{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:09:40Z","timestamp":1742926180047,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319193205"},{"type":"electronic","value":"9783319193212"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19321-2_39","type":"book-chapter","created":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T17:20:34Z","timestamp":1432747234000},"page":"513-524","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Tag Detection for Preventing Unauthorized Face Image Processing"],"prefix":"10.1007","author":[{"given":"Alberto Escalada","family":"Jimenez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Noburu","family":"Sonehara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Juan M. Montero","family":"Martinez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,5,28]]},"reference":[{"issue":"1","key":"39_CR1","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/34.982883","volume":"24","author":"M-H Yang","year":"2002","unstructured":"Yang, M.-H., Kriegman, D., Ahuja, N.: Detecting faces in images: A survey. IEEE Trans. Pattern Anal. Mach. Intell. 24(1), 34\u201358 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"39_CR2","unstructured":"Zhang, C., Zhang, Z.: A survey of recent advances in face detection, Technical report, Microsoft Research (2010)"},{"key":"39_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-14423-3_16","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"A-R Sadeghi","year":"2010","unstructured":"Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229\u2013244. Springer, Heidelberg (2010)"},{"issue":"1","key":"39_CR4","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MTAS.2004.1273467","volume":"23","author":"KW Bowyer","year":"2004","unstructured":"Bowyer, K.W.: Face recognition technology: security versus privacy. IEEE Technol. Soc. Mag. 23(1), 9\u201319 (2004)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"39_CR5","unstructured":"A focus on efficiency, internet.org, Techical report (2013)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Besmer, A., Lipford, H.R.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, pp. 1563\u20131572 (2010)","DOI":"10.1145\/1753326.1753560"},{"key":"39_CR7","unstructured":"Making photo tagging easier, June 2011. https:\/\/www.facebook.com\/notes\/facebook\/making-photo-tagging-easier\/467145887130"},{"key":"39_CR8","unstructured":"How does facebook suggest tags?, May 2014. https:\/\/www.facebook.com\/help\/122175507864081"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Weippl, E., Echizen, I.: Framework based on privacy policy hiding for preventing unauthorized face image processing. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 455\u2013461, October 2013","DOI":"10.1109\/SMC.2013.83"},{"key":"39_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/11767831_15","volume-title":"Privacy Enhancing Technologies","author":"R Gross","year":"2006","unstructured":"Gross, R., Airoldi, E.M., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 227\u2013242. Springer, Heidelberg (2006)"},{"key":"39_CR11","unstructured":"M. Corporation. Microsoft tag - implementation guide (2011). http:\/\/tag.microsoft.com\/resources\/implementation-guide.aspx"},{"key":"39_CR12","unstructured":"How does instagram develop their filters?, May 2012. http:\/\/www.quora.com\/Instagram\/How-does-Instagram-develop-their-filters"},{"issue":"2","key":"39_CR13","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola, P., Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vis. 57(2), 137\u2013154 (2004)","journal-title":"Int. J. Comput. Vis."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19321-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T01:40:33Z","timestamp":1676943633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19321-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319193205","9783319193212"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19321-2_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}