{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:34:48Z","timestamp":1772519688466,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/S035362\/1, EP\/V008870\/1"],"award-info":[{"award-number":["EP\/S035362\/1, EP\/V008870\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000853","name":"University Of Glasgow","doi-asserted-by":"publisher","award":["Excellence Bursary"],"award-info":[{"award-number":["Excellence Bursary"]}],"id":[{"id":"10.13039\/501100000853","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1145\/3531073.3531125","type":"proceedings-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T20:42:17Z","timestamp":1654548137000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["DeepFakes for Privacy: Investigating the Effectiveness of State-of-the-Art Privacy-Enhancing Face Obfuscation Methods"],"prefix":"10.1145","author":[{"given":"Mohamed","family":"Khamis","sequence":"first","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Habiba","family":"Farzand","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Marija","family":"Mumm","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520704"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2838885"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.25.6.1403"},{"key":"e_1_3_2_1_4_1","volume-title":"Memory reconsolidation processes and posttraumatic stress disorder: promises and challenges of translational research. Biological psychiatry 71, 4","author":"Debiec Jacek","year":"2012","unstructured":"Jacek Debiec. 2012. Memory reconsolidation processes and posttraumatic stress disorder: promises and challenges of translational research. Biological psychiatry 71, 4 (2012), 284\u2013285."},{"key":"e_1_3_2_1_5_1","volume-title":"Pixelating familiar people in the media: Should masking be taken at face value?Psychologica belgica 47, 4","author":"Demanet Jelle","year":"2007","unstructured":"Jelle Demanet, Kristof Dhont, Lies Notebaert, Sven Pattyn, and Andr\u00e9 Vandierendonck. 2007. Pixelating familiar people in the media: Should masking be taken at face value?Psychologica belgica 47, 4 (2007), 261\u2013276."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313052"},{"key":"e_1_3_2_1_7_1","volume-title":"2009 IEEE 12th International Conference on Computer Vision. 2373\u20132380","author":"Frome A.","unstructured":"A. Frome, G. Cheung, A. Abdulkader, M. Zennaro, B. Wu, A. Bissacco, H. Adam, H. Neven, and L. Vincent. 2009. Large-scale privacy protection in Google Street View. In 2009 IEEE 12th International Conference on Computer Vision. 2373\u20132380."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IranianMVIP.2011.6121586"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2807791"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_3_2_1_13_1","volume-title":"Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 1333\u20131342","author":"Hassan T.","year":"2017","unstructured":"Eman\u00a0T. Hassan, Rakibul Hasan, Patrick Shaffer, David Crandall, and Apu Kapadia. 2017. Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 1333\u20131342."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/github.com\/hukkelas\/DeepPrivacy Retrieved","author":"Hukkelas Hakun","year":"2021","unstructured":"Hakun Hukkelas. 2021. DeepPrivacy. https:\/\/github.com\/hukkelas\/DeepPrivacy Retrieved November 3, 2021."},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Visual Computing","author":"Hukkel\u00e5s H\u00e5kon","unstructured":"H\u00e5kon Hukkel\u00e5s, Rudolf Mester, and Frank Lindseth. 2019. DeepPrivacy: A Generative Adversarial Network for Face Anonymization. In Advances in Visual Computing. Springer International Publishing, 565\u2013578."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_2_1_17_1","volume-title":"Content Authenticity Initiative. https:\/\/contentauthenticity.org\/ Retrieved","author":"JPEG.","year":"2021","unstructured":"JPEG. 2021. Content Authenticity Initiative. https:\/\/contentauthenticity.org\/ Retrieved November 3, 2021."},{"key":"e_1_3_2_1_18_1","volume-title":"JPEG Fake Media Standard. https:\/\/jpeg.org\/items\/20200803_fake_media.html Retrieved","author":"JPEG.","year":"2021","unstructured":"JPEG. 2021. JPEG Fake Media Standard. https:\/\/jpeg.org\/items\/20200803_fake_media.html Retrieved November 3, 2021."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_2_1_20_1","volume-title":"Deepfakes: Trick or treat?Business Horizons 63, 2","author":"Kietzmann Jan","year":"2020","unstructured":"Jan Kietzmann, Linda\u00a0W Lee, Ian\u00a0P McCarthy, and Tim\u00a0C Kietzmann. 2020. Deepfakes: Trick or treat?Business Horizons 63, 2 (2020), 135\u2013146."},{"key":"e_1_3_2_1_21_1","volume-title":"Smiley Face Background. https:\/\/www.kissclipart.com\/emojis-png-clipart-emoji-sticker-r1m975\/ Retrieved","year":"2021","unstructured":"kissclipart. 2021. Smiley Face Background. https:\/\/www.kissclipart.com\/emojis-png-clipart-emoji-sticker-r1m975\/ Retrieved November 3, 2021."},{"key":"e_1_3_2_1_22_1","volume-title":"Applications of Digital Image Processing XXXVI, Vol.\u00a08856","author":"Korshunov Pavel","unstructured":"Pavel Korshunov, Andrea Melle, Jean-Luc Dugelay, and Touradj Ebrahimi. 2013. Framework for objective evaluation of privacy filters. In Applications of Digital Image Processing XXXVI, Vol.\u00a08856. International Society for Optics and Photonics, 88560T."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2027040"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/1099-0720(200101\/02)15:1<101::AID-ACP697>3.0.CO;2-7"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737466"},{"key":"e_1_3_2_1_26_1","volume-title":"Human Perceptions of Sensitive Content in Photos. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.","author":"Li Yifang","year":"2018","unstructured":"Yifang Li, Wyatt Troutman, Bart\u00a0P. Knijnenburg, and Kelly Caine. 2018. Human Perceptions of Sensitive Content in Photos. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops."},{"key":"e_1_3_2_1_27_1","volume-title":"Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 1343\u20131351","author":"Li Yifang","year":"2017","unstructured":"Yifang Li, Nishant Vishwamitra, Bart\u00a0P. Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 1343\u20131351."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_3_2_1_29_1","volume-title":"https:\/\/pillow.readthedocs.io\/en\/3.0.x\/reference\/ImageFilter.html Retrieved","author":"Module ImageFitler","year":"2021","unstructured":"ImageFitler Module. 2021. ImageFilter Module. https:\/\/pillow.readthedocs.io\/en\/3.0.x\/reference\/ImageFilter.html Retrieved November 3, 2021."},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/opencv.org\/ Retrieved","author":"CV.","year":"2021","unstructured":"OpenCV. 2021. OpenCV. https:\/\/opencv.org\/ Retrieved November 3, 2021."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s150612959"},{"key":"e_1_3_2_1_32_1","volume-title":"Pillow\u2019s Image Module. https:\/\/pillow.readthedocs.io\/en\/3.0.x\/reference\/Image.html Retrieved","year":"2021","unstructured":"Pillow\u2019s. 2021. Pillow\u2019s Image Module. https:\/\/pillow.readthedocs.io\/en\/3.0.x\/reference\/Image.html Retrieved November 3, 2021."},{"key":"e_1_3_2_1_33_1","first-page":"69","article-title":"Cartoon-like avatar generation using facial component matching","volume":"8","author":"Rhee Chi-Hyoung","year":"2013","unstructured":"Chi-Hyoung Rhee and C Lee. 2013. Cartoon-like avatar generation using facial component matching. Int. J. of Multimedia and Ubiquitous Engineering 8, 4(2013), 69\u201378.","journal-title":"Int. J. of Multimedia and Ubiquitous Engineering"},{"key":"e_1_3_2_1_34_1","volume-title":"The seven sins of memory: insights from psychology and cognitive neuroscience.American psychologist 54, 3","author":"Schacter L","year":"1999","unstructured":"Daniel\u00a0L Schacter. 1999. The seven sins of memory: insights from psychology and cognitive neuroscience.American psychologist 54, 3 (1999), 182."},{"key":"e_1_3_2_1_35_1","volume-title":"What are the laws against deepfake pornography across the UK?https:\/\/fb.watch\/7HRvReEy1d\/ Retrieved","author":"Scotland BBC","year":"2021","unstructured":"BBC Scotland. 2021. What are the laws against deepfake pornography across the UK?https:\/\/fb.watch\/7HRvReEy1d\/ Retrieved August 31, 2021."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445699"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Shahroz Tariq Sowon Jeon and Simon\u00a0S Woo. 2021. Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack. arXiv preprint arXiv:2103.00847(2021).","DOI":"10.1145\/3485447.3512212"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"e_1_3_2_1_39_1","unstructured":"Emanuel von Zezschwitz Alexander De\u00a0Luca and Heinrich Hussmann. [n.d.]. Filter Selection and Evaluation. ([n. d.]). http:\/\/www.mmi.ifi.lmu.de\/pubdb\/publications\/pub\/ZezschwitzTR_Privacy\/ZezschwitzTR_Privacy.pdf"},{"key":"e_1_3_2_1_40_1","volume-title":"The impending war over deepfakes. https:\/\/www.axios.com\/the-impending-war-over-deepfakes-b3427757-2ed7-4fbc-9edb-45e461eb87ba.html Retrieved","author":"Waddell Kaveh","year":"2021","unstructured":"Kaveh Waddell. 2018. The impending war over deepfakes. https:\/\/www.axios.com\/the-impending-war-over-deepfakes-b3427757-2ed7-4fbc-9edb-45e461eb87ba.html Retrieved November 3, 2021."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712094"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712094"}],"event":{"name":"AVI 2022: International Conference on Advanced Visual Interfaces","location":"Frascati, Rome Italy","acronym":"AVI 2022"},"container-title":["Proceedings of the 2022 International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531073.3531125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531073.3531125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:27Z","timestamp":1750186827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531073.3531125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":42,"alternative-id":["10.1145\/3531073.3531125","10.1145\/3531073"],"URL":"https:\/\/doi.org\/10.1145\/3531073.3531125","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}