{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:45:45Z","timestamp":1743133545925,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319149974"},{"type":"electronic","value":"9783319149981"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14998-1_7","type":"book-chapter","created":{"date-parts":[[2015,4,2]],"date-time":"2015-04-02T18:57:00Z","timestamp":1428001020000},"page":"157-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Content-Based Privacy for Consumer-Produced Multimedia"],"prefix":"10.1007","author":[{"given":"Gerald","family":"Friedland","sequence":"first","affiliation":[]},{"given":"Adam","family":"Janin","sequence":"additional","affiliation":[]},{"given":"Howard","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Jaeyoung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Sommer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,1]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Prosser D (1960) Privacy. In: California law review, vol 48, p 383","DOI":"10.2307\/3478805"},{"key":"7_CR2","unstructured":"House TW (2012) Consumer data privacy in a networked world. http:\/\/www.whitehouse.gov\/sites\/default\/files\/privacy-final.pdf"},{"key":"7_CR3","unstructured":"Webster M (2013) Privacy. http:\/\/www.merriam-webster.com\/dictionary\/privacy"},{"key":"7_CR4","unstructured":"Wikipedia (2013) Secure communication.http:\/\/en.wikipedia.org\/wiki\/Secure_communication"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1111\/j.1748-720X.1997.tb01885.x","volume":"25","author":"L Sweeney","year":"1997","unstructured":"Sweeney L (1997) Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25:2\u20133","journal-title":"J Law Med Ethics"},{"key":"7_CR6","unstructured":"Aggarwal C (2005) On k-anonymity and the curse of dimensionality. In: Proceedings of the international conference on very large data bases"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Dinur I, Nissim K (2003) Revealing information while preserving privacy. In: ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems (PODS)","DOI":"10.1145\/773153.773173"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Dwork C (2006) Differential privacy. In: 33rd international colloquium on automata, languages, and programming (ICALP)","DOI":"10.1007\/11787006_1"},{"key":"7_CR9","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and applications of models of computation","author":"C Dwork","year":"2008","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: Agrawal M, Du D, Duan Z, Li A (eds) Theory and applications of models of computation., Lecture notes in computer scienceSpringer, Berlin, pp 1\u201319"},{"issue":"5","key":"7_CR10","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: a model for protecting privacy. J Uncertain Fuzziness Knowl-based Syst 10(5):557\u2013570","journal-title":"J Uncertain Fuzziness Knowl-based Syst"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: Proceedings of the IEEE symposium on security and privacy","DOI":"10.1109\/SP.2008.33"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the IEEE symposium on security and privacy","DOI":"10.1109\/SP.2009.22"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Chow R, Golle P, Staddon J (2008) Detecting privacy leaks using corpus-based association rules. In: Proceeding of the 14th ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/1401890.1401997"},{"key":"7_CR14","unstructured":"Staddon J, Golle P, Zimny B (2007) Web-based inference detection. In: Proceedings of 16th USENIX security symposium"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Griffith V, Jakobsson M (2005) Messin\u2019 with texas deriving mother\u2019s maiden names using public records. In: Proceedings of the international conference on applied cryptography and network security (ACNS)","DOI":"10.1007\/11496137_7"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Balduzzi M, Platzer C, Holz T, Kirda E, Balzarotti D, Kruegel C (2010) Abusing social networks for automated user profiling. In: 13th international symposium on recent advances in intrusion detection, 09 RAID\u20192010","DOI":"10.1007\/978-3-642-15512-3_22"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Bishop M, Cummins J, Peisert S, Singh A, Bhumiratana B, Agarwal D, Frincke D, Hogarth M (2010) Relationships and data sanitization: a study in scarlet. In: Proceedings of the workshop on new security paradigms","DOI":"10.1145\/1900546.1900567"},{"key":"7_CR18","unstructured":"Blumberg A, Eckersley P, On locational privacy, and how to avoid losing it forever. Electronic frontier foundation"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Hoh B, Gruteser M, Herring R, Ban J, Work D, Herrera J-C, Bayen AM, Annavaram M, Jacobson Q (2008) Virtual trip lines for distributed privacy-preserving traffic monitoring. In: Proceeding of the 6th international conference on mobile systems, applications, and services MobiSys\u201908","DOI":"10.1145\/1378600.1378604"},{"key":"7_CR20","unstructured":"Popa RA, Balakrishnan H, Blumberg A (2009) VPriv: protecting privacy in location-based vehicular services. In: Proceedings of the USENIX security symposium"},{"key":"7_CR21","unstructured":"Zhong G, Goldberg I, Hengartner U (2007) Louis, lester and pierre: three protocols for location privacy. In: Proceedings of the privacy enhancing technologies symposium"},{"key":"7_CR22","unstructured":"H-Security Cree.py application knows where you\u2019ve been. http:\/\/www.h-online.com\/security\/news\/item\/Cree-py-application-knows-where-you-ve-been-1217981.html"},{"key":"7_CR23","unstructured":"Friedland G, Sommer R (2010) Cybercasing the joint: on the privacy implications of geo-tagging. In: Proceedings of the USENIX workshop on hot topics in security, August 2010"},{"issue":"01","key":"7_CR24","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1142\/S1793351X11001171","volume":"5","author":"G Friedland","year":"2011","unstructured":"Friedland G, Choi J (2011) Semantic computing and privacy: a case study using inferred geo-location. Int J Semant Comput 5(01):79\u201393","journal-title":"Int J Semant Comput"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205\u2013214","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Dufaux F, Ebrahimi T (2006) Scrambling for video surveillance with privacy. In: computer vision and pattern recognition workshop. CVPRW\u201906. In: Proceeding of the conference on, pp 160\u2013160","DOI":"10.1109\/CVPRW.2006.184"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Fan J, Luo H, Hacid M-S, Bertino E (2005) A novel approach for privacy-preserving video sharing. In: Proceedings of the 14th ACM international conference on information and knowledge management, CIKM\u201905. ACM, New York, pp 609\u2013616","DOI":"10.1145\/1099554.1099711"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Koshimizu T, Toriyama T, Babaguchi N (2006) Factors on the sense of privacy in video surveillance. In: Proceedings of the 3rd ACM workshop on continuous archival and retrival of personal experiences, CARPE\u201906. ACM, New York, pp 35\u201344","DOI":"10.1145\/1178657.1178665"},{"issue":"1","key":"7_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1143518.1143519","volume":"13","author":"C Neustaedter","year":"2006","unstructured":"Neustaedter C, Greenberg S, Boyle M (2006) Blur filtration fails to preserve privacy for home-based video conferencing. ACM Trans Comput-Hum Interact 13(1):1\u201336","journal-title":"ACM Trans Comput-Hum Interact"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Dufaux F, Ebrahimi T (2010) A framework for the validation of privacy protection solutions in video surveillance. In: IEEE international conference on multimedia and expo (ICME), pp 66\u201371","DOI":"10.1109\/ICME.2010.5583552"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Friedland G, Maier G, Sommer R, Weaver N (2011) Sherlock Holmes evil twin: on the impact of global inference for online privacy. In: Proceedings of the new security paradigms workshop (NSPW), September 2011","DOI":"10.1145\/2073276.2073287"},{"key":"7_CR32","unstructured":"Cohan P (2009) Why executives risk their job to tip a hedge fund. http:\/\/meet-the-street.blogspot.com\/2009\/10\/expert-networks-what-every-iro-needs-to.html,"},{"key":"7_CR33","unstructured":"Amazon.com Mechanical Turk, https:\/\/www.mturk.com\/mturk\/welcome"},{"key":"7_CR34","unstructured":"Mediaeval web site. http:\/\/www.multimediaeval.org"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Burget L, Old\u0159ich P, Sandro C, Glembek O, Mat\u011bjka P, Br\u00fcmmer N (2011) Discriminantly trained probabilistic linear discriminant analysis for speaker verification. In: Proceedings of ICASSP, Brno, Czech Republic","DOI":"10.1109\/ICASSP.2011.5947437"},{"key":"7_CR36","unstructured":"Mathias L, Chatzichristofis SA (2008) Lire: Lucene image retrieval\u2014an extensible Java CBIR library. In: Proceedings of the 16th ACM international conference on multimedia, pp 1085\u20131088, October 2008"},{"key":"7_CR37","unstructured":"Hatch AO (2006) Generalized linear kernels for one-versus-all classification: application to speaker recognition. In: Proceedings of ICASSP, Toulouse, France"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Ioffe S (2006) Probabilistic linear discriminant analysis. In: Proceedings of ECCV, pp 531\u2013542","DOI":"10.1007\/11744085_41"},{"key":"7_CR39","unstructured":"Joint factor analysis matlab demo. http:\/\/speech.fit.vutbr.cz\/software\/joint-factor-analysis-matlab-demo\/"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Bonastre J, Wils F, Meignier S (2005) Alize, a free toolkit for speaker recognition. In: Proceedings of the ICASSP, vol 1, pp 737\u2013740","DOI":"10.1109\/ICASSP.2005.1415219"},{"key":"7_CR41","unstructured":"Hmm toolkit (htk). http:\/\/htk.eng.cam.ac.uk\/"},{"key":"7_CR42","unstructured":"Facebook users by age.http:\/\/en.wikipedia.org\/wiki\/Facebook#Reception"},{"key":"7_CR43","unstructured":"Tools for teaching privacy to k12 and undergraduate students.http:\/\/teachingprivacy.icsi.berkeley.edu"}],"container-title":["Multimedia Data Mining and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14998-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T06:03:50Z","timestamp":1674194630000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14998-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319149974","9783319149981"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14998-1_7","relation":{},"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}