{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T09:10:47Z","timestamp":1767863447901,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/ccwc.2018.8301741","type":"proceedings-article","created":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T22:14:26Z","timestamp":1520288066000},"page":"287-293","source":"Crossref","is-referenced-by-count":8,"title":["Toward metadata removal to preserve privacy of social media users"],"prefix":"10.1109","author":[{"given":"Shahab","family":"Tayeb","sequence":"first","affiliation":[]},{"given":"Abigail","family":"Week","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Yee","sequence":"additional","affiliation":[]},{"given":"Mayra","family":"Carrera","sequence":"additional","affiliation":[]},{"given":"Kuira","family":"Edwards","sequence":"additional","affiliation":[]},{"given":"Vicki","family":"Murray-Garcia","sequence":"additional","affiliation":[]},{"given":"Meghann","family":"Marchello","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Matin","family":"Pirouz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33765-9_59"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462113"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2151-7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GOCICT.2015.14"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2012.6227909"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.128"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.276"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/2713168.2713194","article-title":"RAISE-A Raw Images Dataset for Digital Image Forensics","author":"dang-nguyen","year":"2015","journal-title":"ACM Multimedia Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368580"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/35021BIGCOMP.2015.7072814"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2015.110"},{"key":"ref5","first-page":"85","article-title":"Protecting personal information online: A survey of user privacy concerns and control techniques","volume":"44","author":"chen","year":"2004","journal-title":"Journal of Computer Information Systems"},{"key":"ref8","first-page":"293","article-title":"Data hiding technique for digital images tracing system on the Web","author":"yoo","year":"0","journal-title":"Information Science and Service Science and Data Mining (ISSDM) 2012 6th International Conference on New Trends in"},{"key":"ref7","first-page":"16","author":"pomerantz","year":"2015","journal-title":"Metadata (The MIT Press Essential Knowledge series)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2016.7726913"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTA.2015.7426905"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2004.1394582"},{"key":"ref20","author":"couchot","year":"2016","journal-title":"Steganalysis via a Convolutional Neural Network using Large Convolution Filters"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1743384.1743475"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1460096.1460104","article-title":"The MIR flickr retrieval evaluation","author":"huiskes","year":"2008","journal-title":"Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval"},{"key":"ref24","author":"lindsay","year":"2011","journal-title":"Social media and disasters Current uses future options and policy considerations"},{"key":"ref23","first-page":"1","article-title":"Big data privacy issues in public social media. In Digital Ecosystem Technologies (DEST)","author":"smith","year":"0","journal-title":"2012 6th IEEE International Conference on"}],"event":{"name":"2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)","location":"Las Vegas, NV","start":{"date-parts":[[2018,1,8]]},"end":{"date-parts":[[2018,1,10]]}},"container-title":["2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8293728\/8301613\/08301741.pdf?arnumber=8301741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T07:52:11Z","timestamp":1660549931000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8301741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ccwc.2018.8301741","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}