{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:03:22Z","timestamp":1742929402159,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031730092"},{"type":"electronic","value":"9783031730108"}],"license":[{"start":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T00:00:00Z","timestamp":1731196800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T00:00:00Z","timestamp":1731196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73010-8_17","type":"book-chapter","created":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T13:11:59Z","timestamp":1731157919000},"page":"280-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Veil Privacy on\u00a0Visual Data: Concealing Privacy for\u00a0Humans, Unveiling for\u00a0DNNs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5668-833X","authenticated-orcid":false,"given":"Shuchao","family":"Pang","sequence":"first","affiliation":[]},{"given":"Ruhao","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1875-2919","authenticated-orcid":false,"given":"Bing","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1337-0655","authenticated-orcid":false,"given":"Yongbin","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0337-9410","authenticated-orcid":false,"given":"Yazhou","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,10]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Almohammad, A., Ghinea, G.: Stego image quality and the reliability of PSNR. In: 2010 2nd International Conference on Image Processing Theory, Tools and Applications, pp. 215\u2013220. IEEE (2010)","DOI":"10.1109\/IPTA.2010.5586786"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Boddeti, V.N.: Secure face matching using fully homomorphic encryption. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u201310. IEEE (2018)","DOI":"10.1109\/BTAS.2018.8698601"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Cazenavette, G., Wang, T., Torralba, A., Efros, A.A., Zhu, J.Y.: Dataset distillation by matching training trajectories. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4750\u20134759 (2022)","DOI":"10.1109\/CVPR52688.2022.01045"},{"key":"17_CR4","unstructured":"Demontis, A., et al.: Why do adversarial attacks transfer? Explaining transferability of evasion and poisoning attacks. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 321\u2013338 (2019)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"2\u20133","key":"17_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0034-4257(03)00135-4","volume":"87","author":"PE Dennison","year":"2003","unstructured":"Dennison, P.E., Roberts, D.A.: Endmember selection for multiple endmember spectral mixture analysis using endmember average RMSE. Remote Sens. Environ. 87(2\u20133), 123\u2013135 (2003)","journal-title":"Remote Sens. Environ."},{"issue":"4","key":"17_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3161190","volume":"1","author":"M Dimiccoli","year":"2018","unstructured":"Dimiccoli, M., Mar\u00edn, J., Thomaz, E.: Mitigating bystander privacy concerns in egocentric activity recognition with deep learning and intentional image degradation. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 1(4), 1\u201318 (2018)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquit. Technol."},{"key":"17_CR8","unstructured":"Dong, T., Zhao, B., Lyu, L.: Privacy for free: how does dataset condensation help privacy? In: International Conference on Machine Learning, pp. 5378\u20135396. PMLR (2022)"},{"key":"17_CR9","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth $$16\\times 16$$ words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Frome, A., et al.: Large-scale privacy protection in Google street view. In: 2009 IEEE 12th International Conference on Computer Vision, pp. 2373\u20132380. IEEE (2009)","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"17_CR12","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M.: CryptoDL: deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1080\/13600834.2019.1573501","volume":"28","author":"CJ Hoofnagle","year":"2019","unstructured":"Hoofnagle, C.J., van der Sloot, B., Borgesius, F.Z.: The European union general data protection regulation: what it is and what it means. Inf. Commun. Technol. Law 28(1), 65\u201398 (2019)","journal-title":"Inf. Commun. Technol. Law"},{"key":"17_CR14","unstructured":"Huang, Y., Song, Z., Li, K., Arora, S.: InstaHide: instance-hiding schemes for private distributed learning. In: International Conference on Machine Learning, pp. 4507\u20134518. PMLR (2020)"},{"issue":"6245","key":"17_CR15","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan, M.I., Mitchell, T.M.: Machine learning: trends, perspectives, and prospects. Science 349(6245), 255\u2013260 (2015)","journal-title":"Science"},{"key":"17_CR16","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, vol. 25 (2012)"},{"issue":"11","key":"17_CR17","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","volume":"10","author":"JW Lee","year":"2022","unstructured":"Lee, J.W., et al.: Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 10, 30039\u201330054 (2022)","journal-title":"IEEE Access"},{"issue":"6","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1016\/j.eng.2019.09.002","volume":"5","author":"F Li","year":"2019","unstructured":"Li, F., Li, H., Niu, B., Chen, J.: Privacy computing: concept, computing framework, and future development trends. Engineering 5(6), 1179\u20131192 (2019)","journal-title":"Engineering"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-031-19769-7_3","volume-title":"European Conference on Computer Vision 2022","author":"D Liang","year":"2022","unstructured":"Liang, D., Xu, W., Bai, X.: An end-to-end transformer model for crowd localization. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13661, pp. 38\u201354. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19769-7_3"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Liu, B., Ding, M., Zhu, T., Xiang, Y., Zhou, W.: Using adversarial noises to protect privacy in deep learning era. In: 2018 IEEE Global Communications Conference (GLOBECOM), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/GLOCOM.2018.8647189"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Liu, B., Xiong, J., Wu, Y., Ding, M., Wu, C.M.: Protecting multimedia privacy from both humans and AI. In: 2019 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/BMSB47279.2019.8971914"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Mahesh, R., Meyyappan, T.: Anonymization technique through record elimination to preserve privacy of published data. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 328\u2013332. IEEE (2013)","DOI":"10.1109\/ICPRIME.2013.6496495"},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"28333","DOI":"10.1109\/ACCESS.2022.3157589","volume":"10","author":"H Montenegro","year":"2022","unstructured":"Montenegro, H., Silva, W., Gaudio, A., Fredrikson, M., Smailagic, A., Cardoso, J.S.: Privacy-preserving case-based explanations: enabling visual interpretability by protecting privacy. IEEE Access 10, 28333\u201328347 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3157589","journal-title":"IEEE Access"},{"key":"17_CR25","unstructured":"Nguyen, T., Chen, Z., Lee, J.: Dataset meta-learning from kernel ridge-regression. arXiv preprint arXiv:2011.00050 (2020)"},{"key":"17_CR26","unstructured":"Nguyen, T., Novak, R., Xiao, L., Lee, J.: Dataset distillation with infinitely wide convolutional networks. In: Advances in Neural Information Processing Systems, vol. 34, pp. 5186\u20135198 (2021)"},{"key":"17_CR27","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-031-19769-7_5","volume-title":"European Conference on Computer Vision 2022","author":"L Peng","year":"2022","unstructured":"Peng, L., Wu, X., Yang, Z., Liu, H., Cai, D.: DID-M3D: decoupling instance depth for monocular 3D object detection. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13661, pp. 71\u201388. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19769-7_5"},{"issue":"7","key":"17_CR28","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1109\/TMM.2020.2987694","volume":"22","author":"R Sanchez-Matilla","year":"2020","unstructured":"Sanchez-Matilla, R., Li, C.Y., Shamsabadi, A.S., Mazzon, R., Cavallaro, A.: Exploiting vulnerabilities of deep neural networks for privacy protection. IEEE Trans. Multimedia 22(7), 1862\u20131873 (2020)","journal-title":"IEEE Trans. Multimedia"},{"key":"17_CR29","unstructured":"Shan, S., Cryan, J., Wenger, E., Zheng, H., Hanocka, R., Zhao, B.Y.: Glaze: protecting artists from style mimicry by text-to-image models. In: 32nd USENIX Security Symposium (USENIX Security 2023), pp. 2187\u20132204 (2023)"},{"key":"17_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-030-00012-7_33","volume-title":"Cloud Computing and Security","author":"W Shen","year":"2018","unstructured":"Shen, W., Wu, Z., Zhang, J.: A face privacy protection algorithm based on block scrambling and deep learning. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018, Part III. LNCS, vol. 11065, pp. 359\u2013369. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00012-7_33"},{"key":"17_CR31","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Sirichotedumrong, W., Maekawa, T., Kinoshita, Y., Kiya, H.: Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 674\u2013678. IEEE (2019)","DOI":"10.1109\/ICIP.2019.8804201"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"de\u00a0la Torre, L.: A guide to the California consumer privacy act of 2018. Available at SSRN 3275571 (2018)","DOI":"10.2139\/ssrn.3275571"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Uittenbogaard, R., Sebastian, C., Vijverberg, J., Boom, B., Gavrila, D.M., et\u00a0al.: Privacy protection in street-view panoramas using depth and multi-view imagery. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10581\u201310590 (2019)","DOI":"10.1109\/CVPR.2019.01083"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Van\u00a0Le, T., Phung, H., Nguyen, T.H., Dao, Q., Tran, N.N., Tran, A.: Anti-DreamBooth: protecting users from personalized text-to-image synthesis. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 2116\u20132127 (2023)","DOI":"10.1109\/ICCV51070.2023.00202"},{"key":"17_CR36","unstructured":"Vyas, N., Kakade, S.M., Barak, B.: On provable copyright protection for generative models. In: International Conference on Machine Learning, pp. 35277\u201335299. PMLR (2023)"},{"key":"17_CR37","unstructured":"Wang, H., Bai, Y., Sun, G., Liu, J.: Privacy protection based on mask template. arXiv preprint arXiv:2202.06250 (2022)"},{"key":"17_CR38","doi-asserted-by":"publisher","first-page":"7314","DOI":"10.3934\/mbe.2022345","volume":"19","author":"H Wang","year":"2022","unstructured":"Wang, H., Sun, G., Zheng, K., Li, H., Liu, J., Bai, Y.: Privacy protection generalization with adversarial fusion. Math. Biosci. Eng. 19, 7314\u20137336 (2022)","journal-title":"Math. Biosci. Eng."},{"key":"17_CR39","unstructured":"Wang, H., et al.: Towards domain-specific network transport for distributed DNN training. In: 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 2024), pp. 1421\u20131443 (2024)"},{"key":"17_CR40","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jpdc.2019.03.003","volume":"130","author":"X Wang","year":"2019","unstructured":"Wang, X., Li, J., Kuang, X., Tan, Y.A., Li, J.: The security of machine learning in an adversarial setting: a survey. J. Parallel Distrib. Comput. 130, 12\u201323 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Wang, X., Asif, H., Vaidya, J.: Preserving missing data distribution in synthetic data. In: Proceedings of the ACM Web Conference 2023, pp. 2110\u20132121 (2023)","DOI":"10.1145\/3543507.3583297"},{"issue":"4","key":"17_CR42","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"17_CR43","doi-asserted-by":"crossref","unstructured":"Xue, H., Liu, B., Din, M., Song, L., Zhu, T.: Hiding private information in images from AI. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9148656"},{"key":"17_CR44","unstructured":"Yang, J.: Privacy protection for visual data against deep learning based computer vision models (2021)"},{"key":"17_CR45","doi-asserted-by":"crossref","unstructured":"Yang, T., Ren, P., Xie, X., Zhang, L.: GAN prior embedded network for blind face restoration in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 672\u2013681 (2021)","DOI":"10.1109\/CVPR46437.2021.00073"},{"key":"17_CR46","doi-asserted-by":"crossref","unstructured":"Yin, Y., et al.: Ginver: generative model inversion attacks against collaborative inference. In: Proceedings of the ACM Web Conference 2023, pp. 2122\u20132131 (2023)","DOI":"10.1145\/3543507.3583306"},{"issue":"5","key":"17_CR47","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TIFS.2016.2636090","volume":"12","author":"J Yu","year":"2016","unstructured":"Yu, J., Zhang, B., Kuang, Z., Lin, D., Fan, J.: iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans. Inf. Forensics Secur. 12(5), 1005\u20131016 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Jia, R., Pei, H., Wang, W., Li, B., Song, D.: The secret revealer: generative model-inversion attacks against deep neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 253\u2013261 (2020)","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"17_CR49","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-031-19769-7_7","volume-title":"European Conference on Computer Vision 2022","author":"C Zhao","year":"2022","unstructured":"Zhao, C., Hu, Y., Salzmann, M.: Fusing local similarities for retrieval-based 3D orientation estimation of unseen objects. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13661, pp. 106\u2013122. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19769-7_7"},{"key":"17_CR50","doi-asserted-by":"crossref","unstructured":"Zhou, H., et al.: Explaining generalization power of a DNN using interactive concepts. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a038, pp. 17105\u201317113 (2024)","DOI":"10.1609\/aaai.v38i15.29655"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73010-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T14:05:36Z","timestamp":1731161136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73010-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,10]]},"ISBN":["9783031730092","9783031730108"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73010-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,10]]},"assertion":[{"value":"10 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}