{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:06:46Z","timestamp":1751947606736,"version":"3.41.2"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Natural Science Research Start-up Foundation of Recruiting Talents of Nanjing University of Posts and Telecommunications","award":["Grant No. NY224030"],"award-info":[{"award-number":["Grant No. NY224030"]}]},{"name":"Ningbo Major Special Projects of the \u201cScience and Technology Innovation 2025\u201d","award":["Grant No. 2023Z143"],"award-info":[{"award-number":["Grant No. 2023Z143"]}]},{"name":"The Key R&D Program of Zhejiang","award":["Grant No. 2023C01047"],"award-info":[{"award-number":["Grant No. 2023C01047"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s00371-025-04015-3","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T20:31:14Z","timestamp":1748032274000},"page":"6943-6954","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Recognize Me If You Can: Two-stream Adversarial Transfer for Facial Privacy Protection using Fine-grained Makeup"],"prefix":"10.1007","volume":"41","author":[{"given":"Ruiling","family":"Li","sequence":"first","affiliation":[]},{"given":"Ming","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xiaogang","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"key":"4015_CR1","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep Residual Learning for Image Recognition. In: 2016 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770-778. IEEE (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"4015_CR2","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-Excitation Networks. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7132-7141. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"4015_CR3","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: A unified embedding for face recognition and clustering. In: 2015 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815-823. IEEE (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"4015_CR4","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: Additive Angular Margin Loss for Deep Face Recognition. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4685-4694. IEEE (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"4015_CR5","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive Growing of GANs for Improved Quality, Stability, and Variation. arXiv preprint arXiv:1710.10196 (2017)"},{"key":"4015_CR6","doi-asserted-by":"crossref","unstructured":"Gu, Q., Wang, G., Chiu, M.T., Tai, Y.-W., Tang, C.-K.: LADN: Local Adversarial Disentangling Network for Facial Makeup and De-Makeup. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 10480-10489. IEEE (2019)","DOI":"10.1109\/ICCV.2019.01058"},{"key":"4015_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The Unreasonable Effectiveness of Deep Features as a Perceptual Metric. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 586-595. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"4015_CR8","unstructured":"Sarfraz, M.S., Seibold, C., Khalid, H., Stiefelhagen, R.: Content and Colour Distillation for Learning Image Translations with the Spatial Profile Loss. arXiv preprint arXiv:1908.00274 (2019)"},{"key":"4015_CR9","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 6629-6640. Curran Associates Inc. (2017)"},{"issue":"4","key":"4015_CR10","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing 13(4), 600\u2013612 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"4015_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3317611","volume":"22","author":"M Sharif","year":"2019","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., et al.: A General Framework for Adversarial Examples with Objectives. ACM Transactions on Privacy and Security 22(3), 1\u201327 (2019)","journal-title":"ACM Transactions on Privacy and Security"},{"key":"4015_CR12","doi-asserted-by":"crossref","unstructured":"Komkov, S., Petiushko, A.: AdvHat: Real-World Adversarial Attack on ArcFace Face ID System. In: 25th International Conference on Pattern Recognition (ICPR), pp. 819-826. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"4015_CR13","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Gao, X., Fu, C., et al.: Improving transferability of adversarial patches on face recognition with generative models. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 11845-11854. IEEE (2021)","DOI":"10.1109\/CVPR46437.2021.01167"},{"key":"4015_CR14","doi-asserted-by":"crossref","unstructured":"Yin, B., Wang, W., Yao, T., et al.: Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition. In: 2021 International Joint Conference on Artificial Intelligence (IJCAI), pp. 1252-1258. IJCAI Organization (2021)","DOI":"10.24963\/ijcai.2021\/173"},{"key":"4015_CR15","doi-asserted-by":"crossref","unstructured":"Dong, Y., Su, H., Wu, B., et al.: Efficient Decision-based Black-box Adversarial Attacks on Face Recognition. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7714-7722. IEEE (2019)","DOI":"10.1109\/CVPR.2019.00790"},{"key":"4015_CR16","doi-asserted-by":"crossref","unstructured":"Yang, X., Dong, Y., Pang, T., et al.: Towards Face Encryption by Generating Adversarial Identity Masks. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 3897-3907. IEEE (2021)","DOI":"10.1109\/ICCV48922.2021.00387"},{"key":"4015_CR17","doi-asserted-by":"crossref","unstructured":"Hu, S., Liu, X., Zhang, Y., et al.: Protecting Facial Privacy:Generating Adversarial Identity Masks via Style-robust Makeup Transfer. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14994-15003. IEEE (2022)","DOI":"10.1109\/CVPR52688.2022.01459"},{"key":"4015_CR18","doi-asserted-by":"crossref","unstructured":"Shamshad, F., Naseer, M., Nandakumar, K.: Clip2protect: Protecting facial privacy using text-guided makeup via adversarial latent search. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 20595-20605. IEEE (2023)","DOI":"10.1109\/CVPR52729.2023.01973"},{"key":"4015_CR19","doi-asserted-by":"crossref","unstructured":"Sun, Y., Yu, L., Xie, H., et al.: DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection. In: 2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 24584-24594. IEEE (2024)","DOI":"10.1109\/CVPR52733.2024.02321"},{"key":"4015_CR20","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and Harnessing Adversarial Examples. In: 2015 International Conference on Learning Representations (ICLR). (2015)"},{"key":"4015_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Z., Li, M., Zhang, Y., et al.: Fine-Grained Face Swapping Via Regional GAN Inversion. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8578-8587. IEEE (2023)","DOI":"10.1109\/CVPR52729.2023.00829"},{"issue":"14s","key":"4015_CR22","first-page":"1","volume":"55","author":"MR Hasan","year":"2023","unstructured":"Hasan, M.R., Guest, R.M., Deravi, F.: Presentation-level Privacy Protection Techniques for Automated Face Recognition-A Survey. ACM Computing Surveys 55(14s), 1\u201327 (2023)","journal-title":"ACM Computing Surveys"},{"key":"4015_CR23","doi-asserted-by":"crossref","unstructured":"Park, T., Liu, M.-Y., Wang, T.-C., Zhu, J.-Y.: Semantic Image Synthesis With Spatially-Adaptive Normalization. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2332-2341. IEEE (2019)","DOI":"10.1109\/CVPR.2019.00244"},{"key":"4015_CR24","doi-asserted-by":"crossref","unstructured":"Liu, S., Jiang, W., Gao, C., et al.: PSGAN++: Robust Detail-Preserving Makeup Transfer and Removal. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8538-8551. IEEE (2022)","DOI":"10.1109\/TPAMI.2021.3083484"},{"key":"4015_CR25","doi-asserted-by":"crossref","unstructured":"Gatys, L.A., Ecker, A.S., Bethge, M.: Image style transfer using convolutional neural networks. In: 2016 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2414-2423. IEEE (2016)","DOI":"10.1109\/CVPR.2016.265"},{"key":"4015_CR26","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al.: Generative adversarial nets. In: Advances in neural information processing systems, vol. 27 (2014)"},{"key":"4015_CR27","doi-asserted-by":"crossref","unstructured":"Guo, D., Sim, T.: Digital face makeup by example. In: 2009 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 73-79. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206833"},{"key":"4015_CR28","doi-asserted-by":"crossref","unstructured":"Li, C., Zhou, K., Lin, S.: Simulating makeup through physics-based manipulation of intrinsic image layers. In: 2015 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4621-4629. IEEE (2015)","DOI":"10.1109\/CVPR.2015.7299093"},{"key":"4015_CR29","doi-asserted-by":"crossref","unstructured":"Yang, C., Ding, L., Chen, Y., et al.: Defending against GAN-based DeepFake Attacks via Transformation-aware Adversarial Faces. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1-8. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9533868"},{"key":"4015_CR30","doi-asserted-by":"crossref","unstructured":"Ruiz, N., Bargal, S.A., Sclaroff, S.: Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems. In: Computer Vision - ECCV 2020 Workshops, pp. 236-251. Springer (2020)","DOI":"10.1007\/978-3-030-66823-5_14"},{"key":"4015_CR31","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.cogr.2021.09.001","volume":"1","author":"X Ma","year":"2021","unstructured":"Ma, X., Zhang, F., Wei, H., et al.: Deep learning method for makeup style transfer: A survey. Cognitive Robotics 1, 182\u2013187 (2021)","journal-title":"Cognitive Robotics"},{"key":"4015_CR32","unstructured":"Guetta, N., Shabtai, A., Singh, I., et al.: Dodging attack using carefully crafted natural makeup. arXiv preprint arXiv:2109.06467 (2021)"},{"key":"4015_CR33","doi-asserted-by":"crossref","unstructured":"Tong, W.-S., Tang, C.-K., Brown, M.S., et al.: Example-based cosmetic transfer. In: 15th Pacific Conference on Computer Graphics and Applications (PG), pp. 211-218. IEEE (2007)","DOI":"10.1109\/PG.2007.31"},{"key":"4015_CR34","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, J., Yin, Z., et al.: Generating Transferable Adversarial Examples against Vision Transformers. In: 30th ACM International Conference on Multimedia, pp. 5181-5190 (2022)","DOI":"10.1145\/3503161.3547989"},{"key":"4015_CR35","doi-asserted-by":"crossref","unstructured":"Li, S.,Xu, H.,Wang, J., et al.: Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection. In: IEEE Transactions on Image Processing, vol. 33, pp. 2714-2729 (2024)","DOI":"10.1109\/TIP.2024.3381771"},{"key":"4015_CR36","unstructured":"Yang, X., Yang, D., Dong, Y., et al.: Delving into the adversarial robustness on face recognition. arXiv preprint arXiv:2007.04118 2 (2020)"},{"key":"4015_CR37","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., et al.: Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1528-1540. ACM (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"4015_CR38","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"4015_CR39","unstructured":"Shan, S., Wenger, E., Zhang, J., et al.: Fawkes: Protecting privacy against unauthorized deep learning models. In: 29th USENIX Security Symposium, pp. 1589-1604. USENIX (2020)"},{"key":"4015_CR40","unstructured":"Cherepanova, V., Goldblum, M., Foley, H., et al.: Lowkey: Leveraging adversarial attacks to protect social media users from facial recognition. arXiv preprint arXiv:2101.07922 (2021)"},{"key":"4015_CR41","doi-asserted-by":"crossref","unstructured":"Oh, S.J., Fritz, M., Schiele, B.: Adversarial image perturbation for privacy protection a game theory perspective. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 1491-1500. IEEE (2017)","DOI":"10.1109\/ICCV.2017.165"},{"key":"4015_CR42","doi-asserted-by":"crossref","unstructured":"Sun, Z., Chen, Y., Xiong, S.: SSAT: A Symmetric Semantic-Aware Transformer Network for Makeup Transfer and Removal. In: 2022 AAAI Conference on Artificial Intelligence, vol. 36(2), pp. 2325-2334. AAAI (2022)","DOI":"10.1609\/aaai.v36i2.20131"},{"key":"4015_CR43","doi-asserted-by":"crossref","unstructured":"Li, T., Qian, R., Dong, C., et al.: BeautyGAN: Instance-level Facial Makeup Transfer with Deep Generative Adversarial Network. In: 26th ACM International Conference on Multimedia, pp. 645-653. ACM (2018)","DOI":"10.1145\/3240508.3240618"},{"key":"4015_CR44","unstructured":"Sun, Z., Chen, Y., Xiong, S.: SSAT++: A Semantic-Aware and Versatile Makeup Transfer Network with Local Color Consistency Constraint. IEEE Transactions on Neural Networks and Learning Systems (2023)"},{"key":"4015_CR45","doi-asserted-by":"crossref","unstructured":"Sun, Z., Xiong, S., Chen, Y., et al.: Content-Style Decoupling for Unsupervised Makeup Transfer without Generating Pseudo Ground Truth. In: 2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024)","DOI":"10.1109\/CVPR52733.2024.00726"},{"key":"4015_CR46","doi-asserted-by":"crossref","unstructured":"Smith, M., Szongott, C., Henne, B., et al.: Big Data Privacy Issues in Public Social Media. In: 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST), pp. 1-6. IEEE (2012)","DOI":"10.1109\/DEST.2012.6227909"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-025-04015-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-025-04015-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-025-04015-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T11:04:16Z","timestamp":1751886256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-025-04015-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":46,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["4015"],"URL":"https:\/\/doi.org\/10.1007\/s00371-025-04015-3","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"type":"print","value":"0178-2789"},{"type":"electronic","value":"1432-2315"}],"subject":[],"published":{"date-parts":[[2025,5,23]]},"assertion":[{"value":"15 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}