{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:34:31Z","timestamp":1763202871999},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T00:00:00Z","timestamp":1716422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T00:00:00Z","timestamp":1716422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"EC","award":["101070141","101070141"],"award-info":[{"award-number":["101070141","101070141"]}]},{"name":"EU - NGEU","award":["PE00000014","PE00000014"],"award-info":[{"award-number":["PE00000014","PE00000014"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00862-8","type":"journal-article","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T14:02:55Z","timestamp":1716472975000},"page":"2809-2826","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Model-Agnostic Utility-Preserving Biometric Information Anonymization"],"prefix":"10.1007","volume":"23","author":[{"given":"Chun-Fu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Bill","family":"Moriarty","sequence":"additional","affiliation":[]},{"given":"Shaohan","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Moran","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Pistoia","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,23]]},"reference":[{"key":"862_CR1","doi-asserted-by":"publisher","first-page":"5994","DOI":"10.1109\/ACCESS.2018.2889996","volume":"7","author":"Z Rui","year":"2018","unstructured":"Rui, Z., Yan, Z.: A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE access 7, 5994\u20136009 (2018)","journal-title":"IEEE access"},{"issue":"34","key":"862_CR2","doi-asserted-by":"publisher","first-page":"1677","DOI":"10.12988\/ces.2018.84166","volume":"11","author":"N Ortiz","year":"2018","unstructured":"Ortiz, N., Hern\u00e1ndez, R.D., Jimenez, R., Mauledeoux, M., Avil\u00e9s, O.: Survey of biometric pattern recognition via machine learning techniques. Contemp. Eng. Sci. 11(34), 1677\u20131694 (2018)","journal-title":"Contemp. Eng. Sci."},{"key":"862_CR3","doi-asserted-by":"publisher","first-page":"131995","DOI":"10.1109\/ACCESS.2021.3114588","volume":"9","author":"M Barni","year":"2021","unstructured":"Barni, M., Labati, R.D., Genovese, A., Piuri, V., Scotti, F.: Iris deidentification with high visual realism for privacy protection on websites and social networks. IEEE Access 9, 131995\u2013132010 (2021)","journal-title":"IEEE Access"},{"key":"862_CR4","doi-asserted-by":"crossref","unstructured":"Datta, P., Bhardwaj, S., Panda, S. N., Tanwar, S., Badotra, S.: Survey of security and privacy issues on biometric system. In Handbook of Computer Networks and Cyber Security, pages 763\u2013776. Springer, (2020)","DOI":"10.1007\/978-3-030-22277-2_30"},{"key":"862_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-35755-8_1","volume":"314","author":"RD Labati","year":"2012","unstructured":"Labati, R.D., Piuri, V., Scotti, F.: Biometric privacy protection: guidelines and technologies. Commun. Comput. Inform. Sci. 314, 3\u201319 (2012)","journal-title":"Commun. Comput. Inform. Sci."},{"key":"862_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42051-1_16","author":"IJ Goodfellow","year":"2013","unstructured":"Goodfellow, I.J., Erhan, D., Carrier, P.L., Courville, A., Mirza, M., Hamner, B., Cukierski, W., Tang, Y., Thaler, D., Lee, D.H., et al.: Challenges in representation learning: a report on three machine learning contests. In NIPS (2013). https:\/\/doi.org\/10.1007\/978-3-642-42051-1_16","journal-title":"In NIPS"},{"key":"862_CR7","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In ICCV, (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"862_CR8","unstructured":"Becker, S., Ackermann, M., Lapuschkin, S., M\u00fcller, K. R., Samek, W.: Interpreting and explaining deep neural networks for classification of audio signals. CoRR, abs\/1807.03418, (2018)"},{"key":"862_CR9","doi-asserted-by":"crossref","unstructured":"Malekzadeh, M., Clegg, R.G., Cavallaro, A., Haddadi, H.: Mobile sensor data anonymization. In Proceedings of the International Conference on Internet of Things Design and Implementation, IoTDI \u201919, pages 49\u201358, New York, NY, USA, (2019). ACM","DOI":"10.1145\/3302505.3310068"},{"key":"862_CR10","doi-asserted-by":"publisher","unstructured":"Begleiter, H.: EEG Database. UCI Machine Learning Repository, (1999).https:\/\/doi.org\/10.24432\/C5TS3D","DOI":"10.24432\/C5TS3D"},{"key":"862_CR11","unstructured":"Apple. Vision framework: Apply computer vision algorithms to perform a variety of tasks on input images and video. https:\/\/developer.apple.com\/documentation\/vision, (2021)"},{"key":"862_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32","author":"EM Newton","year":"2005","unstructured":"Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE TKDE (2005). https:\/\/doi.org\/10.1109\/TKDE.2005.32","journal-title":"IEEE TKDE"},{"key":"862_CR13","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"862_CR14","doi-asserted-by":"crossref","unstructured":"Hsu, W.-N., Bolte, B., Tsai, Y.-H.H., Lakhotia, K., Salakhutdinov, R., Mohamed, A.: Hubert: self-supervised speech representation learning by masked prediction of hidden units. IEEE\/ACM Trans. Audio, Speech, and Lang. Proc. 29, 3451\u20133460 (2021)","DOI":"10.1109\/TASLP.2021.3122291"},{"key":"862_CR15","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010933404324","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. learn. (2001). https:\/\/doi.org\/10.1023\/a:1010933404324","journal-title":"Random forests. Mach. learn."},{"key":"862_CR16","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, \u00c9.: Scikit-learn: Machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"862_CR17","doi-asserted-by":"crossref","unstructured":"Roffo, G., Melzi, S., Cristani, M.: Infinite feature selection. In 2015 IEEE International Conference on Computer Vision (ICCV), pages 4202\u20134210, (2015)","DOI":"10.1109\/ICCV.2015.478"},{"key":"862_CR18","unstructured":"Gu, Q., Li, Z., Han, J.: Generalized fisher score for feature selection. In Proceedings of the Twenty-Seventh Conference on Uncertainty in Artificial Intelligence, UAI\u201911, page 266-273, Arlington, Virginia, USA, (2011). AUAI Press"},{"key":"862_CR19","unstructured":"Liaw, R., Liang, E., Nishihara, R., Moritz, P., Gonzalez, J. E., Stoica, I.: Tune: A research platform for distributed model selection and training. arXiv preprint arXiv:1807.05118, (2018)"},{"key":"862_CR20","doi-asserted-by":"crossref","unstructured":"Akiba, T., Sano, S., Yanase, T., Ohta, T., Koyama, M.: Optuna: A next-generation hyperparameter optimization framework. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2019)","DOI":"10.1145\/3292500.3330701"},{"key":"862_CR21","unstructured":"Tim H., MechCoder, Gilles L., Iaroslav S., fcharras, Z\u00e9 V., cmmalone, Christopher S., nel215, Nuno C., Todd Y., Stefano C., Thomas F., rene r., Kejia\u00a0(KJ) S., Justus S., carlosdanielcsantos, Hvass-Labs, Mikhail P., SoManyUsernamesTaken, Fred C., Lo\u00efc E., Lilian B., Mehdi C., Karlson P., Fabian L., Christophe C., Anna G., Andreas M., Alexander F.: scikit-optimize\/scikit-optimize: v0.5.2, March (2018)"},{"issue":"2","key":"862_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0087357","volume":"9","author":"BC Ross","year":"2014","unstructured":"Ross, B.C.: Mutual information between discrete and continuous data sets. PLoS ONE 9(2), 1\u20135 (2014)","journal-title":"PLoS ONE"},{"issue":"6","key":"862_CR23","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. (TKDE) 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng. (TKDE)"},{"key":"862_CR24","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$\\ell $$-diversity: privacy beyond $$k$$-anonymity. ACM TKDD (2007). https:\/\/doi.org\/10.1145\/1217299.1217302","journal-title":"ACM TKDD"},{"key":"862_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856","author":"N Li","year":"2007","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: $$t$$-closeness: privacy beyond $$k$$-anonymity and $$\\ell $$-diversity. In ICDE (2007). https:\/\/doi.org\/10.1109\/ICDE.2007.367856","journal-title":"In ICDE"},{"issue":"6","key":"862_CR26","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1142\/S0218488512400247","volume":"20","author":"S De Capitani","year":"2012","unstructured":"De Capitani, S., di Vimercati, S., Foresti, G.L., Samarati, P.: Data privacy: Definitions and techniques. Internat. J. Uncertain. Fuzziness Knowledge-Based Systems 20(6), 793\u2013817 (2012)","journal-title":"Internat. J. Uncertain. Fuzziness Knowledge-Based Systems"},{"key":"862_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_15","author":"R Gross","year":"2005","unstructured":"Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In PET (2005). https:\/\/doi.org\/10.1007\/11767831_15","journal-title":"In PET"},{"key":"862_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587369","author":"R Gross","year":"2008","unstructured":"Gross, R., Sweeney, L., De La Torre, F., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In CVPR (2008). https:\/\/doi.org\/10.1109\/CVPR.2008.4587369","journal-title":"In CVPR"},{"key":"862_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2015.7285019","author":"Z Sun","year":"2015","unstructured":"Sun, Z., Meng, L., Ariyaeeinia, A.: Distinguishable de-identified faces. In FG (2015). https:\/\/doi.org\/10.1109\/FG.2015.7285019","journal-title":"Distinguishable de-identified faces. In FG"},{"key":"862_CR30","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends\u00ae in Theor. Comput. Sci. 9(4), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"key":"862_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101951","volume":"97","author":"MAP Chamikara","year":"2020","unstructured":"Chamikara, M.A.P., Bertok, P., Khalil, I., Liu, D., Camtepe, S.: Privacy preserving face recognition utilizing differential privacy. Comput. Secur. 97, 101951 (2020)","journal-title":"Comput. Secur."},{"issue":"1","key":"862_CR32","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MBITS.2021.3108124","volume":"1","author":"H Hsu","year":"2021","unstructured":"Hsu, H., Martinez, N., Bertran, M., Sapiro, G., Calmon, F.P.: A survey on statistical, information, and estimation-theoretic views on privacy. IEEE BITS the Inform. Theory Mag. 1(1), 45\u201356 (2021)","journal-title":"IEEE BITS the Inform. Theory Mag."},{"key":"862_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/IWOBI.2017.7985521","author":"B Meden","year":"2017","unstructured":"Meden, B., Emersic, Z., Struc, V., Peer, P.: $$\\kappa $$-same-net: neural-network-based face deidentification. In IWOBI (2017). https:\/\/doi.org\/10.1109\/IWOBI.2017.7985521","journal-title":"In IWOBI"},{"key":"862_CR34","doi-asserted-by":"publisher","unstructured":"Pan, Y.L., Haung, M.J., Ding, K.T., Wu, J.L., Jang, J.S.: K-same-siamese-gan: K-same algorithm with generative adversarial network for facial image de-identification with hyperparameter tuning and mixed precision training. In AVSS (2019). https:\/\/doi.org\/10.1109\/AVSS.2019.8909866","DOI":"10.1109\/AVSS.2019.8909866"},{"key":"862_CR35","doi-asserted-by":"crossref","unstructured":"Li, T., Lin, L.: Anonymousnet: natural face de-identification with measurable privacy. In CVPR Workshops (2019)","DOI":"10.1109\/CVPRW.2019.00013"},{"key":"862_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.05.020","author":"S Ribaric","year":"2016","unstructured":"Ribaric, S., Ariyaeeinia, A., Pavesic, N.: De-identification for privacy protection in multimedia content. Image Commun (2016). https:\/\/doi.org\/10.1016\/j.image.2016.05.020","journal-title":"Image Commun"},{"key":"862_CR37","doi-asserted-by":"crossref","unstructured":"Moriarty, B., Chen, C. F., Hu, S., Moran, S., Pistoia, M., Piuri, V., Samarati, P.: Utility-preserving biometric information anonymization. In European Symposium on Research in Computer Security, pages 24\u201341. Springer (2022)","DOI":"10.1007\/978-3-031-17146-8_2"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00862-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00862-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00862-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:17:52Z","timestamp":1721013472000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00862-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,23]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["862"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00862-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,23]]},"assertion":[{"value":"23 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This paper was prepared for informational purposes with contributions from the Global Technology Applied Research center of JPMorgan Chase & Co. This paper is not a product of the Research Department of JPMorgan Chase & Co. or its affiliates. Neither JPMorgan Chase & Co. nor any of its affiliates makes any explicit or implied representation or warranty and none of them accept any liability in connection with this paper, including, without limitation, with respect to the completeness, accuracy, or reliability of the information contained herein and the potential legal, compliance, tax, or accounting effects thereof. This document is not intended as investment research or investment advice, or as a recommendation, offer, or solicitation for the purchase or sale of any security, financial instrument, financial product or service, or to be used in any way for evaluating the merits of participating in any transaction.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimer"}}]}}