{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:36:16Z","timestamp":1761989776763,"version":"3.40.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["20K11829","21H00584"],"award-info":[{"award-number":["20K11829","21H00584"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3547758","type":"journal-article","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T18:50:25Z","timestamp":1741114225000},"page":"44135-44155","source":"Crossref","is-referenced-by-count":1,"title":["Implementation and Evaluation of a Person Identification System Considering Face Image Recognition Accuracy and Privacy Protection"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1982-6363","authenticated-orcid":false,"given":"Satoru","family":"Matsumoto","sequence":"first","affiliation":[{"name":"Graduate School of Information Science and Technology, Osaka University, Toyonaka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8746-872X","authenticated-orcid":false,"given":"Tomoki","family":"Yoshihisa","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, Shiga University, Hikone, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4364-5877","authenticated-orcid":false,"given":"Hideyuki","family":"Shimonishi","sequence":"additional","affiliation":[{"name":"D3 Center, Osaka University, Toyonaka, Japan"}]},{"given":"Tomoya","family":"Kawakami","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, University of Fukui, Fukui, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0360-6174","authenticated-orcid":false,"given":"Yuuichi","family":"Teranishi","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc51664.2024.10454632"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3486622.3493917"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3273988"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3199414"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850328"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icme51207.2021.9428115"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/focs.2011.88"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i3.405"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/5.771073"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2020.3006760"},{"issue":"9","key":"ref14","first-page":"2181","article-title":"Differential privacy with bounded noise: Improved utility and application to privacy-preserving machine learning","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref15","first-page":"45684","article-title":"Achieving differential privacy with Laplace noise injection in data streams","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-021-10477-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/comex.2023col0010"},{"key":"ref20","article-title":"Fairly private: Investigating the fairness of visual privacy preservation algorithms","volume-title":"arXiv:2301.05012","author":"Noiret","year":"2023"},{"key":"ref21","article-title":"FaceMAE: Privacy-preserving face recognition via masked autoencoders","volume-title":"arXiv:2205.11090","author":"Wang","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5220\/0012373200003660"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19775-8_28"},{"volume-title":"An Open Source 2D and 3D Deep Face Analysis Library","key":"ref24"},{"volume-title":"YouTubeFacesDatabase","key":"ref25"},{"key":"ref26","first-page":"1854","article-title":"Defending against GAN-based image reconstruction attacks on encrypted facial data","volume":"15","author":"Yang","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3307156"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/39\/20230593"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2023.0140643"},{"key":"ref30","article-title":"Automatic polyp segmentation using U-Net-ResNet50","volume-title":"arXiv:2012.15247","author":"Alam","year":"2020"},{"key":"ref31","article-title":"Denoising diffusion probabilistic models","volume-title":"arXiv:2006.11239","author":"Ho","year":"2020"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10909550.pdf?arnumber=10909550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T17:48:46Z","timestamp":1742233726000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10909550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3547758","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}