{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:20:42Z","timestamp":1763018442292,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:00:00Z","timestamp":1630540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:00:00Z","timestamp":1630540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Science and Technology Planning Project of Guizhou Province","award":["2021-382"],"award-info":[{"award-number":["2021-382"]}]},{"name":"Education Reform Project of Beihang University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11042-021-11394-x","type":"journal-article","created":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T18:23:57Z","timestamp":1630693437000},"page":"34759-34774","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Protecting image privacy through adversarial perturbation"],"prefix":"10.1007","volume":"81","author":[{"given":"Baoyu","family":"Liang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4414-4965","authenticated-orcid":false,"given":"Chao","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Lang","sequence":"additional","affiliation":[]},{"given":"Qinglong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Joel J. P. C","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Sergei","family":"Kozlov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,2]]},"reference":[{"key":"11394_CR1","doi-asserted-by":"crossref","unstructured":"Blank G, Dutton WH, Lefkowitz J (2019) Perceived threats to privacy online: The internet in Britain, the Oxford internet survey, 2019","DOI":"10.2139\/ssrn.3522106"},{"key":"11394_CR2","unstructured":"Bochkovskiy A, Wang CY, Liao HYM\u00a0(2020) Yolov4: Optimal speed and accuracy of object detection. arXiv preprint arXiv:2004.10934"},{"key":"11394_CR3","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (sp), pp. 39\u201357. IEEE","DOI":"10.1109\/SP.2017.49"},{"key":"11394_CR4","doi-asserted-by":"crossref","unstructured":"Chen Z, Kandappu T, Subbaraju V\u00a0(2020) Privattnet: Predicting privacy risks in images using visual attention (2021). In: Int Conf Pattern Recognit 25th ICPR pp. 10\u201315","DOI":"10.1109\/ICPR48806.2021.9412925"},{"key":"11394_CR5","doi-asserted-by":"crossref","unstructured":"Croce F, Hein M\u00a0(2019) Sparse and imperceivable adversarial attacks. In: Proc IEEE\/CVF Int Conf Comput Vis pp. 4724\u20134732","DOI":"10.1109\/ICCV.2019.00482"},{"key":"11394_CR6","doi-asserted-by":"crossref","unstructured":"Dabbagh M, Rayes A\u00a0(2019) Internet of things security and privacy. In: Internet of Things From Hype to Reality pp. 211\u2013238. Springer","DOI":"10.1007\/978-3-319-99516-8_8"},{"key":"11394_CR7","unstructured":"Everingham M, Van\u00a0Gool L, Williams CKI, Winn, J, Zisserman A (2007) The PASCAL Visual Object Classes Challenge  (VOC2007) Results. http:\/\/www.pascal-network.org\/challenges\/VOC\/voc2007\/workshop\/index.html"},{"key":"11394_CR8","unstructured":"Goodfellow I, Shlens J, Szegedy C\u00a0(2015) Explaining and harnessing adversarial examples"},{"key":"11394_CR9","unstructured":"Hao H, G\u00fcera D, Reibman AR, Delp EJ\u00a0(2019) A utility-preserving gan for face obscuration. arXiv preprint arXiv:1906.11979"},{"key":"11394_CR10","doi-asserted-by":"crossref","unstructured":"Jia X, Wei X, Cao X, Foroosh H\u00a0(2019) Comdefend: An efficient image compression model to defend adversarial examples. In: Proc IEEE\/CVF Conf Comput Vis Pattern Recognit pp. 6084\u20136092","DOI":"10.1109\/CVPR.2019.00624"},{"key":"11394_CR11","doi-asserted-by":"crossref","unstructured":"Jiang L, Ma X, Chen S, Bailey J, Jiang YG\u00a0(2019) Black-box adversarial attacks on video recognition models. In: Proc 27th ACM Int Conf Multimed pp. 864\u2013872","DOI":"10.1145\/3343031.3351088"},{"key":"11394_CR12","doi-asserted-by":"crossref","unstructured":"Jiao R, Zhang L, Li A\u00a0(2020) Ieye: Personalized image privacy detection. In: 2020 6th Int Conf Big Data Comput Commun (BIGCOM) pp. 91\u201395. IEEE","DOI":"10.1109\/BigCom51056.2020.00020"},{"key":"11394_CR13","unstructured":"Kopeykina L, Savchenko A\u00a0(2020) Photo privacy detection based on text classification and face clustering"},{"key":"11394_CR14","unstructured":"Kurakin A, Goodfellow I, Bengio S et\u00a0al (2016) Adversarial examples in the physical world"},{"key":"11394_CR15","doi-asserted-by":"publisher","first-page":"24332","DOI":"10.1109\/ACCESS.2017.2767622","volume":"5","author":"X Li","year":"2017","unstructured":"Li X, Li D, Yang Z, Chen W (2017) A patch-based saliency detection method for assessing the visual privacy levels of objects in photos. IEEE Access 5:24332\u201324343","journal-title":"IEEE Access"},{"key":"11394_CR16","unstructured":"Liu Y, Chen X, Liu C, Song D\u00a0(2016) Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770"},{"key":"11394_CR17","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. In: Int Conf Learn Represent"},{"key":"11394_CR18","unstructured":"McPherson R, Shokri R, Shmatikov V\u00a0(2016) Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408"},{"key":"11394_CR19","doi-asserted-by":"crossref","unstructured":"Mirjalili V, Raschka S, Ross A\u00a0(2018) Gender privacy: An ensemble of semi adversarial networks for confounding arbitrary gender classifiers. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u201310. IEEE","DOI":"10.1109\/BTAS.2018.8698605"},{"key":"11394_CR20","doi-asserted-by":"crossref","unstructured":"Oh SJ, Fritz M, Schiele B\u00a0(2017) Adversarial image perturbation for privacy protection a game theory perspective. In: 2017 IEEE Int Conf Comput Vis (ICCV) pp. 1491\u20131500. IEEE","DOI":"10.1109\/ICCV.2017.165"},{"key":"11394_CR21","unstructured":"Qiu H, Zeng Y, Zhang T, Jiang Y, Qiu M\u00a0(2020) Fencebox: A platform for defeating adversarial examples with data augmentation techniques. arXiv preprint arXiv:2012.01701"},{"key":"11394_CR22","unstructured":"Ren S, He K, Girshick R, Sun J\u00a0(2015) Faster r-cnn: Towards real-time object detection with region proposal networks. arXiv preprint arXiv:1506.01497"},{"issue":"2","key":"11394_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MSEC.2018.2888779","volume":"17","author":"BD Rouani","year":"2019","unstructured":"Rouani BD, Samragh M, Javidi T, Koushanfar F (2019) Safe machine learning and defeating adversarial attacks. IEEE Secur Priv 17(2):31\u201338","journal-title":"IEEE Secur Priv"},{"key":"11394_CR24","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R\u00a0(2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"11394_CR25","doi-asserted-by":"crossref","unstructured":"Tonge A, Caragea C\u00a0(2019) Dynamic deep multi-modal fusion for image privacy prediction. In: The World Wide Web Conference pp. 1829\u20131840","DOI":"10.1145\/3308558.3313691"},{"issue":"2","key":"11394_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3386082","volume":"14","author":"A Tonge","year":"2020","unstructured":"Tonge A, Caragea C (2020) Image privacy prediction using deep neural networks. ACM Transactions on the Web (TWEB) 14(2):1\u201332","journal-title":"ACM Transactions on the Web (TWEB)"},{"key":"11394_CR27","doi-asserted-by":"crossref","unstructured":"Yu J, Wu M, Li C, Zhu S\u00a0(2020) A street view image privacy detection and protection method based on mask-rcnn. In: 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), vol.\u00a09, pp. 2184\u20132188. IEEE","DOI":"10.1109\/ITAIC49862.2020.9338847"},{"issue":"5","key":"11394_CR28","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TIFS.2016.2636090","volume":"12","author":"J Yu","year":"2016","unstructured":"Yu J, Zhang B, Kuang Z, Lin D, Fan J (2016) iprivacy: image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans Inf Forensics Secur 12(5):1005\u20131016","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"11394_CR29","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1049\/iet-spr.2016.0756","volume":"11","author":"L Yuan","year":"2017","unstructured":"Yuan L, Ebrahimi T (2017) Image privacy protection with secure jpeg transmorphing. IET Signal Proc 11(9):1031\u20131038","journal-title":"IET Signal Proc"},{"key":"11394_CR30","doi-asserted-by":"crossref","unstructured":"Zhao Z, Liu Z, Larson M\u00a0(2020) Towards large yet imperceptible adversarial image perturbations with perceptual color distance. In: Proc IEEE\/CVF Conf Comput Vis Pattern Recognit pp. 1039\u20131048","DOI":"10.1109\/CVPR42600.2020.00112"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11394-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11394-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11394-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T10:40:11Z","timestamp":1663843211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11394-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,2]]},"references-count":30,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["11394"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11394-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,9,2]]},"assertion":[{"value":"22 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}