{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T06:16:55Z","timestamp":1770531415602,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609109","type":"print"},{"value":"9789819609116","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0911-6_25","type":"book-chapter","created":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T07:56:23Z","timestamp":1733558183000},"page":"426-442","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["IDDiffuse: Dual-Conditional Diffusion Model for\u00a0Enhanced Facial Image Anonymization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3992-1387","authenticated-orcid":false,"given":"Muhammad","family":"Shaheryar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6962-3148","authenticated-orcid":false,"given":"Jong","family":"Taek Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0239-6785","authenticated-orcid":false,"given":"Soon","family":"Ki Jung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,8]]},"reference":[{"key":"25_CR1","unstructured":"Legal text. general data protection regulation (gdpr). (2024, april 22). https:\/\/gdpr-info.eu\/"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Barattin, S., Tzelepis, C., Patras, I., Sebe, N.: Attribute-preserving face dataset anonymization via latent code optimization pp. 8001\u20138010","DOI":"10.1109\/CVPR52729.2023.00773"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Boutros, F., Huber, M., Siebke, P., Rieber, T., Damer, N.: Sface: Privacy-friendly and accurate face recognition using synthetic data. In: 2022 IEEE International Joint Conference on Biometrics (IJCB). pp. 1\u201311. IEEE (2022)","DOI":"10.1109\/IJCB54206.2022.10007961"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Bu, J., Jiang, R.L., Zheng, B.: Research on deepfake technology and its application. In: International Conference on Computing, Networks and Internet of Things (CNIOT). pp. 47\u201351 (2023)","DOI":"10.1145\/3603781.3603790"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Cai, Z., Gao, Z., Planche, B., Zheng, M., Chen, T., Asif, M.S., Wu, Z.: Disguise without disruption: Utility-preserving face de-identification. Conference on Artificial Intelligence (AAAI) p. 918-926 (2024)","DOI":"10.1609\/aaai.v38i2.27851"},{"key":"25_CR6","unstructured":"Canada, G.: The personal information protection and electronic documents act (2021), https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/"},{"key":"25_CR7","unstructured":"Cao, J., Liu, B., Wen, Y., Xie, R., Song, L.: Personalized and invertible face de-identification by disentangled identity information manipulation pp. 3334\u20133342"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Chen, R., Chen, X., Ni, B., Ge, Y.: Simswap: An efficient framework for high fidelity face swapping. In: International Conference on Multimedia (ACMMM). pp. 2003\u20132011 (2020)","DOI":"10.1145\/3394171.3413630"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: Arcface: Additive angular margin loss for deep face recognition. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Gafni, O., Wolf, L., Taigman, Y.: Live face de-identification in video. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 9378\u20139387 (2019)","DOI":"10.1109\/ICCV.2019.00947"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Gu, X., Luo, W., Ryoo, M.S., Lee, Y.J.: Password-Conditioned Anonymization and Deanonymization with Face Identity Transformers, p. 727-743 (2020)","DOI":"10.1007\/978-3-030-58592-1_43"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"He, X., Zhu, M., Chen, D., Wang, N., Gao, X.: Diff-privacy: Diffusion-based face privacy protection (2023)","DOI":"10.1109\/TCSVT.2024.3449290"},{"key":"25_CR13","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Advances in Neural Information Processing Systems (NIPS), volume=33, pages=6840\u20136851, year=2020"},{"key":"25_CR14","unstructured":"Huang, G., Mattar, M., Lee, H., Learned-Miller, E.: Learning to align from scratch. Advances in Neural Information Processing Systems (NIPS), volume=25, year=2012"},{"key":"25_CR15","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In: Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition (2008)"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Hukkel\u00e5s, H., Lindseth, F.: Deepprivacy2: Towards realistic full-body anonymization pp. 1329\u20131338 (2020)","DOI":"10.1109\/WACV56688.2023.00138"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Hukkel\u00e5s, H., Mester, R., Lindseth, F.: DeepPrivacy: A Generative Adversarial Network for Face Anonymization, p. 565-578. Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 4401\u20134410 (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Kim, M., Jain, A.K., Liu, X.: Adaface: Quality adaptive margin for face recognition. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 18750\u201318759 (2022)","DOI":"10.1109\/CVPR52688.2022.01819"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Kim, M., Liu, F., Jain, A., Liu, X.: Dcface: Synthetic face generation with dual condition diffusion model. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 12715\u201312725 (2023)","DOI":"10.1109\/CVPR52729.2023.01223"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Kuang, Z., Yang, X., Shen, Y., Hu, C., Yu, J.: Facial identity anonymization via intrinsic and extrinsic attention distraction. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 12406\u201312415 (2024)","DOI":"10.1109\/CVPR52733.2024.01179"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Laishram, L., Shaheryar, M., Lee, J.T., Jung, S.K.: Toward a privacy-preserving face recognition system: A survey of leakages and solutions. ACM Computing Surveys (2024)","DOI":"10.1145\/3673224"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Li, J., Han, L., Chen, R., Zhang, H., Han, B., Wang, L., Cao, X.: Identity-preserving face anonymization via adaptively facial attributes obfuscation. In: International Conference on Multimedia (ACMMM). pp. 3891\u20133899 (2021)","DOI":"10.1145\/3474085.3475367"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Yang, H., Chen, D., Wen, F.: Advancing high fidelity identity swapping for forgery detection. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 5074\u20135083 (2020)","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Liu, W., Wen, Y., Yu, Z., Li, M., Raj, B., Song, L.: Sphereface: Deep hypersphere embedding for face recognition. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 212\u2013220 (2017)","DOI":"10.1109\/CVPR.2017.713"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Lugmayr, A., Danelljan, M., Romero, A., Yu, F., Timofte, R., Van\u00a0Gool, L.: Repaint: Inpainting using denoising diffusion probabilistic models. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 11461\u201311471 (2022)","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Maximov, M., Elezi, I., Leal-Taix\u00e9, L.: Ciagan: Conditional identity anonymization generative adversarial networks. pp. 5447\u20135456 (2020)","DOI":"10.1109\/CVPR42600.2020.00549"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Maximov, M., Elezi, I., Leal-Taix\u00e9, L.: Decoupling identity and visual quality for image and video anonymization. In: Asian Conference on Computer Vision (ACCV). pp. 3637\u20133653 (2022)","DOI":"10.1007\/978-3-031-26351-4_31"},{"key":"25_CR29","unstructured":"McPherson, R., Shokri, R., Shmatikov, V.: Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408 (2016)"},{"issue":"1","key":"25_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1143518.1143519","volume":"13","author":"C Neustaedter","year":"2006","unstructured":"Neustaedter, C., Greenberg, S., Boyle, M.: Blur filtration fails to preserve privacy for home-based video conferencing. ACM Transactions on Computer-Human Interaction 13(1), 1\u201336 (2006)","journal-title":"ACM Transactions on Computer-Human Interaction"},{"issue":"2","key":"25_CR31","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"EM Newton","year":"2005","unstructured":"Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232\u2013243 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR32","unstructured":"Nichol, A.Q., Dhariwal, P.: Improved denoising diffusion probabilistic models. pp. 8162\u20138171. PMLR (2021)"},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Qiu, H., Yu, B., Gong, D., Li, Z., Liu, W., Tao, D.: Synface: Face recognition with synthetic data. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp. 10880\u201310890 (2021)","DOI":"10.1109\/ICCV48922.2021.01070"},{"key":"25_CR34","unstructured":"Ramesh, A., Dhariwal, P., Nichol, A., Chu, C., Chen, M.: Hierarchical text-conditional image generation with clip latents. arXiv preprint arXiv:2204.061251(2), 3 (2022)"},{"key":"25_CR35","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. pp. 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"25_CR36","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: A unified embedding for face recognition and clustering. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"25_CR37","unstructured":"Song, J., Meng, C., Ermon, S.: Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502 (2020)"},{"key":"25_CR38","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I.: Attention is all you need. Advances in neural information processing systems 30 (2017)"},{"key":"25_CR39","doi-asserted-by":"crossref","unstructured":"Westerlund, M.: The emergence of deepfake technology: A review. Technology innovation management review 9(11) (2019)","DOI":"10.22215\/timreview\/1282"},{"key":"25_CR40","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Yang, H., Zhang, T., Bao, J., Chen, D., Huang, Y., Yuan, L., Chen, D., Zeng, M., Wen, F.: General facial representation learning in a visual-linguistic manner. In: Conference on Computer Vision and Pattern Recognition (CVPR). pp. 18697\u201318709 (2022)","DOI":"10.1109\/CVPR52688.2022.01814"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ACCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0911-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T08:22:08Z","timestamp":1733559728000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0911-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"ISBN":["9789819609109","9789819609116"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0911-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,8]]},"assertion":[{"value":"8 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"accv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}