{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:52:47Z","timestamp":1764071567470,"version":"3.45.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05730-1","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:15:33Z","timestamp":1760033733000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["No shadow left behind: diminishing shadows for enhancing privacy guarantees in mixed reality"],"prefix":"10.1007","volume":"28","author":[{"given":"Salam","family":"Tabet","sequence":"first","affiliation":[]},{"given":"Kareem","family":"Bouakl","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"key":"5730_CR1","doi-asserted-by":"crossref","unstructured":"Hadan, H., Wang, D.M., Nacke, L.E., Zhang-Kennedy, L.: Privacy in immersive extended reality: exploring user perceptions, concerns, and coping strategies. In: the 2024 CHI Conference on human factors in computing systems, Honolulu HI USA, 11\u201316 (2024)","DOI":"10.1145\/3613904.3642104"},{"key":"5730_CR2","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0117","author":"A Gallardo","year":"2023","unstructured":"Gallardo, A., Choy, C., Juneja, J., Bozkir, E., Cobb, C., Bauer, L., Cranor, L.: Speculative privacy concerns about AR glasses data collection. Proceedings on Privacy Enhancing Technologies (2023). https:\/\/doi.org\/10.56553\/popets-2023-0117","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"2","key":"5730_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3390\/fi17020055","volume":"17","author":"CC Ana","year":"2025","unstructured":"Ana, C.C., Rog\u00e9rio Lu\u00eds de, C.C., Santos, L., Rabad\u00e3o, C., Marto, A., Gon\u00e7alves, A.: Assessing user perceptions and preferences on applying obfuscation techniques for privacy protection in augmented reality. Future Internet 17(2), 55 (2025)","journal-title":"Future Internet"},{"key":"5730_CR4","doi-asserted-by":"crossref","unstructured":"Ramajayam, G., Sun, T., Tan, C.C., Luo, L., Ling, H.: Saliency-aware privacy protection in augmented reality systems. In: the first Workshop on Metaverse Systems and Applications, Helsinki Finland, 18\u201322 (2023)","DOI":"10.1145\/3597063.3597358"},{"key":"5730_CR5","doi-asserted-by":"crossref","unstructured":"Corbett, M., David-John, B., Shang, J., Hu, Y.C., Ji, B.: BystandAR: protecting bystander visual data in augmented reality systems. In: the 21st Annual International Conference on Mobile Systems, Applications and Services, 18\u201322 (2023)","DOI":"10.1145\/3581791.3596830"},{"key":"5730_CR6","unstructured":"Nama, A., Dharmasiri, A., Thilakarathna, K., Zomaya, A.Y., Guzman, J.A.: User configurable 3D object regeneration for spatial privacy. Preprint at https:\/\/arxiv.org\/abs\/2108.08273 (2021)"},{"key":"5730_CR7","doi-asserted-by":"crossref","unstructured":"Shibuya, M., Sumikura, S., Sakurada, K.: Privacy preserving visual SLAM. In: 2020 16th European Conference on Computer Vision (ECCV 2020), Online, 23\u201328 (2020)","DOI":"10.1007\/978-3-030-58542-6_7"},{"key":"5730_CR8","doi-asserted-by":"crossref","unstructured":"Tabet, S., Kayssi, A., Elhajj, I.H.: Mobile diminished reality for preserving 3D visual privacy. In: 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA), Tartu, Estonia, 18\u201320 (2023)","DOI":"10.1109\/iMETA59369.2023.10294436"},{"key":"5730_CR9","doi-asserted-by":"crossref","unstructured":"Tabet, S., Kayssi, A., Elhajj, I.H.: Utility-privacy aware mobile diminished reality framework for 3D visual privacy. In: 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), Washington D.C., USA, 28\u201330 (2024)","DOI":"10.1109\/TPS-ISA62245.2024.00015"},{"key":"5730_CR10","doi-asserted-by":"crossref","unstructured":"Tabet, S., Kayssi, A., Elhajj, I.H.: AI-Enhanced mobile diminished reality for preserving 3D visual privacy. In: 2024 2nd International Conference on Intelligent Metaverse Technologies & Applications (iMETA), Dubai, United Arab Emirates, 26\u201329 (2024)","DOI":"10.1109\/iMETA62882.2024.10807959"},{"issue":"2","key":"5730_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1068\/p2994","volume":"29","author":"JF Norman","year":"2000","unstructured":"Norman, J.F., Dawson, T.E., Raines, S.R.: The perception and recognition of natural object shape from deforming and static shadows. Perception 29(2), 135\u2013148 (2000)","journal-title":"Perception"},{"issue":"6","key":"5730_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359626","volume":"52","author":"JA De Guzman","year":"2019","unstructured":"De Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Security and privacy approaches in mixed reality: A literature survey. ACM Computing Surveys (CSUR) 52(6), 1\u201337 (2019). https:\/\/doi.org\/10.1145\/3359626","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"5","key":"5730_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3708501","volume":"57","author":"R Zhao","year":"2025","unstructured":"Zhao, R., Zhang, Y., Wang, T., Wen, W., Xiang, Y., Cao, X.: Visual content privacy protection: A survey. ACM Comput. Surv. 57(5), 1\u201336 (2025). https:\/\/doi.org\/10.1145\/3708501","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"5730_CR14","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1007\/s11042-016-4337-7","volume":"77","author":"A Erdelyi","year":"2018","unstructured":"Erdelyi, A., Winkler, T., Rinner, B.: Privacy protection vs. utility in visual data. Multimedia Tools and Applications 77(2), 2285\u20132312 (2018). https:\/\/doi.org\/10.1007\/s11042-016-4337-7","journal-title":"Multimedia Tools and Applications"},{"key":"5730_CR15","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. Preprint at https:\/\/arxiv.org\/abs\/1602.05629 (2023)"},{"key":"5730_CR16","unstructured":"Dwork, C.: Differential privacy. In: ICALP\u201906: Proceedings of the 33rd international conference on Automata, Languages and Programming, Venice, Italy, 10\u201314 (2006)"},{"issue":"4","key":"5730_CR17","doi-asserted-by":"publisher","first-page":"277","DOI":"10.2478\/popets-2020-0073","volume":"2020","author":"H Wang","year":"2020","unstructured":"Wang, H., Xie, S., Hong, Y.: Videodp: A flexible platform for video analytics with differential privacy. Proceedings on Privacy Enhancing Technologies 2020(4), 277\u2013296 (2020). https:\/\/doi.org\/10.2478\/popets-2020-0073","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"5730_CR18","doi-asserted-by":"crossref","unstructured":"Ziad, M.T.I., Alanwar, A., Alzantot, M., Srivastava, M.: CryptoImg: Privacy preserving processing over encrypted images. In: 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 17\u201319 (2016)","DOI":"10.1109\/CNS.2016.7860550"},{"key":"5730_CR19","doi-asserted-by":"crossref","unstructured":"Ebel, A., Garimella, K., Reagen, B.: Orion: A fully homomorphic encryption framework for deep learning. Preprint at https:\/\/arxiv.org\/abs\/2311.03470 (2025)","DOI":"10.1145\/3676641.3716008"},{"issue":"6","key":"5730_CR20","doi-asserted-by":"publisher","first-page":"12959","DOI":"10.3390\/s150612959","volume":"15","author":"J Padilla-L\u00f3pez","year":"2015","unstructured":"Padilla-L\u00f3pez, J., Chaaraoui, A., Gu, F., Fl\u00f3rez-Revuelta, F.: Visual privacy by context: Proposal and evaluation of a level-based visualisation scheme. Sensors 15(6), 12959\u201312982 (2015). https:\/\/doi.org\/10.3390\/s150612959","journal-title":"Sensors"},{"key":"5730_CR21","unstructured":"Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: A scalable and privacy-aware iot service for live video analytics. In: MMSys\u201917: Multimedia Systems Conference 2017, Taipei, Taiwan, 20\u201323 (2017)"},{"key":"5730_CR22","doi-asserted-by":"crossref","unstructured":"Korayem, M., Templeman, R., Chen, D., Crandall, D., Kapadia, A.: Enhancing lifelogging privacy by detecting screens. In: CHI\u201916: CHI Conference on Human Factors in Computing Systems, San Jose, California, USA, 07\u201312 (2016)","DOI":"10.1145\/2858036.2858417"},{"key":"5730_CR23","unstructured":"Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: A scalable and privacy-aware iot service for live video analytics. In: MMSys\u201917: Multimedia Systems Conference 2017, Taipei Taiwan, 20\u201323 (2017)"},{"key":"5730_CR24","unstructured":"Guzman, J.A., Thilakarathna, K., Seneviratne, A.: SafeMR: Privacy-aware visual information protection for mobile mixed reality. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, 14\u201317 (2019)"},{"issue":"5","key":"5730_CR25","doi-asserted-by":"publisher","first-page":"14715","DOI":"10.1007\/s11042-023-15775-2","volume":"83","author":"S Ravi","year":"2024","unstructured":"Ravi, S., Climent-P\u00e9rez, P., Florez-Revuelta, F.: A review on visual privacy preservation techniques for active and assisted living. Multimedia Tools and Applications 83(5), 14715\u201314755 (2024). https:\/\/doi.org\/10.1007\/s11042-023-15775-2","journal-title":"Multimedia Tools and Applications"},{"key":"5730_CR26","doi-asserted-by":"crossref","unstructured":"Zarepour, E., Hosseini, M., Kanhere, S.S., Sowmya, A.: A context-based privacy preserving framework for wearable visual lifeloggers. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, NSW, Australia, 14\u201318 (2016)","DOI":"10.1109\/PERCOMW.2016.7457057"},{"key":"5730_CR27","doi-asserted-by":"crossref","unstructured":"Raval, N., Srivastava, A., Lebeck, K., Cox, L., Machanavajjhala, A.: MarkIt: privacy markers for protecting visual secrets. In: UbiComp \u201914: The 2014 ACM Conference on Ubiquitous Computing, Seattle, Washington, USA, 13\u201317 (2014)","DOI":"10.1145\/2638728.2641707"},{"key":"5730_CR28","doi-asserted-by":"crossref","unstructured":"Butler, D.J., Huang, J., Roesner, F., Cakmak, M.: The privacy-utility tradeoff for remotely teleoperated robots. In: 2015 10th ACM\/IEEE International Conference on Human-Robot Interaction (HRI), Portland, OR, USA, 18\u201324 (2015)","DOI":"10.1145\/2696454.2696484"},{"key":"5730_CR29","unstructured":"Guzman, J.A., Thilakarathna, K., Seneviratne, A.P.: Conservative plane releasing for spatial privacy protection in mixed reality. Preprint at https:\/\/arxiv.org\/abs\/2004.08029 (2020)"},{"key":"5730_CR30","doi-asserted-by":"crossref","unstructured":"Yang, G., Cao, J., Wang, D., Qi, P., Li, J.: ERASER: AdvERsArial sensitive element remover for image privacy preservation. In: Proceedings of the AAAI Conference on Artificial Intelligence, Washington DC, USA, 07\u201314 (2023)","DOI":"10.1609\/aaai.v37i12.26705"},{"key":"5730_CR31","doi-asserted-by":"crossref","unstructured":"Li, M., Xu, X., Fan, H., Zhou, P., Liu, J., Liu, J.-W., Li, J., Keppo, J., Shou, M.Z., Yan, S.: STPrivacy: spatio-temporal privacy-preserving action recognition. In: 2023 IEEE\/CVF International Conference on Computer Vision (ICCV), Paris, France, 01\u201306 (2023)","DOI":"10.1109\/ICCV51070.2023.00471"},{"key":"5730_CR32","doi-asserted-by":"publisher","first-page":"66964","DOI":"10.1109\/ACCESS.2024.3399539","volume":"12","author":"S Ahmad","year":"2024","unstructured":"Ahmad, S., Morerio, P., Del Bue, A.: Event anonymization: Privacy-preserving person re-identification and pose estimation in event-based vision. IEEE Access 12, 66964\u201366980 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3399539","journal-title":"IEEE Access"},{"key":"5730_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2025.129556","volume":"626","author":"X Zhang","year":"2025","unstructured":"Zhang, X., Wang, T., Ji, J., Zhang, Y., Lan, R.: Privacy-preserving face attribute classification via differential privacy. Neurocomputing 626, 129556 (2025). https:\/\/doi.org\/10.1016\/j.neucom.2025.129556","journal-title":"Neurocomputing"},{"key":"5730_CR34","doi-asserted-by":"crossref","unstructured":"Dave, I.R., Chen, C., Shah, M.: SPAct: Self-supervised privacy preservation for action recognition. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), New Orleans, LA, USA, 18\u201324 (2024)","DOI":"10.1109\/CVPR52688.2022.01953"},{"issue":"21","key":"5730_CR35","doi-asserted-by":"publisher","first-page":"34734","DOI":"10.1109\/JIOT.2024.3418034","volume":"11","author":"S Chen","year":"2024","unstructured":"Chen, S., Yu, L., Liu, Y., Ding, Z., Zhang, J., Wang, X., Han, J., Liu, R.: Diminished reality techniques for metaverse applications: A perspective from evaluation. IEEE Internet Things J. 11(21), 34734\u201334748 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3418034","journal-title":"IEEE Internet Things J."},{"key":"5730_CR36","doi-asserted-by":"crossref","unstructured":"Strecker, J., Wu, J., Bekta\u015f, K., Vaslin, C., Mayer, S.: ShoppingCoach: Using diminished reality to prevent unhealthy food choices in an offline supermarket scenario. In: CHI Conference on Human Factors in Computing Systems, Honolulu HI USA, 11\u201316 (2024)","DOI":"10.1145\/3613905.3650795"},{"key":"5730_CR37","doi-asserted-by":"crossref","unstructured":"Lee, J., Kim, L.H.: DiminishAR: Diminishing visual distractions via holographic AR displays. Preprint at https:\/\/arxiv.org\/abs\/2403.03875 (2025)","DOI":"10.1145\/3706598.3713415"},{"issue":"2","key":"5730_CR38","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1007\/s00371-023-02829-7","volume":"40","author":"C Rudolph","year":"2024","unstructured":"Rudolph, C., Brunnett, G., Bretschneider, M., Meyer, B., Asbrock, F.: Technosapiens: merging humans with technology in augmented reality. Vis. Comput. 40(2), 1021\u20131036 (2024). https:\/\/doi.org\/10.1007\/s00371-023-02829-7","journal-title":"Vis. Comput."},{"issue":"2","key":"5730_CR39","doi-asserted-by":"publisher","first-page":"2571","DOI":"10.1007\/s00371-022-02479-1","volume":"39","author":"T Kim","year":"2023","unstructured":"Kim, T., Kim, G.J.: Real-time and on-line removal of moving human figures in hand-held mobile augmented reality. Vis. Comput. 39(2), 2571\u20132582 (2023). https:\/\/doi.org\/10.1007\/s00371-022-02479-1","journal-title":"Vis. Comput."},{"issue":"5","key":"5730_CR40","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1093\/jcde\/qwac067","volume":"9","author":"T Kikuchi","year":"2022","unstructured":"Kikuchi, T., Fukuda, T., Yabuki, N.: Diminished reality using semantic segmentation and generative adversarial network for landscape assessment: evaluation of image inpainting according to colour vision. Journal of Computational Design and Engineering 9(5), 1633\u20131649 (2022). https:\/\/doi.org\/10.1093\/jcde\/qwac067","journal-title":"Journal of Computational Design and Engineering"},{"key":"5730_CR41","doi-asserted-by":"crossref","unstructured":"Cheng, Y.F., Yin, H., Yan, Y., Gugenheimer, J., Lindlbauer, D.: Towards understanding diminished reality. In: 2022 CHI Conference on Human Factors in Computing Systems, Honolulu HI USA, 29 April \u20135 May (2022)","DOI":"10.1145\/3491102.3517452"},{"issue":"1","key":"5730_CR42","doi-asserted-by":"publisher","first-page":"12959","DOI":"10.1080\/10867651.2004.10487596","volume":"9","author":"A Telea","year":"2004","unstructured":"Telea, A.: An image inpainting technique based on the fast marching method. Journal of Graphics Tools 9(1), 12959\u201312982 (2004). https:\/\/doi.org\/10.1080\/10867651.2004.10487596","journal-title":"Journal of Graphics Tools"},{"key":"5730_CR43","unstructured":"Bertalmio, M., Bertozzi, A.L., Sapiro, G.: Navier-stokes, fluid dynamics, and image and video inpainting. In: 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, Kauai, HI, USA, 08\u201314 (2001)"},{"key":"5730_CR44","unstructured":"Developers, G.: Download Android Studio & App Tools - Android Developers. https:\/\/developer.android.com\/studio"},{"key":"5730_CR45","unstructured":"Developers, G.: Build new augmented reality experiences that seamlessly blend the digital and physical worlds | ARCore | Google for Developers. https:\/\/developers.google.com\/ar"},{"key":"5730_CR46","unstructured":"OpenCV: VIT tracker. https:\/\/github.com\/opencv\/opencv_zoo\/tree\/main\/models\/object_tracking_vittrack"},{"key":"5730_CR47","doi-asserted-by":"crossref","unstructured":"Le, H., Vicente, T.F.Y., Nguyen, V., Hoai, M., Samaras, D.: A+D Net: Training a Shadow Detector with Adversarial Shadow Attenuation. Preprint at https:\/\/arxiv.org\/abs\/1712.01361 (2018)","DOI":"10.1007\/978-3-030-01216-8_41"},{"key":"5730_CR48","unstructured":"DeepSeek Inc.: DeepSeek-R1-Lite-Preview. https:\/\/www.deepseek.com"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05730-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05730-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05730-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:48:43Z","timestamp":1764071323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05730-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":48,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5730"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05730-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"29 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"992"}}