":"Expert. Syst. Appl."},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Philbin, J., Chum, O., Isard, M., Sivic, J., Zisserman, A.: Object retrieval with large vocabularies and fast spatial matching. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2007)","DOI":"10.1109\/CVPR.2007.383172"},{"key":"14_CR25","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. CoRR, abs\/1511.06434 (2015)"},{"issue":"1","key":"14_CR26","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s11042-012-1207-9","volume":"68","author":"M Saini","year":"2014","unstructured":"Saini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M.: W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Multimed. Tools Appl. 68(1), 135\u2013158 (2014)","journal-title":"Multimed. Tools Appl."},{"key":"14_CR27","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR, abs\/1409.1556 (2014)"},{"issue":"10","key":"14_CR28","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Sig. Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Sig. Process. Lett."},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zheng, L., Thing, V.L.: Automated face swapping and its detection. In: 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP), pp. 15\u201319. IEEE (2017)","DOI":"10.1109\/SIPROCESS.2017.8124497"}],"container-title":["Lecture Notes in Computer Science","MultiMedia Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05710-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T05:35:17Z","timestamp":1558330517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05710-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"ISBN":["9783030057091","9783030057107"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05710-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"8 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thessaloniki","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mmm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mmm2019.iti.gr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double blind for full papers and workshop papers, single blind for other paper types","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"204","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"96","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.67","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6 demonstration papers, 5 industry papers, 6 workshop papers, and 6 Video Browser Showdown papers were also accepted.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}