{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:43:50Z","timestamp":1772905430712,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031479687","type":"print"},{"value":"9783031479694","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47969-4_33","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T20:02:06Z","timestamp":1701374526000},"page":"417-430","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["I Got Your Emotion: Emotion Preserving Face De-identification Using Injection-Based Generative Adversarial Networks"],"prefix":"10.1007","author":[{"given":"Md","family":"Shopon","sequence":"first","affiliation":[]},{"given":"Marina L.","family":"Gavrilova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s11760-020-01819-9","volume":"15","author":"A Agarwal","year":"2021","unstructured":"Agarwal, A., Chattopadhyay, P., Wang, L.: Privacy preservation through facial de-identification with simultaneous emotion preservation. Signal Image Video Process. 15, 951\u2013958 (2021)","journal-title":"Signal Image Video Process."},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Brki\u0107, K., Hrka\u0107, T., Sikiri\u0107, I., Kalafati\u0107, Z.: Towards neural art-based face de-identification in video data. In: 2016 First International Workshop on Sensing, Processing and Learning for Intelligent Machines (SPLINE), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/SPLIM.2016.7528406"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Cao, Q., Shen, L., Xie, W., Parkhi, O.M., Zisserman, A.: VGGFace2: a dataset for recognising faces across pose and age. In: 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), pp. 67\u201374. IEEE (2018)","DOI":"10.1109\/FG.2018.00020"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Chen, R., Chen, X., Ni, B., Ge, Y.: SimSwap: an efficient framework for high fidelity face swapping. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 2003\u20132011 (2020)","DOI":"10.1145\/3394171.3413630"},{"key":"33_CR5","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1007\/978-3-030-22277-2_30","volume-title":"Handbook of Computer Networks and Cyber Security","author":"P Datta","year":"2020","unstructured":"Datta, P., Bhardwaj, S., Panda, S.N., Tanwar, S., Badotra, S.: Survey of security and privacy issues on biometric system. In: Gupta, B.B., Perez, G.M., Agrawal, D.P., Gupta, D. (eds.) Handbook of Computer Networks and Cyber Security, pp. 763\u2013776. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22277-2_30"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Frome, A., et al.: Large-scale privacy protection in google street view. In: IEEE 12th Int. Conference on Computer Vision, pp. 2373\u20132380 (2009)","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"33_CR8","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Workshop on Faces in \u2018Real-Life\u2019 Images: Detection, Alignment, and Recognition (2008)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4401\u20134410 (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"33_CR10","unstructured":"Khorzooghi, S.M.S.M., Nilizadeh, S.: StyleGAN as a utility-preserving face de-identification method. arXiv preprint arXiv:2212.02611 (2022)"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Korshunov, P., Cai, S., Ebrahimi, T.: Crowdsourcing approach for evaluation of privacy filters in video surveillance. In: Proceedings of the ACM Multimedia 2012 Workshop on Crowdsourcing for Multimedia, pp. 35\u201340 (2012)","DOI":"10.1145\/2390803.2390817"},{"key":"33_CR12","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Large-scale celeb faces attributes (CELEBA) dataset. Retrieved August 15(2018), 11 (2018)"},{"issue":"03","key":"33_CR13","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1142\/S0218001408006399","volume":"22","author":"Y Luo","year":"2008","unstructured":"Luo, Y., Gavrilova, M.L., Wang, P.S.: Facial metamorphosis using geometrical methods for biometric applications. Int. J. Pattern Recognit. Artif. Intell. 22(03), 555\u2013584 (2008)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"issue":"5","key":"33_CR14","first-page":"207","volume":"69","author":"S Marc\u00f3-Garc\u00eda","year":"2019","unstructured":"Marc\u00f3-Garc\u00eda, S., Ferrer-Quintero, M., Usall, J., Ochoa, S., Del Cacho, N., Huerta-Ramos, E.: Facial emotion recognition in neurological disorders: a narrative review. Rev. Neurol. 69(5), 207\u2013219 (2019)","journal-title":"Rev. Neurol."},{"key":"33_CR15","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s00371-013-0907-0","volume":"30","author":"PP Paul","year":"2014","unstructured":"Paul, P.P., Gavrilova, M., Klimenko, S.: Situation awareness of cancelable biometric system. Vis. Comput. 30, 1059\u20131067 (2014)","journal-title":"Vis. Comput."},{"issue":"7","key":"33_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S0969-4765(17)30138-8","volume":"2017","author":"P Punithavathi","year":"2017","unstructured":"Punithavathi, P., Subbiah, G.: Can cancellable biometrics preserve privacy? Biomet. Technol. Today 2017(7), 8\u201311 (2017)","journal-title":"Biomet. Technol. Today"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Ren, Z., Lee, Y.J., Ryoo, M.S.: Learning to anonymize faces for privacy preserving action detection. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 620\u2013636 (2018)","DOI":"10.1007\/978-3-030-01246-5_38"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Serengil, S.I., Ozpinar, A.: Hyperextended lightface: a facial attribute analysis framework. In: 2021 International Conference on Engineering and Emerging Technologies (ICEET), pp. 1\u20134. IEEE (2021)","DOI":"10.1109\/ICEET53442.2021.9659697"},{"key":"33_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-031-20716-7_7","volume-title":"Advances in Visual Computing","author":"B Shahbaz Nejad","year":"2022","unstructured":"Shahbaz Nejad, B., Roch, P., Handte, M., Marr\u00f3n, P.J.: Enhancing privacy in computer vision applications: an emotion preserving approach to obfuscate faces. In: Bebis, G., et al. (eds.) ISVC 2022. LNCS, vol. 13599, pp. 80\u201390. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20716-7_7"},{"key":"33_CR20","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-030-83620-7_17","volume-title":"Handbook of Artificial Intelligence in Healthcare","author":"M Shopon","year":"2022","unstructured":"Shopon, M., et al.: Biometric system de-identification: concepts, applications, and open problems. In: Lim, C.-P., Chen, Y.-W., Vaidya, A., Mahorkar, C., Jain, L.C. (eds.) Handbook of Artificial Intelligence in Healthcare. ISRL, vol. 212, pp. 393\u2013422. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-83620-7_17"},{"issue":"3","key":"33_CR21","doi-asserted-by":"publisher","first-page":"470","DOI":"10.3390\/jcp1030024","volume":"1","author":"M Shopon","year":"2021","unstructured":"Shopon, M., Tumpa, S.N., Bhatia, Y., Kumar, K.P., Gavrilova, M.L.: Biometric systems de-identification: current advancements and future directions. J. Cybersecur. Priv. 1(3), 470\u2013495 (2021)","journal-title":"J. Cybersecur. Priv."},{"issue":"2","key":"33_CR22","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TCSVT.2011.2106250","volume":"21","author":"H Sohn","year":"2011","unstructured":"Sohn, H., De Neve, W., Ro, Y.M.: Privacy protection in video surveillance systems: analysis of subband-adaptive scrambling in jpeg xr. IEEE Trans. Circuits Syst. Video Technol. 21(2), 170\u2013177 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Sun, Q., Ma, L., Oh, S.J., Van Gool, L., Schiele, B., Fritz, M.: Natural and effective obfuscation by head inpainting. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5050\u20135059 (2018)","DOI":"10.1109\/CVPR.2018.00530"},{"key":"33_CR24","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11390-019-1898-8","volume":"34","author":"Y Wu","year":"2019","unstructured":"Wu, Y., Yang, F., Xu, Y., Ling, H.: Privacy-protective-GAN for privacy preserving face de-identification. Comput. Sci. Technol. 34, 47\u201360 (2019)","journal-title":"Comput. Sci. Technol."},{"key":"33_CR25","unstructured":"Yanushkevich, S.N., Stoica, A., Srihari, S.N., Shmerko, V.P., Gavrilova, M.: Simulation of biometric information: the new generation of biometric systems. In: Int. Workshop Modeling and Simulation in Biometric Technology, pp. 87\u201398 (2004)"}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47969-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T20:05:42Z","timestamp":1701374742000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47969-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031479687","9783031479694"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47969-4_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISVC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Visual Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lake Tahoe, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isvc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isvc.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"232% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43 (oral), 15 (poster),  25 (special tracks) out of 34 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}