{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:20:08Z","timestamp":1776104408598,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["Germany?s Excellence Strategy - EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["Germany?s Excellence Strategy - EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/V008870\/1, EP\/S035362\/1"],"award-info":[{"award-number":["EP\/V008870\/1, EP\/S035362\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1145\/3701571.3701602","type":"proceedings-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T07:28:21Z","timestamp":1733210901000},"page":"300-312","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Perspectives on DeepFakes for Privacy: Comparing Perceptions of Photo Owners and Obfuscated Individuals towards DeepFake Versus Traditional Privacy-Enhancing Obfuscation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7051-5200","authenticated-orcid":false,"given":"Mohamed","family":"Khamis","sequence":"first","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9751-675X","authenticated-orcid":false,"given":"Rebecca","family":"Panskus","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2961-3500","authenticated-orcid":false,"given":"Habiba","family":"Farzand","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8433-0689","authenticated-orcid":false,"given":"Marija","family":"Mumm","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6519-318X","authenticated-orcid":false,"given":"Shaun","family":"Macdonald","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Rahaf Alharbi Robin\u00a0N. Brewer and Sarita Schoenebeck. 2022. Understanding Emerging Obfuscation Technologies in Visual Description Services for Blind and Low Vision People. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 469 (nov 2022) 33\u00a0pages. 10.1145\/3555570https:\/\/dl.acm.org\/doi\/10.1145\/3555570","DOI":"10.1145\/3555570"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_29"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Livio Bioglio and Ruggero\u00a0G Pensa. 2022. Analysis and classification of privacy-sensitive content in social media posts. EPJ Data Science 11 1 (2022) 12.","DOI":"10.1140\/epjds\/s13688-022-00324-y"},{"key":"e_1_3_3_2_7_2","unstructured":"Campaign. 2019. What are the laws against deepfake pornography across the UK?https:\/\/www.campaignlive.co.uk\/article\/deepfake-voice-tech-used-good-david-beckham-malaria-campaign\/1581378 Retrieved November 3 2021."},{"key":"e_1_3_3_2_8_2","unstructured":"Robert Chesney and Danielle Citron. 2019. Deepfakes and the new disinformation war: The coming age of post-truth geopolitics. Foreign Aff. 98 (2019) 147."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00142"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0A Ciranni and Arthur\u00a0P Shimamura. 1999. Retrieval-induced forgetting in episodic memory. Journal of Experimental Psychology: Learning Memory and Cognition 25 6 (1999) 1403.","DOI":"10.1037\/\/0278-7393.25.6.1403"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Dianne Cyr Milena Head Hector Larios and Bing Pan. 2009. Exploring Human Images in Website Design: A Multi-Method Approach. MIS Q. 33 3 (Sept. 2009) 539\u2013566.","DOI":"10.2307\/20650308"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Jelle Demanet Kristof Dhont Lies Notebaert Sven Pattyn and Andr\u00e9 Vandierendonck. 2007. Pixelating familiar people in the media: Should masking be taken at face value? Psychologica belgica 47 4 (2007) 261\u2013276.","DOI":"10.5334\/pb-47-4-261"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Amandeep Dhir Puneet Kaur Kirsti Lonka and Marko Nieminen. 2016. Why do adolescents untag photos on Facebook? Computers in Human Behavior 55 (2016) 1106\u20131115.","DOI":"10.1016\/j.chb.2015.11.017"},{"key":"e_1_3_3_2_14_2","unstructured":"Matthew Dunne-Miles. 2021. Deepfakes dead relatives and digital resurrection. https:\/\/theface.com\/society\/deepfakes-dead-relatives-deep-nostalgia-ai-digital-resurrection-kim-kardashian-rob-kardashian-grief-privacy Retrieved November 3 2021."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313052"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581565"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.175"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Yubo Hou Xinyu Pan Xinyue Cao and Qi Wang. 2022. Remembering online and offline: The effects of retrieval contexts cues and intervals on autobiographical memory. Memory 30 4 (2022) 441\u2013449.","DOI":"10.1080\/09658211.2021.1953078"},{"key":"e_1_3_3_2_22_2","unstructured":"Hakun Hukkelas. 2021. DeepPrivacy. https:\/\/github.com\/hukkelas\/DeepPrivacy. Retrieved November 3 2021."},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_3_2_26_2","unstructured":"JPEG. 2021. Content Authenticity Initiative. https:\/\/contentauthenticity.org\/. Retrieved November 3 2021."},{"key":"e_1_3_3_2_27_2","unstructured":"JPEG. 2021. JPEG Fake Media Standard. https:\/\/jpeg.org\/items\/20200803_fake_media.html. Retrieved November 3 2021."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531125"},{"key":"e_1_3_3_2_29_2","unstructured":"kissclipart. 2021. Smiley Face Background. https:\/\/www.kissclipart.com\/emojis-png-clipart-emoji-sticker-r1m975\/. Retrieved November 3 2021."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2027040"},{"key":"e_1_3_3_2_31_2","unstructured":"Udo Kuckartz. 2016. Qualitative Inhaltsanalyse. Methoden Praxis Computerunterst\u00fctzung (Grundlagentexte Methoden 3. \u00fcberarbeitete Auflage). Weinheim: Beltz Juventa. Zugriff am 9 (2016) 2017."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"Jari K\u00e4tsyri Klaus F\u00f6rger Meeri M\u00e4k\u00e4r\u00e4inen and Tapio Takala. 2015. A review of empirical evidence on different uncanny valley hypotheses: support for perceptual mismatch as one road to the valley of eeriness. Frontiers in Psychology 6 (2015). 10.3389\/fpsyg.2015.00390","DOI":"10.3389\/fpsyg.2015.00390"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Karen Lander Vicki Bruce and Harry Hill. 2001. Evaluating the effectiveness of pixelation and blurring on masking the identity of familiar faces. Applied Cognitive Psychology: The Official Journal of the Society for Applied Research in Memory and Cognition 15 1 (2001) 101\u2013116.","DOI":"10.1002\/1099-0720(200101\/02)15:1<101::AID-ACP697>3.0.CO;2-7"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737466"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517520"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Yifang Li Nishant Vishwamitra Bart\u00a0P Knijnenburg Hongxin Hu and Kelly Caine. 2017. Effectiveness and users\u2019 experience of obfuscation as a privacy-enhancing technology for sharing photos. Proceedings of the ACM on Human-Computer Interaction 1 CSCW (2017) 1\u201324.","DOI":"10.1145\/3134702"},{"key":"e_1_3_3_2_37_2","unstructured":"ImageFitler Module. 2021. ImageFilter Module. https:\/\/pillow.readthedocs.io\/en\/3.0.x\/reference\/ImageFilter.html. Retrieved November 3 2021."},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"M. Mori K.\u00a0F. MacDorman and N. Kageki. 2012. The Uncanny Valley [From the Field]. IEEE Robotics Automation Magazine 19 2 (2012) 98\u2013100.","DOI":"10.1109\/MRA.2012.2192811"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Kyle Murray and Gerald H\u00e4ubl. 2011. Freedom of Choice Ease of Use and the Formation of Interface Preferences. MIS Quarterly 35 (12 2011) 955\u2013976. 10.2139\/ssrn.1698204","DOI":"10.2139\/ssrn.1698204"},{"key":"e_1_3_3_2_40_2","unstructured":"MyHeritage. 2021. Deep Nostalgia. https:\/\/www.myheritage.com\/deep-nostalgia Retrieved November 3 2021."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Jos\u00e9\u00a0Ram\u00f3n Padilla-L\u00f3pez Alexandros\u00a0Andre Chaaraoui Feng Gu and Francisco Fl\u00f3rez-Revuelta. 2015. Visual privacy by context: proposal and evaluation of a level-based visualisation scheme. Sensors 15 6 (2015) 12959\u201312982.","DOI":"10.3390\/s150612959"},{"key":"e_1_3_3_2_42_2","unstructured":"Chi-Hyoung Rhee and C Lee. 2013. Cartoon-like avatar generation using facial component matching. Int. J. of Multimedia and Ubiquitous Engineering 8 4 (2013) 69\u201378."},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0L Schacter. 1999. The seven sins of memory: insights from psychology and cognitive neuroscience. American psychologist 54 3 (1999) 182.","DOI":"10.1037\/\/0003-066X.54.3.182"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","unstructured":"Peter Seddon and Min-Yen Kiew. 1. A Partial Test and Development of Delone and Mclean\u2019s Model of IS Success. Australasian Journal of Information Systems 4 1 (1 1). 10.3127\/ajis.v4i1.379","DOI":"10.3127\/ajis.v4i1.379"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2012.6227909"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Charles\u00a0B Stone and Qi Wang. 2019. From conversations to digital communication: The mnemonic consequences of consuming and producing information via social media. Topics in cognitive science 11 4 (2019) 774\u2013793.","DOI":"10.1111\/tops.12369"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445699"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"crossref","unstructured":"Shahroz Tariq Sowon Jeon and Simon\u00a0S Woo. 2021. Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack. arXiv preprint arXiv:2103.00847 (2021).","DOI":"10.1145\/3485447.3512212"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Ruben Tolosana Ruben Vera-Rodriguez Julian Fierrez Aythami Morales and Javier Ortega-Garcia. 2020. Deepfakes and beyond: A survey of face manipulation and fake detection. Information Fusion 64 (2020) 131\u2013148.","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"e_1_3_3_2_52_2","unstructured":"Kaveh Waddell. 2018. The impending war over deepfakes. https:\/\/www.axios.com\/the-impending-war-over-deepfakes-b3427757-2ed7-4fbc-9edb-45e461eb87ba.html Retrieved November 3 2021."},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199737833.001.0001"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Qi Wang. 2021. The cultural foundation of human memory. Annual review of Psychology 72 (2021) 151\u2013179.","DOI":"10.1146\/annurev-psych-070920-023638"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Mika Westerlund. 2019. The emergence of deepfake technology: A review. Technology Innovation Management Review 9 11 (2019).","DOI":"10.22215\/timreview\/1282"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","unstructured":"Mika Westerlund. 2019. The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review 9 (11\/2019 2019) 40\u201353. 10.22215\/timreview\/1282","DOI":"10.22215\/timreview\/1282"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Leslie W\u00f6hler Satoshi Ikehata and Kiyoharu Aizawa. 2024. Investigating the Perception of Facial Anonymization Techniques in 360 {\\ deg} Videos. arXiv preprint arXiv:2408.04844 (2024).","DOI":"10.1145\/3695254"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642103"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712094"}],"event":{"name":"MUM '24: International Conference on Mobile and Ubiquitous Multimedia","location":"Stockholm Sweden","acronym":"MUM '24"},"container-title":["Proceedings of the International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701571.3701602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701571.3701602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:05Z","timestamp":1750295405000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701571.3701602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":59,"alternative-id":["10.1145\/3701571.3701602","10.1145\/3701571"],"URL":"https:\/\/doi.org\/10.1145\/3701571.3701602","relation":{},"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}