{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:43:49Z","timestamp":1772905429232,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":50,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819615247","type":"print"},{"value":"9789819615254","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1525-4_3","type":"book-chapter","created":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:28:13Z","timestamp":1739698093000},"page":"40-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["DBFIA: Diffusion-Based Face Image Anonymization"],"prefix":"10.1007","author":[{"given":"Hanyu","family":"Xue","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9167-1613","authenticated-orcid":false,"given":"Xin","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3603-6617","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3690-0321","authenticated-orcid":false,"given":"Ming","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Barattin, S., Tzelepis, C., Patras, I., Sebe, N.: Attribute-preserving face dataset anonymization via latent code optimization. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2023 (2023)","DOI":"10.1109\/CVPR52729.2023.00773"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Cao, J., Liu, B., Wen, Y., Xie, R., Song, L.: Personalized and invertible face de-identification by disentangled identity information manipulation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), October 2021, pp. 269\u2013272 (2021)","DOI":"10.1109\/ICCV48922.2021.00332"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Cao, J., Liu, B., Wen, Y., Xie, R., Song, L.: Achieving privacy-preserving multi-view consistency with advanced 3D-aware face de-identification. In: Proceedings of ACM Multimedia Asia, pp.\u00a01\u20136. ACM (2023)","DOI":"10.1145\/3595916.3626407"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Cao, J., Liu, B., Wen, Y., Zhu, Y., Xie, R., Song, L.: Hiding among your neighbors: face image privacy protection with differential private k-anonymity. In: Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp.\u00a01\u20136. IEEE (2022)","DOI":"10.1109\/BMSB55706.2022.9828699"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2019 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.jvcir.2019.01.027","volume":"59","author":"L Du","year":"2019","unstructured":"Du, L., Zhang, W., Fu, H., Ren, W., Zhang, X.: An efficient privacy protection scheme for data security in video surveillance. J. Vis. Commun. Image Represent. 59, 347\u2013362 (2019). https:\/\/doi.org\/10.1016\/j.jvcir.2019.01.027","journal-title":"J. Vis. Commun. Image Represent."},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-319-93764-9_35","volume-title":"Latent Variable Analysis and Signal Separation","author":"SE Eskimez","year":"2018","unstructured":"Eskimez, S.E., Maddox, R.K., Xu, C., Duan, Z.: Generating talking face landmarks from speech. In: Deville, Y., Gannot, S., Mason, R., Plumbley, M.D., Ward, D. (eds.) LVA\/ICA 2018. LNCS, vol. 10891, pp. 372\u2013381. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93764-9_35"},{"issue":"5","key":"3_CR8","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.cag.2012.12.007","volume":"37","author":"T Gerstner","year":"2013","unstructured":"Gerstner, T., DeCarlo, D., Alexa, M., Finkelstein, A., Gingold, Y., Nealen, A.: Pixelated image abstraction with integrated user constraints. Comput. Graph. 37(5), 333\u2013347 (2013)","journal-title":"Comput. Graph."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Goodfellow, I., et al.: Generative adversarial networks, October 2020","DOI":"10.1145\/3422622"},{"key":"3_CR10","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium (2018)"},{"key":"3_CR11","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Proceedings of the 34th International Conference on Neural Information Processing Systems, NIPS 2020. Curran Associates Inc., Red Hook, NY, USA (2020)"},{"issue":"47","key":"3_CR12","first-page":"1","volume":"23","author":"J Ho","year":"2022","unstructured":"Ho, J., Saharia, C., Chan, W., Fleet, D.J., Norouzi, M., Salimans, T.: Cascaded diffusion models for high fidelity image generation. J. Mach. Learn. Res. 23(47), 1\u201333 (2022)","journal-title":"J. Mach. Learn. Res."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Hukkel\u00e5s, H., Mester, R., Lindseth, F.: DeepPrivacy: a generative adversarial network for face anonymization (2019)","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"3_CR15","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.neucom.2022.01.029","volume":"479","author":"H Li","year":"2022","unstructured":"Li, H., et al.: SRDiff: single image super-resolution with diffusion probabilistic models. Neurocomputing 479, 47\u201359 (2022)","journal-title":"Neurocomputing"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Li, T., Lin, L.: AnonymousNet: natural face de-identification with measurable privacy, June 2019","DOI":"10.1109\/CVPRW.2019.00013"},{"key":"3_CR18","unstructured":"Liu, B., et al.: DP-image: differential privacy for image data in feature space (2021)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild, December 2015","DOI":"10.1109\/ICCV.2015.425"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Maximov, M., Elezi, I., Leal-Taixe, L.: CIAGAN: conditional identity anonymization generative adversarial networks. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020. IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.00549"},{"key":"3_CR21","unstructured":"McPherson, R., Shokri, R., Shmatikov, V.: Defeating image obfuscation with deep learning (2016)"},{"key":"3_CR22","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets (2014)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-46487-9_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"SJ Oh","year":"2016","unstructured":"Oh, S.J., Benenson, R., Fritz, M., Schiele, B.: Faceless person recognition: privacy implications in social media. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 19\u201335. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46487-9_2"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi, A., Zisserman, A.: Deep face recognition. In: British Machine Vision Conference (2015)","DOI":"10.5244\/C.29.41"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Preechakul, K., Chatthee, N., Wizadwongsa, S., Suwajanakorn, S.: Diffusion autoencoders: toward a meaningful and decodable representation. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2022)","DOI":"10.1109\/CVPR52688.2022.01036"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Richardson, E., et al: Encoding in style: a StyleGAN encoder for image-to-image translation (2021)","DOI":"10.1109\/CVPR46437.2021.00232"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"EU Personal Data Protection in Policy and Practice. ITLS, vol. 29. T.M.C. Asser Press, The Hague (2019). https:\/\/doi.org\/10.1007\/978-94-6265-282-8_9","DOI":"10.1007\/978-94-6265-282-8_9"},{"key":"3_CR29","unstructured":"Shan, S., Wenger, E., Zhang, J., Li, H., Zheng, H., Zhao, B.Y.: Fawkes: protecting personal privacy against unauthorized deep learning models. In: Proceedings of the USENIX Security (2020)"},{"key":"3_CR30","unstructured":"Sinha, A., Song, J., Meng, C., Ermon, S.: D2C: diffusion-decoding models for few-shot conditional generation. In: Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems, vol.\u00a034, pp. 12533\u201312548. Curran Associates, Inc. (2021)"},{"key":"3_CR31","unstructured":"Song, J., Meng, C., Ermon, S.: Denoising diffusion implicit models. In: International Conference on Learning Representations (2021)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Sun, Q., Ma, L., Oh, S.J., Gool, L.V., Schiele, B., Fritz, M.: Natural and effective obfuscation by head inpainting (2018)","DOI":"10.1109\/CVPR.2018.00530"},{"key":"3_CR33","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: DeepFakes and beyond: a survey of face manipulation and fake detection. Inf. Fus. 64, 131\u2013148 (2020)","journal-title":"Inf. Fus."},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Tov, O., Alaluf, Y., Nitzan, Y., Patashnik, O., Cohen-Or, D.: Designing an encoder for StyleGAN image manipulation. arXiv preprint arXiv:2102.02766 (2021)","DOI":"10.1145\/3476576.3476706"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Wen, Y., Liu, B., Cao, J., Xie, R., Song, L.: Divide and conquer: a two-step method for high quality face de-identification with model explainability. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), October 2023, pp. 269\u2013272 (2023)","DOI":"10.1109\/ICCV51070.2023.00475"},{"issue":"12","key":"3_CR36","doi-asserted-by":"publisher","first-page":"8353","DOI":"10.1109\/TCSVT.2022.3191982","volume":"32","author":"Y Wen","year":"2022","unstructured":"Wen, Y., Liu, B., Cao, J., Xie, R., Song, L., Li, Z.: IdentityMask: deep motion flow guided reversible face video de-identification. IEEE Trans. Circ. Syst. Video Technol. 32(12), 8353\u20138367 (2022). https:\/\/doi.org\/10.1109\/TCSVT.2022.3191982","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"3_CR37","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.neucom.2022.06.039","volume":"501","author":"Y Wen","year":"2022","unstructured":"Wen, Y., Liu, B., Ding, M., Xie, R., Song, L.: IdentityDP: differential private identification protection for face images. Neurocomputing 501, 197\u2013211 (2022)","journal-title":"Neurocomputing"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Wen, Y., Liu, B., Song, L., Cao, J., Xie, R.: Face De-identification: Safeguarding Identities in the Digital Era. Springer, Heidelberg (2024)","DOI":"10.1007\/978-3-031-58222-6"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Xue, H., Liu, B., Din, M., Song, L., Zhu, T.: Hiding private information in images from AI. In: 2020 IEEE International Conference on Communications (ICC), ICC 2020, pp.\u00a01\u20136 (2020)","DOI":"10.1109\/ICC40277.2020.9148656"},{"issue":"5","key":"3_CR40","doi-asserted-by":"publisher","first-page":"e7554","DOI":"10.1002\/cpe.7554","volume":"35","author":"H Xue","year":"2023","unstructured":"Xue, H., Liu, B., Yuan, X., Ding, M., Zhu, T.: Face image de-identification by feature space adversarial perturbation. Concurrency Comput. Pract. Exp. 35(5), e7554 (2023)","journal-title":"Concurrency Comput. Pract. Exp."},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Yeh, R.A., Chen, C., Lim, T.Y., Schwing, A.G., Hasegawa-Johnson, M., Do, M.N.: Semantic image inpainting with deep generative models (2017)","DOI":"10.1109\/CVPR.2017.728"},{"key":"3_CR42","unstructured":"Yi, D., Lei, Z., Liao, S., Li, S.Z.: Learning face representation from scratch. arXiv preprint arXiv:1411.7923 (2014)"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Yu, X., Chinomi, K., Koshimizu, T., Nitta, N., Ito, Y., Babaguchi, N.: Privacy protecting visual processing for secure video surveillance. In: 2008 15th IEEE International Conference on Image Processing, pp. 1672\u20131675 (2008)","DOI":"10.1109\/ICIP.2008.4712094"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Zhang, G., Liu, B., Zhu, T., Zhou, A., Zhou, W.: Visual privacy attacks and defenses in deep learning: a survey. Artif. Intell. Rev. (2022)","DOI":"10.1007\/s10462-021-10123-y"},{"issue":"10","key":"3_CR45","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Sig. Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Sig. Process. Lett."},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lu, Y., Nagahara, H., Taniguchi, R.i.: Anonymous camera for privacy protection. In: 2014 22nd International Conference on Pattern Recognition, pp. 4170\u20134175 (2014)","DOI":"10.1109\/ICPR.2014.715"},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chen, J.: A survey on differential privacy for unstructured data content. ACM Comput. Surv. 54(10s) (2022)","DOI":"10.1145\/3490237"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Yuan, D., Du, J.T., Chen, J.: Geo-ellipse-indistinguishability: community-aware location privacy protection for directional distribution. IEEE Trans. Knowl. Data Eng., 1\u201311 (2022)","DOI":"10.1109\/TKDE.2022.3192360"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Zheng, Y., et al.: General facial representation learning in a visual-linguistic manner. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2022, pp. 18697\u201318709 (2022)","DOI":"10.1109\/CVPR52688.2022.01814"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Cao, J., Liu, B., Chen, T., Xie, R., Song, L.: Identity-consistent video de-identification via diffusion autoencoders. In: Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp.\u00a01\u20136. IEEE (2024)","DOI":"10.1109\/BMSB62888.2024.10608204"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1525-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:29:00Z","timestamp":1739698140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1525-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615247","9789819615254"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1525-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}