{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:35:43Z","timestamp":1751607343001,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,6]],"date-time":"2017-06-06T00:00:00Z","timestamp":1496707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SURF Cooperative"},{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC52-07NA27344"],"award-info":[{"award-number":["DE-AC52-07NA27344"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1514509"],"award-info":[{"award-number":["CNS 1514509"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,6]]},"DOI":"10.1145\/3078971.3080543","type":"proceedings-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T16:27:32Z","timestamp":1495729652000},"page":"84-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["The Geo-Privacy Bonus of Popular Photo Enhancements"],"prefix":"10.1145","author":[{"given":"Jaeyoung","family":"Choi","sequence":"first","affiliation":[{"name":"Delft University of Technology &amp; International Computer Science Institute, Delft, Netherlands"}]},{"given":"Martha","family":"Larson","sequence":"additional","affiliation":[{"name":"Radboud University &amp; Delft University of Technology, Nijmegen, Netherlands"}]},{"given":"Xinchao","family":"Li","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Kevin","family":"Li","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, Berkeley, CA, USA"}]},{"given":"Gerald","family":"Friedland","sequence":"additional","affiliation":[{"name":"Lawrence Livermore National Laboratory &amp; University of California, Berkeley, Livermore, CA, USA"}]},{"given":"Alan","family":"Hanjalic","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2017,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_2_1","first-page":"12","volume-title":"ICWSM.","author":"Bakhshi Saeideh","unstructured":"Saeideh Bakhshi , David A Shamma , Lyndon Kennedy , and Eric Gilbert . 2015 Why We Filter Our Photos and How It Impacts Engagement .. In ICWSM. pages 12 -- 21 . Saeideh Bakhshi, David A Shamma, Lyndon Kennedy, and Eric Gilbert. 2015 Why We Filter Our Photos and How It Impacts Engagement.. In ICWSM. pages12--21."},{"key":"e_1_3_2_1_3_1","first-page":"12","volume-title":"2015 Teaching Privacy: Multimedia Making a Difference","author":"Bernd Julia","year":"2015","unstructured":"Julia Bernd , Blanca Gordo , Jaeyoung Choi , Bryan Morgan , Nicholas Henderson , Serge Egelman , Daniel D Garcia , and Gerald Friedland . 2015 Teaching Privacy: Multimedia Making a Difference . IEEE MultiMedia volume 22, number1 ( 2015 ), pages 12 -- 19 . Julia Bernd, Blanca Gordo, Jaeyoung Choi, Bryan Morgan, Nicholas Henderson, Serge Egelman, Daniel D Garcia, and Gerald Friedland. 2015 Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia volume 22, number1 (2015), pages12--19."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"volume-title":"Obfuscation: A user's guide for privacy and protest","author":"Brunton Finn","key":"e_1_3_2_1_5_1","unstructured":"Finn Brunton and Helen Nissenbaum . Obfuscation: A user's guide for privacy and protest . MIT Press . Finn Brunton and Helen Nissenbaum. Obfuscation: A user's guide for privacy and protest. MIT Press."},{"key":"e_1_3_2_1_6_1","first-page":"93941L","volume-title":"Ahmet Aky\u00fcz O\u011fuz, and Touradj Ebrahimi","author":"\u00c7ift\u00e7i Serdar","year":"2015","unstructured":"Serdar \u00c7ift\u00e7i , Pavel Korshunov , Ahmet Aky\u00fcz O\u011fuz, and Touradj Ebrahimi . 2015 . Using False Colors to Protect Visual Privacy of Sensitive Content. In SPIE Human Vision and Electronic Imaging XX. pages 93941L - 939411 -93941L-13. Serdar \u00c7ift\u00e7i, Pavel Korshunov, Ahmet Aky\u00fcz O\u011fuz, and Touradj Ebrahimi. 2015. Using False Colors to Protect Visual Privacy of Sensitive Content. In SPIE Human Vision and Electronic Imaging XX. pages93941L-1-93941L-13."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995610"},{"key":"e_1_3_2_1_8_1","volume-title":"Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy. journal arXiv preprint arXiv:1603.01335","author":"Choi Jaeyoung","year":"2016","unstructured":"Jaeyoung Choi , Martha Larson , Xinchao Li , Gerald Friedland , and Alan Hanjalic . 2016. Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy. journal arXiv preprint arXiv:1603.01335 ( 2016 ). Jaeyoung Choi, Martha Larson, Xinchao Li, Gerald Friedland, and Alan Hanjalic. 2016. Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy. journal arXiv preprint arXiv:1603.01335 (2016)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2337654"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1877972.1877977"},{"key":"e_1_3_2_1_11_1","first-page":"2121","volume-title":"Adaptive Subgradient Methods for Online Learning and Stochastic Optimization. JMLR","author":"Duchi Hazan E.","year":"2011","unstructured":"Hazan E. Singer Y. Duchi , J. 2011. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization. JMLR volume 12 ( 2011 ), pages 2121 -- 2159 . Hazan E. Singer Y. Duchi, J. 2011. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization. JMLR volume12 (2011), pages 2121--2159."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502088"},{"volume-title":"Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec'10)","author":"Gerald","key":"e_1_3_2_1_13_1","unstructured":"Gerald Friedl and and Robin Sommer. 2010. Cybercasing the Joint: On the Privacy Implications of Geo-tagging . In Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec'10) . USENIX Association, Berkeley, CA, USA, pages1--8. Gerald Friedl and and Robin Sommer. 2010. Cybercasing the Joint: On the Privacy Implications of Geo-tagging. In Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec'10). USENIX Association, Berkeley, CA, USA, pages1--8."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.122"},{"key":"e_1_3_2_1_15_1","volume-title":"Working Notes Proceedings of the MediaEval 2013 Workshop.","author":"Hauff Claudia","year":"2013","unstructured":"Claudia Hauff , Bart Thomee , and Michele Trevisiol . 2013 . Working Notes for the Placing Task at MediaEval 2013 . In Working Notes Proceedings of the MediaEval 2013 Workshop. Claudia Hauff, Bart Thomee, and Michele Trevisiol. 2013. Working Notes for the Placing Task at MediaEval 2013. In Working Notes Proceedings of the MediaEval 2013 Workshop."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587784"},{"key":"e_1_3_2_1_17_1","first-page":"997","volume-title":"Image Processing (ICIP), 2010 17th IEEE International Conference on.","author":"Hsu Chun-Shien Lu Chao-Yung","year":"2010","unstructured":"Chao-Yung Hsu Chun-Shien Lu , and Soo-Chang Pei . 2010 . Secure and robust sift with resistance to chosen-plain attack . In Image Processing (ICIP), 2010 17th IEEE International Conference on. pages 997 -- 1000 . Chao-Yung Hsu Chun-Shien Lu, and Soo-Chang Pei. 2010. Secure and robust sift with resistance to chosen-plain attack. In Image Processing (ICIP), 2010 17th IEEE International Conference on. pages997--1000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0651-7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994577"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481369"},{"key":"e_1_3_2_1_21_1","volume-title":"Geo-distinctive Visual Element Matching for Location Estimation of Images. arXiv preprint arXiv:1601.07884","author":"Li Xinchao","year":"2016","unstructured":"Xinchao Li , Martha A Larson , and Alan Hanjalic . 2016. Geo-distinctive Visual Element Matching for Location Estimation of Images. arXiv preprint arXiv:1601.07884 ( 2016 ). Xinchao Li, Martha A Larson, and Alan Hanjalic. 2016. Geo-distinctive Visual Element Matching for Location Estimation of Images. arXiv preprint arXiv:1601.07884 (2016)."},{"key":"e_1_3_2_1_22_1","unstructured":"matveyco. 2013. python-tilt-shift. https:\/\/github.com\/matveyco\/python-tilt-shift. (2013).  matveyco. 2013. python-tilt-shift. https:\/\/github.com\/matveyco\/python-tilt-shift. (2013)."},{"key":"e_1_3_2_1_23_1","volume-title":"Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images. In Conference on Computer Vision and Pattern Recognition CVPR'15","author":"Nguyen Anh","year":"2015","unstructured":"Anh Nguyen , Jason Yosinski , and Jeff Clune . 2015 . Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images. In Conference on Computer Vision and Pattern Recognition CVPR'15 . Anh Nguyen, Jason Yosinski, and Jeff Clune. 2015. Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images. In Conference on Computer Vision and Pattern Recognition CVPR'15."},{"key":"e_1_3_2_1_24_1","first-page":"830304","volume-title":"International Society for Optics and Photonics","author":"Poller Andreas","year":"2012","unstructured":"Andreas Poller , Martin Steinebach , and Huajian Liu 2012 . Robust image obfuscation for privacy protection in web 2.0 applications. In IS&T\/SPIE Electronic Imaging . International Society for Optics and Photonics , pages 830304 -- 830304 . Andreas Poller, Martin Steinebach, and Huajian Liu 2012. Robust image obfuscation for privacy protection in web 2.0 applications. In IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics, pages 830304--830304."},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"Fisher","author":"Reyns Bradford W.","year":"2012","unstructured":"Bradford W. Reyns , Billy Henson , and Bonnie S . Fisher . 2012 . Stalking in the Twilight Zone : Extent of Cyberstalking Victimization and Offending Among College Students. Deviant Behaviror 31, 1 (2012), pages 1 -- 25 . Bradford W. Reyns, Billy Henson, and Bonnie S. Fisher. 2012. Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending Among College Students. Deviant Behaviror 31, 1 (2012), pages 1--25."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911996.2912018"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461466.2461468"},{"key":"e_1_3_2_1_31_1","volume-title":"PlaNet - Photo Geolocation with Convolutional Neural Networks. In European Conference on Computer Vision (ECCV).","author":"Weyand Tobias","year":"2016","unstructured":"Tobias Weyand , Ilya Kostrikov , and James Philbin . 2016 . PlaNet - Photo Geolocation with Convolutional Neural Networks. In European Conference on Computer Vision (ECCV). Tobias Weyand, Ilya Kostrikov, and James Philbin. 2016. PlaNet - Photo Geolocation with Convolutional Neural Networks. In European Conference on Computer Vision (ECCV)."},{"key":"e_1_3_2_1_32_1","unstructured":"Shicai Yang. 2016. Towards Good Practices for Recognition and Detection. (2016). http:\/\/image-net.org\/challenges\/talks\/2016\/Hikvision_at_ImageNet_2016.pdf.  Shicai Yang. 2016. Towards Good Practices for Recognition and Detection. (2016). http:\/\/image-net.org\/challenges\/talks\/2016\/Hikvision_at_ImageNet_2016.pdf."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398735"},{"key":"e_1_3_2_1_34_1","volume-title":"Places: An Image Database for Deep Scene Understanding. arXiv preprint arXiv:1610.02055","author":"Zhou Bolei","year":"2016","unstructured":"Bolei Zhou , Aditya Khosla , Agata Lapedriza , Antonio Torralba , and Aude Oliva . 2016 . Places: An Image Database for Deep Scene Understanding. arXiv preprint arXiv:1610.02055 (2016). Bolei Zhou, Aditya Khosla, Agata Lapedriza, Antonio Torralba, and Aude Oliva. 2016. Places: An Image Database for Deep Scene Understanding. arXiv preprint arXiv:1610.02055 (2016)."}],"event":{"name":"ICMR '17: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Bucharest Romania","acronym":"ICMR '17"},"container-title":["Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078971.3080543","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078971.3080543","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078971.3080543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:24Z","timestamp":1750215804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078971.3080543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,6]]},"references-count":34,"alternative-id":["10.1145\/3078971.3080543","10.1145\/3078971"],"URL":"https:\/\/doi.org\/10.1145\/3078971.3080543","relation":{},"subject":[],"published":{"date-parts":[[2017,6,6]]},"assertion":[{"value":"2017-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}