{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:58:25Z","timestamp":1740178705424,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T00:00:00Z","timestamp":1722816000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T00:00:00Z","timestamp":1722816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Japan Society for the Promotion of Science (JSPS) under KAKENHI Grants","award":["JP16H06302","JP18H04120","JP20K23355","JP21H04907","JP21K18023"],"award-info":[{"award-number":["JP16H06302","JP18H04120","JP20K23355","JP21H04907","JP21K18023"]}]},{"name":"Japan Science and Technology Agency (JST) under CREST Grants","award":["JPMJCR18A6","JPMJCR20D3"],"award-info":[{"award-number":["JPMJCR18A6","JPMJCR20D3"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Facial recognition systems have emerged as indispensable components in identity verification. These systems heavily rely on facial data, which is stored in a biometric database. However, storing such data in a database raises concerns about privacy breaches. To address this issue, several technologies have been proposed for protecting facial biometrics. Unfortunately, many of these methods can cause irreversible damage to the data, rendering it unusable for other purposes. In this paper, we propose a novel reversible anonymization scheme for face images via cyclic learning. In our scheme, face images can be de-identified for privacy protection and reidentified when necessary. To achieve this, we employ generative adversarial networks with a cycle consistency loss function to learn the bidirectional transformation between the de-identified and re-identified domains. Experimental results demonstrate that our scheme performs well in terms of both de-identification and reidentification. Furthermore, a security analysis validates the effectiveness of our system in mitigating potential attacks.<\/jats:p>","DOI":"10.1186\/s13635-024-00174-3","type":"journal-article","created":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T15:03:59Z","timestamp":1722870239000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible anonymization for privacy of facial biometrics via cyclic learning"],"prefix":"10.1186","volume":"2024","author":[{"given":"Shuying","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7723-4591","authenticated-orcid":false,"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Huy H.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,5]]},"reference":[{"key":"174_CR1","doi-asserted-by":"crossref","unstructured":"H. Wang, Y. Wang, Z. Zhou, X. Ji, D. Gong, J. Zhou, Z. Li, W. Liu. Cos-face: large margin cosine loss for deep face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. (Salt Lake City, 2018), pp. 5265\u20135274","DOI":"10.1109\/CVPR.2018.00552"},{"key":"174_CR2","unstructured":"D.S. Trigueros, L. Meng, M. Hartnett, Face recognition: from traditional to deep learning methods. (2018). arXiv preprint arXiv:1811.00116."},{"key":"174_CR3","doi-asserted-by":"crossref","unstructured":"G.L. Foresti, C. Micheloni, L. Snidaro, C. Marchiol. Face detection for visual surveillance. In 12th International Conference on Image Analysis and Processing (ICIAP). (Mantova, 2003), pp. 115\u2013120","DOI":"10.1109\/ICIAP.2003.1234036"},{"issue":"10","key":"174_CR4","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1109\/TPAMI.2011.68","volume":"33","author":"B Kamgar-Parsi","year":"2011","unstructured":"B. Kamgar-Parsi, W. Lawson, B. Kamgar-Parsi, Toward development of a face recognition system for watchlist surveillance. IEEE Trans. Pattern Anal. Mach. Intell. 33(10), 1925\u20131937 (2011)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"174_CR5","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1007\/s11042-009-0417-2","volume":"51","author":"M Grgic","year":"2011","unstructured":"M. Grgic, K. Delac, S. Grgic, SCface-surveillance cameras face database. Multimedia Tools and Applications 51(3), 863\u2013879 (2011)","journal-title":"Multimedia Tools and Applications"},{"key":"174_CR6","doi-asserted-by":"crossref","unstructured":"H. Qezavati, B. Majidi, M.T. Manzuri. Partially covered face detection in presence of headscarf for surveillance applications. In 2019 4th International Conference on Pattern Recognition and Image Analysis (IPRIA). (Tehran, 2019), pp. 195\u2013199\u00a0","DOI":"10.1109\/PRIA.2019.8786004"},{"issue":"8","key":"174_CR7","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TKDE.2007.190716","volume":"20","author":"T Kwon","year":"2008","unstructured":"T. Kwon, H. Moon, Biometric authentication for border control applications. IEEE Trans. Knowl. Data Eng. 20(8), 1091\u20131096 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"174_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.cose.2016.07.001","volume":"62","author":"JS Del Rio","year":"2016","unstructured":"J.S. Del Rio, D. Moctezuma, C. Conde, I.M. de Diego, E. Cabello, Automated border control e-gates and facial recognition systems. Computers & security. 62, 49\u201372 (2016)","journal-title":"Computers & security."},{"issue":"2","key":"174_CR9","doi-asserted-by":"publisher","first-page":"e0148148","DOI":"10.1371\/journal.pone.0148148","volume":"11","author":"AK Bobak","year":"2016","unstructured":"A.K. Bobak, A.J. Dowsett, S. Bate, Solving the border control problem: evidence of enhanced face matching in individuals with extraordinary face recognition skills. PLoS ONE 11(2), e0148148 (2016)","journal-title":"PLoS ONE"},{"issue":"6","key":"174_CR10","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1109\/TPAMI.2007.1110","volume":"29","author":"G Zhao","year":"2007","unstructured":"G. Zhao, M. Pietikainen, Dynamic texture recognition using local binary patterns with an application to facial expressions. IEEE Trans. Pattern Anal. Mach. Intell. 29(6), 915\u2013928 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"174_CR11","doi-asserted-by":"crossref","unstructured":"S. Garfinkel. De-identification of personal information: US Department of Commerce, National Institute of Standards and Technology. pp. 1\u201346 (2015)","DOI":"10.6028\/NIST.IR.8053"},{"key":"174_CR12","doi-asserted-by":"publisher","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","volume":"9","author":"A Majeed","year":"2020","unstructured":"A. Majeed, S. Lee, Anonymisation techniques for privacy preserving data publishing: a comprehensive survey. IEEE access 9, 8512\u20138545 (2020)","journal-title":"IEEE access"},{"issue":"1","key":"174_CR13","doi-asserted-by":"publisher","first-page":"934","DOI":"10.14778\/1687627.1687733","volume":"2","author":"Y He","year":"2009","unstructured":"Y. He, J.F. Naughton, Anonymisation of set-valued data via top-down, local generalization. Proceedings of the VLDB Endowment. 2(1), 934\u2013945 (2009)","journal-title":"Proceedings of the VLDB Endowment."},{"issue":"3","key":"174_CR14","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1007\/s12083-021-01080-y","volume":"14","author":"S Virupaksha","year":"2021","unstructured":"S. Virupaksha, V. Dondeti, Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data. Peer-to-Peer Networking and Applications 14(3), 1608\u20131628 (2021)","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"174_CR15","doi-asserted-by":"publisher","first-page":"2840","DOI":"10.1109\/TIFS.2024.3356233","volume":"19","author":"M Ye","year":"2024","unstructured":"M. Ye, W. Shen, J. Zhang, Y. Yang, B. Du, SecureReID: privacy-preserving anonymisation for person re-identification. IEEE Trans. Inf. Forensics Secur. 19, 2840\u20132853 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"174_CR16","doi-asserted-by":"crossref","unstructured":"X. Yu, K. Chinomi, T. Koshimizu, N. Nitta, Y. Ito, N. Babaguchi, N. Privacy protecting visual processing for secure video surveillance. In 2008 15th IEEE International Conference on Image Processing. (San Diego, 2008), pp. 1672\u20131675","DOI":"10.1109\/ICIP.2008.4712094"},{"issue":"1","key":"174_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1143518.1143519","volume":"13","author":"C Neustaedter","year":"2006","unstructured":"C. Neustaedter, S. Greenberg, M. Boyle, Blur filtration fails to preserve privacy for home-based video conferencing. ACM Transactions on Computer-Human Interaction (TOCHI) 13(1), 1\u201336 (2006)","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"key":"174_CR18","first-page":"404","volume":"4","author":"I Kitahara","year":"2004","unstructured":"I. Kitahara, K. Kogure, N. Hagita, Stealth vision for protecting privacy. In 17th International Conference on Pattern Recognition. 4, 404\u2013407 (2004)","journal-title":"In 17th International Conference on Pattern Recognition."},{"key":"174_CR19","doi-asserted-by":"crossref","unstructured":"Y. Kusama, H. Kang, K. Iwamura, I. Echizen. Privacy-protected video surveillance in crowded environments using robust watermarking. In 2016 IEEE 5th Global Conference on Consumer Electronics. (Nagoya, 2016), pp. 1\u20132","DOI":"10.1109\/GCCE.2016.7800388"},{"key":"174_CR20","first-page":"98","volume":"5","author":"Y Kusama","year":"2015","unstructured":"Y. Kusama, H. Kang, K. Iwamura, Mosaic-based privacy-protection with reversible watermarking. In 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE). 5, 98\u2013103 (2015)","journal-title":"In 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE)."},{"key":"174_CR21","doi-asserted-by":"crossref","unstructured":"P. Korshunov, S. Cai, T. Ebrahimi. Crowdsourcing approach for evaluation of privacy alters in video surveillance. In ACM multimedia 2012 workshop on Crowdsourcing for multimedia. pp. 35\u201340 (2012)","DOI":"10.1145\/2390803.2390817"},{"key":"174_CR22","doi-asserted-by":"crossref","unstructured":"M. Boyle, C. Edwards, S. Greenberg. The effects of altered video on awareness and privacy. In 2000 ACM conference on Computer Supported Cooperative Work. (Philadelphia, 2000), pp. 1\u201310","DOI":"10.1145\/358916.358935"},{"issue":"9","key":"174_CR23","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1049\/iet-spr.2017.0049","volume":"11","author":"B Meden","year":"2017","unstructured":"B. Meden, R.C. Mall\u0131, S. Fabijan, H.K. Ekenel, V. \u0160truc, P. Peer, Face deidentification with generative deep neural networks. IET Signal Proc. 11(9), 1046\u20131054 (2017)","journal-title":"IET Signal Proc."},{"key":"174_CR24","doi-asserted-by":"crossref","unstructured":"Q Sun, A. Tewari, W. Xu, M. Fritz, C. Theobalt, B. Schiele. A hybrid model for identity obfuscation by face replacement. In European conference on computer vision (ECCV). (Munich, 2018), pp. 553\u2013569","DOI":"10.1007\/978-3-030-01246-5_34"},{"key":"174_CR25","doi-asserted-by":"crossref","unstructured":"Y. Li, S. Lyu. De-identification without losing faces. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. (Paris, 2019), pp. 83\u201388","DOI":"10.1145\/3335203.3335719"},{"key":"174_CR26","doi-asserted-by":"crossref","unstructured":"H. Hukkel\u00e5s, R. Mester, F. Lindseth. Deepprivacy: a generative adversarial network for face anonymisation. In International symposium on visual computing. (California, 2019), pp. 565\u2013578","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"174_CR27","doi-asserted-by":"crossref","unstructured":"J. Cichowski, A. Czyzewski. Reversible video stream anonymisation for video surveillance systems based on pixels relocation and watermarking. In 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops). (Barcelona, 2011), pp. 1971\u20131977","DOI":"10.1109\/ICCVW.2011.6130490"},{"key":"174_CR28","doi-asserted-by":"crossref","unstructured":"M. Yama\u00e7, M. Ahishali, N. Passalis, J. Raitoharju, B. Sankur, M. Gabbouj. Reversible privacy preservation using multi-level encryption and compressive sensing. In 2019 27th European Signal Processing Conference (EUSIPCO). (Spain, 2019), pp. 1\u20135","DOI":"10.23919\/EUSIPCO.2019.8903056"},{"key":"174_CR29","doi-asserted-by":"crossref","unstructured":"X. Gu, W. Luo, M. S. Ryoo, Y.J. Lee. Password-conditioned anonymisation and deanonymisation with face identity transformers. In European conference on computer vision (ECCV). (Glasgow, 2020), pp. 727\u2013743","DOI":"10.1007\/978-3-030-58592-1_43"},{"key":"174_CR30","doi-asserted-by":"crossref","unstructured":"J. Cao, B, Liu, Y. Wen, R. Xie, L. Song. Personalized and invertible face de-identification by disentangled identity information manipulation. In IEEE\/CVF international conference on computer vision (ICCV). (Montreal, 2021), pp. 3334\u20133342","DOI":"10.1109\/ICCV48922.2021.00332"},{"issue":"2","key":"174_CR31","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1109\/TCSVT.2021.3066054","volume":"32","author":"H Proen\u00e7a","year":"2022","unstructured":"H. Proen\u00e7a, The UU-NET: reversible face de-identification for visual surveillance video footage. IEEE Trans. Circuits Syst. Video Technol. 32(2), 496\u2013509 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"174_CR32","doi-asserted-by":"crossref","unstructured":"J.Y. Zhu, T. Park, P. Isola, A.A. Efros. Unpaired image-to-image translation using cycle-consistent adversarial networks. In IEEE international conference on computer vision. (Venice, 2017), pp. 2223\u20132232","DOI":"10.1109\/ICCV.2017.244"},{"key":"174_CR33","unstructured":"Z. Liu, P. Luo, X. Wang, X. Tang, Large-scale celebfaces attributes (celeba) dataset. 15, 11 (2018)"},{"key":"174_CR34","doi-asserted-by":"crossref","unstructured":"T. Karras, S. Laine, T. Aila. A style-based generator architecture for generative adversarial networks. In IEEE conference on computer vision and pattern recognition (CVPR). (Long Beach, 2019), pp. 4401\u20134410\u00a0","DOI":"10.1109\/CVPR.2019.00453"},{"key":"174_CR35","doi-asserted-by":"crossref","unstructured":"F. Schroff, D. Kalenichenko, J. Philbin. FaceNet: a unified embedding for face recognition and clustering. In IEEE conference on computer vision and pattern recognition (CVPR). (Boston, 2015), pp. 815\u2013823\u00a0","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"174_CR36","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ins.2015.02.024","volume":"307","author":"P Xia","year":"2015","unstructured":"P. Xia, L. Zhang, F. Li, Learning similarity with cosine similarity ensemble. Inf. Sci. 307, 39\u201352 (2015)","journal-title":"Inf. Sci."},{"key":"174_CR37","volume-title":"Digital signal processing: a practical guide for engineers and scientists","author":"S Smith","year":"2003","unstructured":"S. Smith, Digital signal processing: a practical guide for engineers and scientists (Newnes, 2003)"},{"key":"174_CR38","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"D.G. Lowe, Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision 60, 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vision"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-024-00174-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-024-00174-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-024-00174-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T01:20:21Z","timestamp":1732584021000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-024-00174-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,5]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["174"],"URL":"https:\/\/doi.org\/10.1186\/s13635-024-00174-3","relation":{},"ISSN":["2510-523X"],"issn-type":[{"type":"electronic","value":"2510-523X"}],"subject":[],"published":{"date-parts":[[2024,8,5]]},"assertion":[{"value":"5 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"24"}}