{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:31:45Z","timestamp":1743085905854,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030425036"},{"type":"electronic","value":"9783030425043"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42504-3_14","type":"book-chapter","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T18:03:57Z","timestamp":1583863437000},"page":"209-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Privatizer for Biometric Applications and Online Identity Management"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Garofalo","sequence":"first","affiliation":[]},{"given":"Davy","family":"Preuveneers","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1007\/978-3-030-11009-3_34","volume-title":"Computer Vision \u2013 ECCV 2018 Workshops","author":"M Alvi","year":"2019","unstructured":"Alvi, M., Zisserman, A., Nell\u00e5ker, C.: Turning a blind eye: explicit removal of biases and variation from deep neural network embeddings. In: Leal-Taix\u00e9, L., Roth, S. (eds.) ECCV 2018. LNCS, vol. 11129, pp. 556\u2013572. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11009-3_34"},{"key":"14_CR2","unstructured":"American Academy of Ophthalmology: Evidence mounts that an eye scan may detect early Alzheimer\u2019s disease (2018). https:\/\/www.aao.org\/newsroom\/news-releases\/detail\/evidence-eye-scan-may-detect-early-alzheimers. Accessed 14 May 2019"},{"key":"14_CR3","unstructured":"Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv:1803.01271 (2018)"},{"key":"14_CR4","unstructured":"Buolamwini, J., Gebru, T.: Gender shades: intersectional accuracy disparities in commercial gender classification. In: Proceedings of the 1st Conference on Fairness, Accountability and Transparency. Proceedings of Machine Learning Research, vol. 81, pp. 77\u201391. PMLR, New York, 23\u201324 February 2018"},{"key":"14_CR5","unstructured":"Cohn, J.: Google\u2019s algorithms discriminate against women and people of colour (2019). http:\/\/theconversation.com\/googles-algorithms-discriminate-against-women-and-people-of-colour-112516. Accessed 14 May 2019"},{"issue":"3","key":"14_CR6","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/TIFS.2015.2480381","volume":"11","author":"A Dantcheva","year":"2016","unstructured":"Dantcheva, A., Elia, P., Ross, A.: What else does your biometric data reveal? A survey on soft biometrics. IEEE Trans. Inf. Forensics Secur. 11(3), 441\u2013467 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-030-11009-3_35","volume-title":"Computer Vision \u2013 ECCV 2018 Workshops","author":"A Das","year":"2019","unstructured":"Das, A., Dantcheva, A., Bremond, F.: Mitigating bias in gender, age and ethnicity classification: a multi-task convolution neural network approach. In: Leal-Taix\u00e9, L., Roth, S. (eds.) ECCV 2018. LNCS, vol. 11129, pp. 573\u2013585. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11009-3_35"},{"key":"14_CR8","unstructured":"European Parliament: Regulation (EU) 2016 of the European Parliament and of the Council, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (2016)"},{"key":"14_CR9","unstructured":"Gafurov, D.: A survey of biometric gait recognition: approaches, security and challenges. In: NIK Conference (2007)"},{"issue":"59","key":"14_CR10","first-page":"1","volume":"17","author":"Y Ganin","year":"2016","unstructured":"Ganin, Y., et al.: Domain-adversarial training of neural networks. J. Mach. Learn. Res. 17(59), 1\u201335 (2016)","journal-title":"J. Mach. Learn. Res."},{"issue":"6","key":"14_CR11","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1109\/TIFS.2017.2788000","volume":"13","author":"M Gomez-Barrero","year":"2018","unstructured":"Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406\u20131420 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR12","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems 27, pp. 2672\u20132680. Curran Associates, Inc. (2014)"},{"key":"14_CR13","unstructured":"Hao, K.: This is how AI bias really happens\u2014and why it\u2019s so hard to fix (2019). https:\/\/www.technologyreview.com\/s\/612876\/this-is-how-ai-bias-really-happensand-why-its-so-hard-to-fix\/. Accessed 14 May 2019"},{"issue":"12","key":"14_CR14","doi-asserted-by":"publisher","first-page":"656","DOI":"10.3390\/e19120656","volume":"19","author":"C Huang","year":"2017","unstructured":"Huang, C., Kairouz, P., Chen, X., Sankar, L., Rajagopal, R.: Context-aware generative adversarial privacy. Entropy 19(12), 656 (2017)","journal-title":"Entropy"},{"key":"14_CR15","unstructured":"Information technology - Security techniques - Biometric information protection. Standard, International Organization for Standardization (2011)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Malekzadeh, M., Clegg, R.G., Cavallaro, A., Haddadi, H.: Mobile sensor data anonymization. In: Proceedings of the International Conference on Internet of Things Design and Implementation, IoTDI 2019, pp. 49\u201358. ACM (2019)","DOI":"10.1145\/3302505.3310068"},{"issue":"4","key":"14_CR17","doi-asserted-by":"publisher","first-page":"86:1","DOI":"10.1145\/3340293","volume":"52","author":"MD Marsico","year":"2019","unstructured":"Marsico, M.D., Mecca, A.: A survey on gait recognition via wearable sensors. ACM Comput. Surv. 52(4), 86:1\u201386:39 (2019)","journal-title":"ACM Comput. Surv."},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Matovu, R., Serwadda, A.: Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20137, September 2016","DOI":"10.1109\/BTAS.2016.7791210"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Mirjalili, V., Raschka, S., Ross, A.: Gender privacy: an ensemble of semi adversarial networks for confounding arbitrary gender classifiers. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u201310, October 2018","DOI":"10.1109\/BTAS.2018.8698605"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"99735","DOI":"10.1109\/ACCESS.2019.2924619","volume":"7","author":"V Mirjalili","year":"2019","unstructured":"Mirjalili, V., Raschka, S., Ross, A.: FlowSAN: privacy-enhancing semi-adversarial networks to confound arbitrary face-based gender classifiers. IEEE Access 7, 99735\u201399745 (2019)","journal-title":"IEEE Access"},{"key":"14_CR21","unstructured":"Morales, A., Fi\u00e9rrez, J., Vera-Rodr\u00edguez, R.: SensitiveNets: learning agnostic representations with application to face recognition. CoRR abs\/1902.00334 (2019)"},{"key":"14_CR22","series-title":"The International Library of Ethics, Law and Technology","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-94-007-3892-8_12","volume-title":"Second Generation Biometrics: The Ethical, Legal and Social Context","author":"E Mordini","year":"2012","unstructured":"Mordini, E., Ashton, H.: The transparent body: medical information, physical privacy and respect for body integrity. In: Mordini, E., Tzovaras, D. (eds.) Second Generation Biometrics: The Ethical, Legal and Social Context. The International Library of Ethics, Law and Technology, vol. 11, pp. 257\u2013283. Springer, Dordrecht (2012). https:\/\/doi.org\/10.1007\/978-94-007-3892-8_12"},{"issue":"4","key":"14_CR23","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.patcog.2014.10.012","volume":"48","author":"TT Ngo","year":"2015","unstructured":"Ngo, T.T., Makihara, Y., Nagahara, H., Mukaigawa, Y., Yagi, Y.: Similar gait action recognition using an inertial sensor. Pattern Recogn. 48(4), 1289\u20131301 (2015)","journal-title":"Pattern Recogn."},{"key":"14_CR24","unstructured":"Ossia, S.A., Shamsabadi, A.S., Taheri, A., Rabiee, H.R., Lane, N.D., Haddadi, H.: A hybrid deep learning architecture for privacy-preserving mobile analytics. CoRR abs\/1703.02952 (2017)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S., Chakrabarti, A.: Learning privacy preserving encodings through adversarial training. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE (2019)","DOI":"10.1109\/WACV.2019.00089"},{"key":"14_CR26","doi-asserted-by":"publisher","first-page":"5994","DOI":"10.1109\/ACCESS.2018.2889996","volume":"7","author":"Z Rui","year":"2019","unstructured":"Rui, Z., Yan, Z.: A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7, 5994\u20136009 (2019)","journal-title":"IEEE Access"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815\u2013823, June 2015","DOI":"10.1109\/CVPR.2015.7298682"},{"issue":"13","key":"14_CR28","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.3390\/s19132945","volume":"19","author":"T Van hamme","year":"2019","unstructured":"Van hamme, T., Garofalo, G., Argones R\u00faa, E., Preuveneers, D., Joosen, W.: A systematic comparison of age and gender prediction on IMU sensor-based gait traces. Sensors 19(13), 2945 (2019)","journal-title":"Sensors"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-319-61176-1_26","volume-title":"Data and Applications Security and Privacy XXXI","author":"T Van hamme","year":"2017","unstructured":"Van hamme, T., Preuveneers, D., Joosen, W.: Improving resilience of behaviometric based continuous authentication with multiple accelerometers. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 473\u2013485. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61176-1_26"},{"issue":"5","key":"14_CR30","doi-asserted-by":"publisher","first-page":"89:1","DOI":"10.1145\/3230633","volume":"51","author":"C Wan","year":"2018","unstructured":"Wan, C., Wang, L., Phoha, V.V.: A survey on gait recognition. ACM Comput. Surv. 51(5), 89:1\u201389:35 (2018)","journal-title":"ACM Comput. Surv."},{"key":"14_CR31","volume-title":"Autonomous Technology: Technics-Out-of-Control as a Theme in Political Thought","author":"L Winner","year":"1977","unstructured":"Winner, L.: Autonomous Technology: Technics-Out-of-Control as a Theme in Political Thought. MIT Press, Cambridge (1977)"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Zeitz, C., et al.: Security issues of internet-based biometric authentication systems: risks of man-in-the-middle and BioPhishing on the example of BioWebAuth. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents, p. 68190R (2008)","DOI":"10.1117\/12.767632"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Data for Better Living: AI and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42504-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T01:21:44Z","timestamp":1710033704000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42504-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030425036","9783030425043"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42504-3_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Windisch","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifip-summerschool.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}