{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:31:41Z","timestamp":1776108701717,"version":"3.50.1"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T00:00:00Z","timestamp":1730332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"crossref","award":["JSPS KAKENHI 21H03460"],"award-info":[{"award-number":["JSPS KAKENHI 21H03460"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Appl. Percept."],"published-print":{"date-parts":[[2024,10,31]]},"abstract":"<jats:p>In this work, we investigate facial anonymization techniques in 360\u00b0 videos and assess their influence on the perceived realism, anonymization effect, and presence of participants. In comparison to traditional footage, 360\u00b0 videos can convey engaging, immersive experiences that accurately represent the atmosphere of real-world locations. As the entire environment is captured simultaneously, it is necessary to anonymize the faces of bystanders in recordings of public spaces. Since this alters the video content, the perceived realism and immersion could be reduced. To understand these effects, we compare non-anonymized and anonymized 360\u00b0 videos using blurring, black boxes, and face-swapping shown either on a regular screen or in a head-mounted display (HMD).<\/jats:p>\n          <jats:p>Our results indicate significant differences in the perception of the anonymization techniques. We find that face-swapping is the most realistic and least disruptive; however, participants raised concerns regarding the effectiveness of the anonymization. Furthermore, we observe that presence is affected by facial anonymization in HMD condition. Overall, the results underscore the need for facial anonymization techniques that balance both photo-realism and a sense of privacy.<\/jats:p>","DOI":"10.1145\/3695254","type":"journal-article","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:39:52Z","timestamp":1725979192000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Investigating the Perception of Facial Anonymization Techniques in 360\u00b0 Videos"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8771-916X","authenticated-orcid":false,"given":"Leslie","family":"W\u00f6hler","sequence":"first","affiliation":[{"name":"The University of Tokyo, JSPS Research Fellow, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6061-7956","authenticated-orcid":false,"given":"Satoshi","family":"Ikehata","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Tokyo Institute of Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2146-6275","authenticated-orcid":false,"given":"Kiyoharu","family":"Aizawa","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,11,15]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1067860.1067868"},{"key":"e_1_3_1_3_2","volume-title":"Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science","volume":"308","author":"Caldwell Sabrina","year":"2015","unstructured":"Sabrina Caldwell, Tam\u00e1s Gedeon, Richard Jones, and Leana Copeland. 2015. Imperfect understandings: A grounded theory and eye gaze investigation of human perceptions of manipulated and unmanipulated digital images. In Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science, Vol. 308."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1080\/14640749508401421"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2023.102044"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1177\/1940161220944364"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/informatics7020010"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585812"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/su12093823"},{"key":"e_1_3_1_12_2","article-title":"Deepfakes and digitally altered imagery abuse: A cross-country exploration of an emerging form of image-based sexual abuse","author":"Flynn Asher","year":"2021","unstructured":"Asher Flynn, Anastasia Powell, Adrian J. Scott, and Elena Cama. 2021. Deepfakes and digitally altered imagery abuse: A cross-country exploration of an emerging form of image-based sexual abuse. The British Journal of Criminology (2021).","journal-title":"The British Journal of Criminology"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"e_1_3_1_14_2","first-page":"608","article-title":"On privacy issues with google street view","volume":"65","author":"Gallo Patrick","year":"2020","unstructured":"Patrick Gallo and Houssain Kettani. 2020. On privacy issues with google street view. SDL Review 65 (2020), 608.","journal-title":"SDL Review"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/eat.10005"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.175"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555169"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581448"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585885"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531125"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1080\/15213269.2016.1257392"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555604"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0501"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10055-023-00805-z"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1177\/0964663920947791"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642164"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-017-0581-5"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979419"},{"key":"e_1_3_1_31_2","first-page":"2889","volume-title":"Proceedings of the International Conference on Pattern Recognition (ICPR \u201912)","author":"Nodari Angelo","year":"2012","unstructured":"Angelo Nodari, Marco Vanetti, and Ignazio Gallo. 2012. Digital privacy: Replacing pedestrians from google street view images. In Proceedings of the International Conference on Pattern Recognition (ICPR \u201912). IEEE, New York, NY, 2889\u20132893."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101411"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1111\/jcal.12683"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1162\/105474602760204318"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11549-9"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1038\/nrn1651"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1162\/105474601300343603"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1026\/\/1617-6383.15.2.69"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300590"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892522"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20205851"},{"issue":"3","key":"e_1_3_1_42_2","first-page":"1","article-title":"A note on presence terminology","volume":"3","author":"Slater Mel","year":"2003","unstructured":"Mel Slater. 2003. A note on presence terminology. Presence Connect 3, 3 (2003), 1\u20135.","journal-title":"Presence Connect"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2009.55"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413881"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445699"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612670"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10055-020-00466-2"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1080\/10899995.2023.2186067"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819888720"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053225"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.176"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0022"},{"key":"e_1_3_1_53_2","unstructured":"Ethan Wilson Frederick Shic Jenny Skytta and Eakta Jain. 2022. Practical digital disguises: Leveraging face swaps to protect patient privacy. arXiv:2204.03559. Retrived from https:\/\/arxiv.org\/abs\/2204.03559"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3514197.3549687"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63426-1_13"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445627"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642103"},{"key":"e_1_3_1_58_2","doi-asserted-by":"crossref","unstructured":"\u00d6zge Nilay Yal\u00e7In Vanessa Utz and Steve Dipaola. 2024. Empathy through aesthetics: Using AI stylization for visual anonymization of interview videos.","DOI":"10.1145\/3661790.3661803"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1002\/jtr.2574"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2019.1686095"}],"container-title":["ACM Transactions on Applied Perception"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:11Z","timestamp":1750294691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,31]]},"references-count":59,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,10,31]]}},"alternative-id":["10.1145\/3695254"],"URL":"https:\/\/doi.org\/10.1145\/3695254","relation":{},"ISSN":["1544-3558","1544-3965"],"issn-type":[{"value":"1544-3558","type":"print"},{"value":"1544-3965","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,31]]},"assertion":[{"value":"2024-07-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}