{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:40:53Z","timestamp":1773740453554,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T00:00:00Z","timestamp":1550880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Project of Jinan Research Leader's Laboratory (The Research of Key Technologies on Medical Function Model Platform for Repairing Skeletons)"},{"name":"Doctoral Program of University of Jinan","award":["160100313"],"award-info":[{"award-number":["160100313"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,23]]},"DOI":"10.1145\/3313950.3313964","type":"proceedings-article","created":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T14:29:00Z","timestamp":1556893740000},"page":"23-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Face replacement based on 2D dense mapping"],"prefix":"10.1145","author":[{"given":"Han","family":"Guo","sequence":"first","affiliation":[{"name":"University of Jinan, Jinan, China"}]},{"given":"Dongmei","family":"Niu","sequence":"additional","affiliation":[{"name":"University of Jinan, Jinan, China"}]},{"given":"Xiangyu","family":"Kong","sequence":"additional","affiliation":[{"name":"University of Jinan, Jinan, China"}]},{"given":"Xiuyang","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Jinan, Jinan, China"}]}],"member":"320","published-online":{"date-parts":[[2019,2,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE International Conference on Network Infrastructure & Digital Content. IEEE.","author":"Xingjie Z.","unstructured":"Xingjie , Z. , Song , J. , and Park , J. I .. 2015. The image blending method for face swapping . IEEE International Conference on Network Infrastructure & Digital Content. IEEE. Xingjie, Z., Song, J., and Park, J. I.. 2015. The image blending method for face swapping. IEEE International Conference on Network Infrastructure & Digital Content. IEEE."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070781.2024164"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.450"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1360612.1360638"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE International Conference on Computer Vision (ICCV).","author":"Korshunova I.","unstructured":"Korshunova , I. , Shi , W. , Dambre , J. , and Theis , L .. 2017. Fast face-swap using convolutional neural networks . IEEE International Conference on Computer Vision (ICCV). Korshunova, I., Shi, W., Dambre, J., and Theis, L.. 2017. Fast face-swap using convolutional neural networks. IEEE International Conference on Computer Vision (ICCV)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Sun Q. Tewari A. Xu W. Fritz M. Theobalt C. & Schiele B. . 2018. A hybrid model for identity obfuscation by face replacement.  Sun Q. Tewari A. Xu W. Fritz M. Theobalt C. & Schiele B. . 2018. A hybrid model for identity obfuscation by face replacement.","DOI":"10.1007\/978-3-030-01246-5_34"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/882262.882269"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2009.58"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Bas A. Smith W. A. P. Bolkart T. and Wuhrer S.. 2016. Fitting a 3d morphable model to edges: a comparison between hard and soft correspondences.  Bas A. Smith W. A. P. Bolkart T. and Wuhrer S.. 2016. Fitting a 3d morphable model to edges: a comparison between hard and soft correspondences.","DOI":"10.1007\/978-3-319-54427-4_28"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1755843"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/998687.1007048"},{"key":"e_1_3_2_1_12_1","volume-title":"Open source computer vision library. https:\/\/github.com\/opencv\/opencv","author":"Open CV.","year":"2016","unstructured":"Open CV. Open source computer vision library. https:\/\/github.com\/opencv\/opencv , 2016 . {Online; accessed 24-October-2016}. OpenCV. Open source computer vision library. https:\/\/github.com\/opencv\/opencv, 2016. {Online; accessed 24-October-2016}."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0940-3"},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on Machine Learning (ICML)","author":"Ulyanov D..","year":"2016","unstructured":"Ulyanov , D.. Lebedev , V. , Vedaldi , A. , and Lempitsky , V .. Texture networks: Feed-forward synthesis of textures and stylized images . In International Conference on Machine Learning (ICML) , 2016 . Ulyanov, D.. Lebedev, V., Vedaldi, A., and Lempitsky, V.. Texture networks: Feed-forward synthesis of textures and stylized images. In International Conference on Machine Learning (ICML), 2016."},{"key":"e_1_3_2_1_16_1","volume-title":"Fritz","author":"Sun Q.","year":"2018","unstructured":"Sun , Q. , Ma , L. , Oh , S.J. , Gool , L.V. , Schiele , B. , Fritz , M. : Natural and effective obfuscation by head inpainting. In : CVPR. 2018 . Sun, Q., Ma, L., Oh, S.J., Gool, L.V., Schiele, B., Fritz, M.: Natural and effective obfuscation by head inpainting. In: CVPR. 2018."},{"key":"e_1_3_2_1_17_1","volume-title":"CVPR Workshops. (2017)","author":"Brkic K.","unstructured":"Brkic , K. , Sikiric , I. , Hrkac , T. , Kalafatic , Z. : I know that person: Generative full body and face de-identi_cation of people in images . In: CVPR Workshops. (2017) 1319--1328. Brkic, K., Sikiric, I., Hrkac, T., Kalafatic, Z.: I know that person: Generative full body and face de-identi_cation of people in images. In: CVPR Workshops. (2017) 1319--1328."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073659"},{"key":"e_1_3_2_1_19_1","volume-title":"Schiele","author":"Oh S.J.","year":"2016","unstructured":"Oh , S.J. , Benenson , R. , Fritz , M. , Schiele , B. : Faceless person recognition; privacy implications in social media. In : ECCV.( 2016 ) Oh, S.J., Benenson, R., Fritz, M., Schiele, B.: Faceless person recognition; privacy implications in social media. In: ECCV.(2016)"}],"event":{"name":"ICIGP 2019: 2019 2nd International Conference on Image and Graphics Processing","location":"Singapore Singapore","acronym":"ICIGP 2019"},"container-title":["Proceedings of the 2nd International Conference on Image and Graphics Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313950.3313964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313950.3313964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:47Z","timestamp":1750202627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313950.3313964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,23]]},"references-count":18,"alternative-id":["10.1145\/3313950.3313964","10.1145\/3313950"],"URL":"https:\/\/doi.org\/10.1145\/3313950.3313964","relation":{},"subject":[],"published":{"date-parts":[[2019,2,23]]},"assertion":[{"value":"2019-02-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}