{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:04:51Z","timestamp":1775667891303,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319161808","type":"print"},{"value":"9783319161815","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16181-5_52","type":"book-chapter","created":{"date-parts":[[2015,3,19]],"date-time":"2015-03-19T10:41:56Z","timestamp":1426761716000},"page":"682-696","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Privacy of Facial Soft Biometrics: Suppressing Gender But Retaining Identity"],"prefix":"10.1007","author":[{"given":"Asem","family":"Othman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arun","family":"Ross","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,3,20]]},"reference":[{"issue":"2","key":"52_CR1","first-page":"439","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM Sigmod. Record 29(2), 439\u2013450 (2000)","journal-title":"Record"},{"key":"52_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"F\u00e4rberb\u00f6ck, P., H\u00e4mmerle-Uhl, J., Kaaser, D., Pschernig, E., Uhl, A.: Transforming rectangular and polar iris images to enable cancelable biometrics. In: Image Analysis and Recognition, pp. 276\u2013286. Springer (2010)","DOI":"10.1007\/978-3-642-13775-4_28"},{"issue":"11","key":"52_CR4","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1109\/TPAMI.2010.36","volume":"32","author":"Y Fu","year":"2010","unstructured":"Fu, Y., Guo, G., Huang, T.S.: Age synthesis and estimation via faces: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence 32(11), 1955\u20131976 (2010)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"52_CR5","unstructured":"Gross, R., Sweeney, L., De la Torre, F., Baker, S.: Model-based face de-identification. In: Computer Vision and Pattern Recognition Workshop (CVPRW), pp. 161\u2013168. IEEE Computer Society, Los Alamitos (2006)"},{"key":"52_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-04474-8_11","volume-title":"Information Security","author":"J H\u00e4mmerle-Uhl","year":"2009","unstructured":"H\u00e4mmerle-Uhl, J., Pschernig, E., Uhl, A.: Cancelable Iris Biometrics Using Block Re-mapping and Image Warping. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 135\u2013142. Springer, Heidelberg (2009)"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering (ICDE), vol. 7, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Lu, X., Jain, A.K.: Ethnicity identification from face images. In: SPIE Defense and Security Symposium, pp. 114\u2013123 (2004)","DOI":"10.1117\/12.542847"},{"key":"52_CR9","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: ACM Transactions on Knowledge Discovery from Data (TKDD) (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"3","key":"52_CR10","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TPAMI.2007.70800","volume":"30","author":"E Makinen","year":"2008","unstructured":"Makinen, E., Raisamo, R.: Evaluation of gender classification methods with automatically detected and aligned faces. IEEE Transactions on Pattern Analysis and Machine Intelligence 30(3), 541\u2013547 (2008)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"52_CR11","unstructured":"Milborrow, S., Morkel, J., Nicolls, F.: The MUCT Landmarked Face Database. Pattern Recognition Association of South Africa (2010). http:\/\/www.milbo.org\/muct"},{"key":"52_CR12","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"52_CR13","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"E Newton","year":"2005","unstructured":"Newton, E., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge and Data Engineering 17, 232\u2013243 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"52_CR14","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TIFS.2012.2223676","volume":"8","author":"A Othman","year":"2013","unstructured":"Othman, A., Ross, A.: On mixing fingerprints. IEEE Transactions on Information Forensics and Security 8(1), 260\u2013267 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"52_CR15","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N Ratha","year":"2001","unstructured":"Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614\u2013634 (2001)","journal-title":"IBM Systems Journal"},{"key":"52_CR16","first-page":"1","volume":"1","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security 1, 1\u201325 (2011)","journal-title":"EURASIP Journal on Information Security"},{"issue":"5","key":"52_CR17","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/38.403830","volume":"15","author":"D Rowland","year":"1995","unstructured":"Rowland, D., Perrett, D.: Manipulating facial appearance through shape and color. Computer Graphics and Applications 15(5), 70\u201376 (1995)","journal-title":"Computer Graphics and Applications"},{"key":"52_CR18","doi-asserted-by":"crossref","unstructured":"Suo, J., Lin, L., Shan, S., Chen, X., Gao, W.: High-resolution face fusion for gender conversion. In: IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, pp. 1\u201312 (2011)","DOI":"10.1109\/TSMCA.2010.2064304"},{"issue":"05","key":"52_CR19","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(05), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"8","key":"52_CR20","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s003710050148","volume":"14","author":"G Wolberg","year":"1998","unstructured":"Wolberg, G.: Image morphing: a survey. The Visual Computer 14(8), 360\u2013372 (1998)","journal-title":"The Visual Computer"},{"key":"52_CR21","volume-title":"Biometrics:identity assurance in the information age","author":"J Woodward","year":"2003","unstructured":"Woodward, J., Orlans, N., Higgins, P.: Biometrics:identity assurance in the information age. McGraw-Hill\/Osborne, New York (2003)"},{"key":"52_CR22","doi-asserted-by":"crossref","unstructured":"Zuo, J., Ratha, N., Connell, J.: Cancelable iris biometric. In: IEEE 19th International Conference on Pattern Recognition (ICPR), pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761886"}],"container-title":["Lecture Notes in Computer Science","Computer Vision - ECCV 2014 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16181-5_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T03:49:28Z","timestamp":1747799368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16181-5_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319161808","9783319161815"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16181-5_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}