{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T04:18:50Z","timestamp":1778559530418,"version":"3.51.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319168104","type":"print"},{"value":"9783319168111","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16811-1_11","type":"book-chapter","created":{"date-parts":[[2015,4,15]],"date-time":"2015-04-15T09:48:40Z","timestamp":1429091320000},"page":"159-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Photorealistic Face De-Identification by Aggregating Donors\u2019 Face Components"],"prefix":"10.1007","author":[{"given":"Saleh","family":"Mosaddegh","sequence":"first","affiliation":[]},{"given":"Loic","family":"Simon","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Jurie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,16]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TCSVT.2011.2105551","volume":"21","author":"P Agrawal","year":"2011","unstructured":"Agrawal, P., Narayanan, P.J.: Person de-identification in videos. IEEE Trans. Circuits Syst. Video Technol. 21(3), 299\u2013310 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"11_CR2","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TPAMI.2006.244","volume":"28","author":"T Ahonen","year":"2006","unstructured":"Ahonen, T., Hadid, A., Pietikainen, M.: Face description with local binary patterns: Application to face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 2037\u20132041 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1360612.1360638","volume":"27","author":"D Bitouk","year":"2008","unstructured":"Bitouk, D., Kumar, N., Dhillon, S., Belhumeur, P., Nayar, S.K.: Face swapping: automatically replacing faces in photographs. ACM Trans. Graphics (TOG) 27, 39 (2008)","journal-title":"ACM Trans. Graphics (TOG)"},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TIFS.2012.2226580","volume":"8","author":"K Bonnen","year":"2013","unstructured":"Bonnen, K., Klare, B.F., Jain, A.K.: Component-based representation in automated face recognition. IEEE Trans. Inf. Forensics Secur. 8(1), 239\u2013253 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: ACM Conference on Computer Supported Cooperative Work, New York, USA, pp. 1\u201310 (December 2000)","DOI":"10.1145\/358916.358935"},{"key":"11_CR6","unstructured":"Cavedon, L., Foschini, L., Vigna, G.: Getting the face behind the squares: Reconstructing pixelized video streams. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT 2011, p.5. USENIX Association, Berkeley (2011)"},{"issue":"6","key":"11_CR7","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/34.927467","volume":"23","author":"TF Cootes","year":"2001","unstructured":"Cootes, T.F., Edwards, G.J., Taylor, C.J., et al.: Active appearance models. IEEE Trans. Pattern Anal. Mach. Intell. 23(6), 681\u2013685 (2001)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/330534.330540","volume":"43","author":"JL Crowley","year":"2000","unstructured":"Crowley, J.L., Coutaz, J., B\u00e9rard, F.: Perceptual user interfaces: things that see. Commun. ACM 43(3), 54\u201360 (2000)","journal-title":"Commun. ACM"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-40779-6_2","volume-title":"Communications and Multimedia Security","author":"B Driessen","year":"2013","unstructured":"Driessen, B., D\u00fcrmuth, M.: Achieving anonymity against major face recognition algorithms. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 18\u201333. Springer, Heidelberg (2013)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 66\u201371 (2010)","DOI":"10.1109\/ICME.2010.5583552"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Efros, A.A., Freeman, W.T.: Image quilting for texture synthesis and transfer. In: Proceedings of the 28th Annual Conference on Computer Graphics and Interactive Techniques, pp. 341\u2013346 (2001)","DOI":"10.1145\/383259.383296"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Gross, R., Sweeney, L., De la Torre, F., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20138 (2008)","DOI":"10.1109\/CVPR.2008.4587369"},{"issue":"5","key":"11_CR13","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.imavis.2009.08.002","volume":"28","author":"R Gross","year":"2010","unstructured":"Gross, R., Matthews, I., Cohn, J., Kanade, T., Baker, S.: Multi-pie. Image Vis. Comput. 28(5), 807\u2013813 (2010)","journal-title":"Image Vis. Comput."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Hassner, T.: Viewing real-world faces in 3d. In: IEEE International Conference on Computer Vision, pp. 3607\u20133614 (2013)","DOI":"10.1109\/ICCV.2013.448"},{"key":"11_CR15","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Tech. Rep. 07\u201349, University of Massachusetts, Amherst (October 2007)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Hudson, S.E., Smith, I.: Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In: ACM Conference on Computer Supported Cooperative Work, New York, USA, pp. 248\u2013257 (1996)","DOI":"10.1145\/240080.240295"},{"issue":"3\u20134","key":"11_CR17","first-page":"59","volume":"13","author":"A Kasinski","year":"2008","unstructured":"Kasinski, A., Florek, A., Schmidt, A.: The put face database. Image Proc. Commun. 13(3\u20134), 59\u201364 (2008)","journal-title":"Image Proc. Commun."},{"issue":"1","key":"11_CR18","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1002\/1099-0720(200101\/02)15:1<101::AID-ACP697>3.0.CO;2-7","volume":"15","author":"K Lander","year":"2001","unstructured":"Lander, K., Bruce, V., Hill, H.: Evaluating the effectiveness of pixelation and blurring on masking the identity of familiar faces. Appl. Cogn. Psychol. 15(1), 101\u2013116 (2001)","journal-title":"Appl. Cogn. Psychol."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Lin, Y., Lin, Q., Tang, F., Wang, S.: Face replacement with large-pose differences. In: ACM International Conference on Multimedia, pp. 1249\u20131250. ACM, New York (October 2012)","DOI":"10.1145\/2393347.2396426"},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s11263-007-0043-2","volume":"75","author":"I Matthews","year":"2007","unstructured":"Matthews, I., Xiao, J., Baker, S.: 2d vs. 3d deformable face models: Representational power, construction, and real-time fitting. Int. J. Comput. Vision 75(1), 93\u2013113 (2007)","journal-title":"Int. J. Comput. Vision"},{"key":"11_CR21","unstructured":"Milborrow, S., Morkel, J., Nicolls, F.: The muct landmarked face database. Pattern Recognition Association of South Africa (2010)"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/1531326.1531363","volume":"28","author":"U Mohammed","year":"2009","unstructured":"Mohammed, U., Prince, S.J., Kautz, J.: Visio-lization: generating novel facial images. ACM Trans. Graphics (TOG) 28, 57 (2009)","journal-title":"ACM Trans. Graphics (TOG)"},{"issue":"2","key":"11_CR23","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"EM Newton","year":"2005","unstructured":"Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232\u2013243 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/978-3-642-19309-5_55","volume-title":"Computer Vision \u2013 ACCV 2010","author":"HV Nguyen","year":"2011","unstructured":"Nguyen, H.V., Bai, L.: Cosine similarity metric learning for face verification. In: Kimmel, R., Klette, R., Sugimoto, A. (eds.) ACCV 2010, Part II. LNCS, vol. 6493, pp. 709\u2013720. Springer, Berlin Heidelberg (2011)"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1145\/882262.882269","volume":"22","author":"P P\u00e9rez","year":"2003","unstructured":"P\u00e9rez, P., Gangnet, M., Blake, A.: Poisson image editing. ACM Trans. Graphics (TOG) 22, 313\u2013318 (2003)","journal-title":"ACM Trans. Graphics (TOG)"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Smith, B.M., Zhang, L., Brandt, J., Lin, Z., Yang, J.: Exemplar-based face parsing. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 3484\u20133491 (2013)","DOI":"10.1109\/CVPR.2013.447"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: Deepface: Closing the gap to human-level performance in face verification. In: IEEE Conference on Computer Vision and Pattern Recognition (2014)","DOI":"10.1109\/CVPR.2014.220"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Yang, C.Y., Liu, S., Yang, M.H.: Structured face hallucination. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1099\u20131106 (2013)","DOI":"10.1109\/CVPR.2013.146"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Zhao, Q.A., Stasko, J.T.: Evaluating image filtering based techniques in media space applications. In: ACM Conference on Computer Supported Cooperative Work, New York, USA, pp. 11\u201318(November 1998)","DOI":"10.1145\/289444.289450"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Zhu, J., Van Gool, L., Hoi, S.C.: Unsupervised face alignment by robust nonrigid mapping. In: IEEE 12th International Conference on Computer Vision, pp. 1265\u20131272. IEEE (2009)","DOI":"10.1109\/ICCV.2009.5459325"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Zhu, X., Ramanan, D.: Face detection, pose estimation, and landmark localization in the wild. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2879\u20132886 (2012)","DOI":"10.1109\/CVPR.2012.6248014"}],"container-title":["Lecture Notes in Computer Science","Computer Vision -- ACCV 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16811-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T15:27:40Z","timestamp":1747927660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16811-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319168104","9783319168111"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16811-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}