{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:47Z","timestamp":1740148907053,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T00:00:00Z","timestamp":1716336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T00:00:00Z","timestamp":1716336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China,China\u56fd\u5bb6\u91cd\u70b9\u7814\u53d1\u8ba1\u5212,\u4e2d\u56fd","award":["2021YFB3101300, 2021YFB3101303","2021YFB3101300, 2021YFB3101303","2021YFB3101300, 2021YFB3101303","2021YFB3101300, 2021YFB3101303"],"award-info":[{"award-number":["2021YFB3101300, 2021YFB3101303","2021YFB3101300, 2021YFB3101303","2021YFB3101300, 2021YFB3101303","2021YFB3101300, 2021YFB3101303"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972304\uff0c61932015","61972304\uff0c61932015","61972304\uff0c61932015","61972304\uff0c61932015"],"award-info":[{"award-number":["61972304\uff0c61932015","61972304\uff0c61932015","61972304\uff0c61932015","61972304\uff0c61932015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Provincial Key Research and Development Program","award":["2023-ZDLGY-35","2023-ZDLGY-35","2023-ZDLGY-35","2023-ZDLGY-35"],"award-info":[{"award-number":["2023-ZDLGY-35","2023-ZDLGY-35","2023-ZDLGY-35","2023-ZDLGY-35"]}]},{"name":"Science and Technology on Communication Networks Laboratory","award":["HHX23641X003"],"award-info":[{"award-number":["HHX23641X003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12083-024-01718-7","type":"journal-article","created":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T13:02:07Z","timestamp":1716382927000},"page":"2523-2537","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks"],"prefix":"10.1007","volume":"17","author":[{"given":"Xiaoyu","family":"Kou","sequence":"first","affiliation":[]},{"given":"Fengwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yandong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Xiaopeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,22]]},"reference":[{"issue":"2","key":"1718_CR1","first-page":"29","volume":"13","author":"S Duggineni","year":"2023","unstructured":"Duggineni S (2023) Impact of controls on data integrity and information systems. Sci Technol 13(2):29\u201335","journal-title":"Sci Technol"},{"issue":"2","key":"1718_CR2","first-page":"148","volume":"2","author":"Q Xu","year":"2024","unstructured":"Xu Q, Zhu H, Zheng Y, Wang F, Gao L (2024) Practical and Privacy-Preserving Geo-Social-Based POI Recommendation. J Inf Intell 2(2):148\u2013166","journal-title":"J Inf Intell"},{"issue":"12","key":"1718_CR3","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1109\/MCOM.012.2200794","volume":"61","author":"Z Zheng","year":"2023","unstructured":"Zheng Z, Wang Q, Wang C (2023) Spoofing attacks and anti-spoofing methods for face authentication over smartphones. IEEE Commun Mag 61(12):213\u2013219","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"1718_CR4","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1007\/s00530-023-01070-5","volume":"29","author":"D Sharma","year":"2023","unstructured":"Sharma D, Selwal A (2023) A survey on face presentation attack detection mechanisms: hitherto and future perspectives. Multim Syst 29(3):1527\u20131577","journal-title":"Multim Syst"},{"key":"1718_CR5","first-page":"774","volume":"6","author":"Q L\u00fc","year":"2020","unstructured":"L\u00fc Q, Liao X, Li H, Huang T (2020) A computation-efficient decentralized algorithm for composite constrained optimization. IEEE Trans Signal Inf Process Netw 6:774\u2013789","journal-title":"IEEE Trans Signal Inf Process Netw"},{"issue":"6","key":"1718_CR6","doi-asserted-by":"publisher","first-page":"3224","DOI":"10.1109\/TCYB.2020.2973221","volume":"51","author":"Q L\u00fc","year":"2021","unstructured":"L\u00fc Q, Liao X, Xiang T, Li H, Huang T (2021) Privacy masking stochastic subgradient-push algorithm for distributed online optimization. IEEE Trans Cybern 51(6):3224\u20133237","journal-title":"IEEE Trans Cybern"},{"key":"1718_CR7","doi-asserted-by":"crossref","unstructured":"Ito I, Kiya H (2009) One-time key based phase scrambling for phase-only correlation between visually protected images. EURASIP J Info Sec 2009:1-11","DOI":"10.1155\/2009\/841045"},{"key":"1718_CR8","first-page":"11","volume-title":"34th IEEE Symposium on Reliable Distributed Systems, SRDS 2015, Montreal, QC, Canada, September 28 - October 1, 2015","author":"B Ferreira","year":"2015","unstructured":"Ferreira B, Rodrigues J, Leit\u00e3o J, Domingos HJL (2015) 34th IEEE Symposium on Reliable Distributed Systems, SRDS 2015, Montreal, QC, Canada, September 28 - October 1, 2015. IEEE Computer Society, pp 11\u201320"},{"issue":"1","key":"1718_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","volume":"9","author":"J Zhou","year":"2014","unstructured":"Zhou J, Liu X, Au OC, Tang YY (2014) Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans Inf Forensics Secur 9(1):39\u201350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1718_CR10","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.optcom.2017.01.061","volume":"392","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Xu B, Zhou N (2017) A novel image compression-encryption hybrid algorithm based on the analysis sparse representation. Opt Commun 392:223\u2013233","journal-title":"Opt Commun"},{"issue":"1","key":"1718_CR11","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1587\/transinf.2016MUL0002","volume":"100\u2013D","author":"K Kurihara","year":"2017","unstructured":"Kurihara K, Imaizumi S, Shiota S, Kiya H (2017) An encryption-then-compression system for lossless image compression standards. IEICE Trans Inf Syst 100\u2013D(1):52\u201356","journal-title":"IEICE Trans Inf Syst"},{"key":"1718_CR12","doi-asserted-by":"publisher","first-page":"e7","DOI":"10.1017\/ATSIP.2018.33","volume":"8","author":"W Sirichotedumrong","year":"2019","unstructured":"Sirichotedumrong W, Kiya H (2019) Grayscale-based block scrambling image encryption using YCBCR color space for encryption-then-compression systems. APSIPA Trans Signal Inf Process 8:e7","journal-title":"APSIPA Trans Signal Inf Process"},{"issue":"6","key":"1718_CR13","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1109\/TIFS.2018.2881677","volume":"14","author":"T Chuman","year":"2019","unstructured":"Chuman T, Sirichotedumrong W, Kiya H (2019) Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans Inf Forensics Secur 14(6):1515\u20131525","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1718_CR14","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TCSVT.2019.2894520","volume":"30","author":"V Itier","year":"2020","unstructured":"Itier V, Puteaux P, Puech W (2020) Recompression of JPEG crypto-compressed images without a key. IEEE Trans Circuits Syst Video Technol 30(3):646\u2013660","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"12","key":"1718_CR15","doi-asserted-by":"publisher","first-page":"1571","DOI":"10.1587\/transfun.2020SMP0022","volume":"103\u2013A","author":"A Kawamura","year":"2020","unstructured":"Kawamura A, Kinoshita Y, Nakachi T, Shiota S, Kiya H (2020) A privacy-preserving machine learning scheme using ETC images. IEICE Trans Fundam Electron Commun Comput Sci 103\u2013A(12):1571\u20131578","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"issue":"12","key":"1718_CR16","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1587\/transfun.E102.A.1849","volume":"102\u2013A","author":"T Maekawa","year":"2019","unstructured":"Maekawa T, Kawamura A, Nakachi T, Kiya H (2019) Privacy-preserving support vector machine computing using random unitary transformation. IEICE Trans Fundam Electron Commun Comput Sci 102\u2013A(12):1849\u20131855","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"1718_CR17","first-page":"679","volume-title":"2019 IEEE International Conference on Image Processing, ICIP 2019, Taipei, Taiwan, September 22\u201325, 2019","author":"S Beugnon","year":"2019","unstructured":"Beugnon S, Puteaux P, Puech W (2019) 2019 IEEE International Conference on Image Processing, ICIP 2019, Taipei, Taiwan, September 22\u201325, 2019. IEEE, pp 679\u2013683"},{"key":"1718_CR18","unstructured":"Tanaka M (2018) Learnable image encryption. CoRR abs\/1804.00490. 1804.00490"},{"key":"1718_CR19","first-page":"674","volume-title":"ICIP","author":"W Sirichotedumrong","year":"2019","unstructured":"Sirichotedumrong W, Maekawa T, Kinoshita Y, Kiya H (2019) ICIP. IEEE, pp 674\u2013678"},{"key":"1718_CR20","doi-asserted-by":"publisher","first-page":"177844","DOI":"10.1109\/ACCESS.2019.2959017","volume":"7","author":"W Sirichotedumrong","year":"2019","unstructured":"Sirichotedumrong W, Kinoshita Y, Kiya H (2019) Pixel-based image encryption without key management for privacy-preserving deep neural networks. IEEE Access 7:177844\u2013177855","journal-title":"IEEE Access"},{"issue":"9","key":"1718_CR21","doi-asserted-by":"publisher","first-page":"213","DOI":"10.21884\/IJMTER.2016.3068.YIAPY","volume":"3","author":"MT Gaata","year":"2016","unstructured":"Gaata MT, Hantoosh FF (2016) An efficient image encryption technique using chaotic logistic map and RC4 stream cipher. Int J Mod Trends Eng Res 3(9):213\u2013218","journal-title":"Int J Mod Trends Eng Res"},{"key":"1718_CR22","first-page":"745","volume-title":"28th European Signal Processing Conference, EUSIPCO 2020, Amsterdam, Netherlands, January 18\u201321, 2021","author":"W Sirichotedumrong","year":"2020","unstructured":"Sirichotedumrong W, Kiya H (2020) 28th European Signal Processing Conference, EUSIPCO 2020, Amsterdam, Netherlands, January 18\u201321, 2021. IEEE, pp 745\u2013749"},{"issue":"8","key":"1718_CR23","doi-asserted-by":"publisher","first-page":"161:1","DOI":"10.1145\/3547299","volume":"55","author":"C Liu","year":"2023","unstructured":"Liu C, Zhu T, Zhang J, Zhou W (2023) Privacy intelligence: a survey on image privacy in online social networks. ACM Comput Surv 55(8):161:1-161:35","journal-title":"ACM Comput Surv"},{"issue":"12","key":"1718_CR24","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1109\/TIP.2005.859389","volume":"14","author":"HR Sheikh","year":"2005","unstructured":"Sheikh HR, Bovik AC, de Veciana G (2005) An information fidelity criterion for image quality assessment using natural scene statistics. IEEE Trans Image Process 14(12):2117\u20132128","journal-title":"IEEE Trans Image Process"},{"key":"1718_CR25","doi-asserted-by":"publisher","first-page":"101951","DOI":"10.1016\/j.cose.2020.101951","volume":"97","author":"MAP Chamikara","year":"2020","unstructured":"Chamikara MAP, Bert\u00f3k P, Khalil I, Liu D, Camtepe S (2020) Privacy preserving face recognition utilizing differential privacy. Comput Secur 97:101951","journal-title":"Comput Secur"},{"key":"1718_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/978-3-319-89641-0","volume-title":"Image pixelization with differential privacy","author":"L Fan","year":"2018","unstructured":"Fan L (2018) Image pixelization with differential privacy. Lecture Notes in Computer Science. Springer, pp 148\u2013162"},{"key":"1718_CR27","first-page":"784","volume-title":"ICME","author":"L Fan","year":"2019","unstructured":"Fan L (2019) ICME. IEEE, pp 784\u2013789"},{"issue":"1","key":"1718_CR28","doi-asserted-by":"publisher","first-page":"483","DOI":"10.3390\/make1010029","volume":"1","author":"M Senekane","year":"2019","unstructured":"Senekane M (2019) Differentially private image classification using support vector machine and differential privacy. Mach Learn Knowl Extr 1(1):483\u2013491","journal-title":"Mach Learn Knowl Extr"},{"key":"1718_CR29","doi-asserted-by":"crossref","unstructured":"Sharma S, Chen K (2018, October). Image disguising for privacy-preserving deep learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 2291-2293)","DOI":"10.1145\/3243734.3278511"},{"issue":"4","key":"1718_CR30","doi-asserted-by":"publisher","first-page":"40:1","DOI":"10.1145\/3335054","volume":"10","author":"A Tonge","year":"2019","unstructured":"Tonge A, Caragea C (2019) Privacy-aware tag recommendation for accurate image privacy prediction. ACM Trans Intell Syst Technol 10(4):40:1-40:28","journal-title":"ACM Trans Intell Syst Technol"},{"key":"1718_CR31","doi-asserted-by":"publisher","first-page":"107360","DOI":"10.1016\/j.patcog.2020.107360","volume":"105","author":"G Yang","year":"2020","unstructured":"Yang G, Cao J, Chen Z, Guo J, Li J (2020) Graph-based neural networks for explainable image privacy inference. Pattern Recognit 105:107360","journal-title":"Pattern Recognit"},{"issue":"5","key":"1718_CR32","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TIFS.2016.2636090","volume":"12","author":"J Yu","year":"2017","unstructured":"Yu J, Zhang B, Kuang Z, Lin D, Fan J (2017) iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans Inf Forensics Secur 12(5):1005\u20131016","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1718_CR33","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3390\/s21010058","volume":"21","author":"J Yu","year":"2021","unstructured":"Yu J, Xue H, Liu B, Wang Y, Zhu S, Ding M (2021) GAN-based differential private image privacy protection framework for the internet of multimedia things. Sensors 21(1):58","journal-title":"Sensors"},{"key":"1718_CR34","doi-asserted-by":"publisher","first-page":"64629","DOI":"10.1109\/ACCESS.2021.3074968","volume":"9","author":"H Ito","year":"2021","unstructured":"Ito H, Kinoshita Y, AprilPyone M, Kiya H (2021) Image to perturbation: an image transformation network for generating visually protected images for privacy-preserving deep neural networks. IEEE Access 9:64629\u201364638","journal-title":"IEEE Access"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01718-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01718-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01718-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:10:12Z","timestamp":1732039812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01718-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,22]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["1718"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01718-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,5,22]]},"assertion":[{"value":"26 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The manuscript does not include human or animal research.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The manuscript has been submitted solely to this journal and is not published, in press, or submitted elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}