{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:32:39Z","timestamp":1762432359375},"reference-count":37,"publisher":"Korea Multimedia Society - English Version Journal","issue":"1","license":[{"start":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T00:00:00Z","timestamp":1680220800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.jmis.org"],"crossmark-restriction":true},"short-container-title":["J Multimed Inf Syst"],"DOI":"10.33851\/jmis.2023.10.1.35","type":"journal-article","created":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T02:17:13Z","timestamp":1681697833000},"page":"35-44","update-policy":"http:\/\/dx.doi.org\/10.33851\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Online New Media Oriented Privacy Data Recognition Mechanism Based on\n                    Deep Learning"],"prefix":"10.33851","volume":"10","author":[{"given":"Jing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Nali","family":"Yu","sequence":"additional","affiliation":[]}],"member":"19702","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"key":"key2.0230417041704e+13_B1","doi-asserted-by":"crossref","unstructured":"Z. Zhang and B. B. Gupta, \u201cSocial media security and\n                    trustworthiness: Overview and new direction,\u201d Future Generation\n                        Computer Systems, vol. 86, pp. 914-925, 2018. 10.1016\/j.future.2016.10.007","DOI":"10.1016\/j.future.2016.10.007"},{"key":"key2.0230417041704e+13_B2","doi-asserted-by":"crossref","unstructured":"S. Gonz\u00e1lez\u2010Bail\u00f3n, \u201cSocial science in\n                    the era of big data,\u201d Policy & Internet, vol. 5,\n                    no. 2, pp. 147-160, 2013. 10.1002\/1944-2866.POI328","DOI":"10.1002\/1944-2866.POI328"},{"key":"key2.0230417041704e+13_B3","doi-asserted-by":"crossref","unstructured":"J. Waldfogel, \u201cCopyright protection, technological change,\n                    and the quality of new products: Evidence from recorded music since\n                    Napster,\u201d The Journal of Law and Economics, vol. 55, no.\n                    4, pp. 715-740, 2012. 10.1086\/665824","DOI":"10.1086\/665824"},{"key":"key2.0230417041704e+13_B4","doi-asserted-by":"crossref","unstructured":"T. Ko, \u201cA survey on behavior analysis in video surveillance\n                    for homeland security applications,\u201d in 2008 37th IEEE Applied\n                        Imagery Pattern Recognition Workshop, IEEE, 2008,\n                    pp. 1-8.","DOI":"10.1109\/AIPR.2008.4906450"},{"key":"key2.0230417041704e+13_B5","doi-asserted-by":"crossref","unstructured":"M. A. Hearst, S. T. Dumais. and E. Osuna et al., \u201cSupport\n                    vector machines,\u201d IEEE Intelligent Systems and Their\n                        Applications, vol. 13, no. 4, pp. 18-28, 1998. 10.1109\/5254.708428","DOI":"10.1109\/5254.708428"},{"key":"key2.0230417041704e+13_B6","doi-asserted-by":"crossref","unstructured":"S. Streuber, M. A. Quiros-Ramirez, and M. Q. Hill, et al.,\n                    \u201cBody talk: Crowdshaping realistic 3D avatars with words,\u201d\n                        ACM Transactions on Graphics (TOG), vol. 35, no. 4, pp.\n                    1-14, 2016. 10.1145\/2897824.2925981","DOI":"10.1145\/2897824.2925981"},{"key":"key2.0230417041704e+13_B7","doi-asserted-by":"crossref","unstructured":"W. Fang, L. Ding, and H. Luo, et al., \u201cFalls from heights: A\n                    computer vision-based approach for safety harness detection,\u201d\n                        Automation in Construction, vol. 91, pp. 53-61, 2018.\n                        10.1016\/j.autcon.2018.02.018","DOI":"10.1016\/j.autcon.2018.02.018"},{"key":"key2.0230417041704e+13_B8","unstructured":"X. X. Li and R. H. Liang, \u201cA review for face recognition with\n                    occlusion: From subspace regression to deep learning,\u201d Chinese\n                        Journal of Computers, vol. 41, no. 1, pp. 177-207,\n                    2018."},{"key":"key2.0230417041704e+13_B9","doi-asserted-by":"crossref","unstructured":"Y. Wen, K. Zhang, and Z. Li, et al., \u201cA comprehensive study\n                    on center loss for deep face recognition,\u201d International Journal\n                        of Computer Vision, vol. 127, no. 6, pp. 668-683, 2019. 10.1007\/s11263-018-01142-4","DOI":"10.1007\/s11263-018-01142-4"},{"key":"key2.0230417041704e+13_B10","doi-asserted-by":"crossref","unstructured":"Y. Taigman, M. Yang, and M. A. Ranzato, et al., \u201cDeepface:\n                    Closing the gap to human-level performance in face verification,\u201d in\n                        Proceedings of the IEEE Conference on Computer Vision and Pattern\n                        Recognition, 2014, pp. 1701-1708. 10.1109\/CVPR.2014.220","DOI":"10.1109\/CVPR.2014.220"},{"key":"key2.0230417041704e+13_B11","doi-asserted-by":"crossref","unstructured":"Y. Sun, X. Wang, and X. Tang, \u201cDeep learning face\n                    representation from predicting 10,000 classes,\u201d in Proceedings of\n                        the IEEE Conference on Computer Vision and Pattern Recognition,\n                    2014, pp. 1891-1898. 10.1109\/CVPR.2014.244","DOI":"10.1109\/CVPR.2014.244"},{"key":"key2.0230417041704e+13_B12","doi-asserted-by":"crossref","unstructured":"F. Schroff, D. Kalenichenko, and J. Philbin, \u201cFacenet: A\n                    unified embedding for face recognition and clustering,\u201d in\n                        Proceedings of the IEEE Conference on Computer Vision and Pattern\n                        Recognition, 2015, pp. 815-823. 10.1109\/CVPR.2015.7298682","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"key2.0230417041704e+13_B13","doi-asserted-by":"crossref","unstructured":"R. Ramachandra and C. Busch, \u201cPresentation attack detection\n                    methods for face recognition systems: A comprehensive survey,\u201d\n                        ACM Computing Surveys (CSUR), vol. 50, no. 1, pp. 1-37,\n                    2017. 10.1145\/3038924","DOI":"10.1145\/3038924"},{"key":"key2.0230417041704e+13_B14","doi-asserted-by":"crossref","unstructured":"Z. Akhtar and A. Rattani, \u201cA face in any form: ew challenges\n                    and opportunities for face recognition technology,\u201d\n                        Computer, vol. 50, no. 4, pp. 80-90, 2017. 10.1109\/MC.2017.119","DOI":"10.1109\/MC.2017.119"},{"key":"key2.0230417041704e+13_B15","doi-asserted-by":"crossref","unstructured":"B. Meden, P. Rot, and P. Terh\u00f6rst, et al.,\n                    \u201cPrivacyenhancing face biometrics: A comprehensive survey,\u201d\n                        IEEE Transactions on Information Forensics and Security,\n                    2021. 10.1109\/TIFS.2021.3096024","DOI":"10.1109\/TIFS.2021.3096024"},{"key":"key2.0230417041704e+13_B16","doi-asserted-by":"crossref","unstructured":"L. Rakhmawati, \u201cImage privacy protection techniques: A\n                    survey,\u201d in TENCON 2018\u20132018 IEEE Region 10\n                        Conference, IEEE, pp. 0076-0080, 2018. 10.1109\/TENCON.2018.8650339","DOI":"10.1109\/TENCON.2018.8650339"},{"key":"key2.0230417041704e+13_B17","doi-asserted-by":"crossref","unstructured":"Q. Jiang, W. Zeng, and W. Ou, et al., \u201cA scrambling and\n                    encryption algorithm for selective block of identification photo,\u201d in\n                        2016 8th International Conference on Wireless Communications\n                        & Signal Processing (WCSP), IEEE, 2016, pp.\n                    1-5. 10.1109\/WCSP.2016.7752580","DOI":"10.1109\/WCSP.2016.7752580"},{"key":"key2.0230417041704e+13_B18","unstructured":"S. J. Oh, M. Fritz, and B. Schiele, \u201cAdversarial image\n                    perturbation for privacy protection a game theory perspective,\u201d in\n                        2017 IEEE International Conference on Computer Vision\n                        (ICCV), IEEE, pp. 1491-1500,\n                    2017."},{"key":"key2.0230417041704e+13_B19","doi-asserted-by":"crossref","unstructured":"X. Cheng and Z. Li, \u201cUsing Boltzmann entropy to measure\n                    scrambling degree of grayscale images,\u201d in 2021 IEEE 5th\n                        International Conference on Cryptography, Security and Privacy\n                        (CSP), IEEE, 2021, pp. 181-185. 10.1109\/CSP51677.2021.9357492","DOI":"10.1109\/CSP51677.2021.9357492"},{"key":"key2.0230417041704e+13_B20","doi-asserted-by":"crossref","unstructured":"E. M. Newton, L. Sweeney, and B. Malin, \u201cPreserving privacy\n                    by deidentifying face images,\u201d IEEE Transactions on Knowledge and\n                        Data Engineering, vol. 17, no. 2, pp. 232-243, 2005. 10.1109\/TKDE.2005.32","DOI":"10.1109\/TKDE.2005.32"},{"key":"key2.0230417041704e+13_B21","doi-asserted-by":"crossref","unstructured":"F. Song, T. Ma, and Y. Tian, et al., \u201cA new method of privacy\n                    protection: Random k-anonymous,\u201d IEEE Access, vol. 7,\n                    pp. 75434-75445, 2019. 10.1109\/ACCESS.2019.2919165","DOI":"10.1109\/ACCESS.2019.2919165"},{"key":"key2.0230417041704e+13_B22","doi-asserted-by":"crossref","unstructured":"H. Hao, D. G\u00fcera, and J. Horv\u00e1th, et al.,\n                    \u201cRobustness analysis of face obscuration,\u201d in 2020 15th\n                        IEEE International Conference on Automatic Face and Gesture Recognition (FG\n                        2020), IEEE, 2020, pp. 176-183.","DOI":"10.1109\/FG47880.2020.00021"},{"key":"key2.0230417041704e+13_B23","doi-asserted-by":"crossref","unstructured":"A. Aggarwal, R. Rathore, and P. Chattopadhyay, et al.,\n                    \u201cEPD-Net: A GAN-based architecture for face deidentification from\n                    images,\u201d in 2020 IEEE International IOT, Electronics and\n                        Mechatronics Conference (IEMTRONICS), IEEE, 2020,\n                    pp. 1-7. 10.1109\/IEMTRONICS51293.2020.9216358","DOI":"10.1109\/IEMTRONICS51293.2020.9216358"},{"key":"key2.0230417041704e+13_B24","doi-asserted-by":"crossref","unstructured":"J. Song, Y. Jin, and Y. D. Li, et al., \u201cLearning structural\n                    similarity with evolutionarygan: A new face deidentification method,\u201d in\n                        2019 6th International Conference on Behavioral, Economic and\n                        Socio-Cultural Computing (BESC), IEEE, 2019, pp.\n                    1-6. 10.1109\/BESC48373.2019.8962993","DOI":"10.1109\/BESC48373.2019.8962993"},{"key":"key2.0230417041704e+13_B25","doi-asserted-by":"crossref","unstructured":"Y. Li, Q. Lu, and Q. Tao, et al., \u201cSF-GAN: face\n                    deidentification method without losing facial attribute information,\u201d\n                        IEEE Signal Processing Letters, vol. 28, pp. 1345-1349,\n                    2021. 10.1109\/LSP.2021.3067517","DOI":"10.1109\/LSP.2021.3067517"},{"key":"key2.0230417041704e+13_B26","doi-asserted-by":"crossref","unstructured":"S. Yang, W. Wang, and Y. Cheng, et al., \u201cA systematical\n                    solution for face deidentification,\u201d in Chinese Conference on\n                        Biometric Recognition, Cham, 2021, pp. 20-30. 10.1007\/978-3-030-86608-2_3","DOI":"10.1007\/978-3-030-86608-2_3"},{"key":"key2.0230417041704e+13_B27","doi-asserted-by":"crossref","unstructured":"D. Cho, J. H. Lee, and I. H. Suh, \u201cCLEANIR: Controllable\n                    attribute-preserving natural identity remover,\u201d Applied\n                        Sciences, 2020, vol. 10, no. 3, p. 1120. 10.3390\/app10031120","DOI":"10.3390\/app10031120"},{"key":"key2.0230417041704e+13_B28","doi-asserted-by":"crossref","unstructured":"T. Li and L. Lin, \u201cAnonymousnet: Natural face\n                    deidentification with measurable privacy,\u201d in Proceedings of the\n                        IEEE\/CVF Conference on Computer Vision and Pattern Recognition\n                        Work-shops, 2019.","DOI":"10.1109\/CVPRW.2019.00013"},{"key":"key2.0230417041704e+13_B29","doi-asserted-by":"crossref","unstructured":"Y. Zhao, B. Liu, and T. Zhu, et al., \u201cPrivate\u2010encoder:\n                    Enforcing privacy in latent space for human face images,\u201d\n                        Concurrency and Computation: Practice and Experience, vol.\n                    34, no. 3, p. e6548, 2022. 10.1002\/cpe.6548","DOI":"10.1002\/cpe.6548"},{"key":"key2.0230417041704e+13_B30","doi-asserted-by":"crossref","unstructured":"C. Dwork, \u201cDifferential privacy: A survey of results,\u201d\n                    in International Conference on Theory and Applications of Models of\n                        Computation, Berlin, Heidelberg, 2008, pp. 1-19. 10.1007\/978-3-540-79228-4_1","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"key2.0230417041704e+13_B31","doi-asserted-by":"crossref","unstructured":"X. Zhang and W. Q. Yan, \u201cComparative evaluations of privacy\n                    on digital images,\u201d in 2018 15th IEEE International Conference on\n                        Advanced Video and Signal Based Surveillance (AVSS),\n                    IEEE, 2018, pp. 1-6. 10.1109\/AVSS.2018.8639090","DOI":"10.1109\/AVSS.2018.8639090"},{"key":"key2.0230417041704e+13_B32","doi-asserted-by":"crossref","unstructured":"M. A. P. Chamikara, P. Bertok, and I. Khalil, et al.,\n                    \u201cPrivacy preserving face recognition utilizing differential\n                    privacy,\u201d Computers & Security, vol. 97, p.\n                    101951, 2020. 10.1016\/j.cose.2020.101951","DOI":"10.1016\/j.cose.2020.101951"},{"key":"key2.0230417041704e+13_B33","doi-asserted-by":"crossref","unstructured":"W. L. Croft, J. R. Sack, and W. Shi, \u201cObfuscation of images\n                    via differential privacy: From facial images to general images,\u201d\n                        Peer-to-Peer Networking and Applications, vol. 14, no. 3,\n                    pp. 1705-1733, 2021. 10.1007\/s12083-021-01091-9","DOI":"10.1007\/s12083-021-01091-9"},{"key":"key2.0230417041704e+13_B34","doi-asserted-by":"crossref","unstructured":"Q. Geng and P. Viswanath, \u201cThe optimal noise-adding mechanism\n                    in differential privacy,\u201d IEEE Transactions on Information\n                        Theory, vol. 62, no. 2, pp. 925-951, 2015. 10.1109\/TIT.2015.2504967","DOI":"10.1109\/TIT.2015.2504967"},{"key":"key2.0230417041704e+13_B35","doi-asserted-by":"crossref","unstructured":"R. Sithara and R. Rajasree, \u201cA survey on Face Recognition\n                    Technique,\u201d in 2019 IEEE International Conference on Innovations\n                        in Communication, Computing and Instrumentation (ICCI),\n                    IEEE, 2019, pp. 189-192. 10.1109\/ICCI46240.2019.9404387","DOI":"10.1109\/ICCI46240.2019.9404387"},{"key":"key2.0230417041704e+13_B36","doi-asserted-by":"crossref","unstructured":"Z. Liu, P. Luo, and X. Wang, et al., \u201cDeep learning face\n                    attributes in the wild,\u201d in Proceedings of the IEEE International\n                        Conference on Computer Vision, 2015, pp. 3730-3738. 10.1109\/ICCV.2015.425\n                    27112012","DOI":"10.1109\/ICCV.2015.425"},{"key":"key2.0230417041704e+13_B37","doi-asserted-by":"crossref","unstructured":"M. Maximov, I. Elezi, and L. Leal-Taix\u00e9, \u201cCiagan:\n                    Conditional identity anonymization generative adversarial networks,\u201d in\n                        Proceedings of the IEEE\/CVF Conference on Computer Vision and\n                        Pattern Recognition, 2020, pp. 5447-5456. 10.1109\/CVPR42600.2020.00549","DOI":"10.1109\/CVPR42600.2020.00549"}],"container-title":["Journal of Multimedia Information System"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jmis.org\/download\/download_pdf?doi=10.33851\/JMIS.2023.10.1.35","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.jmis.org\/download\/download_pdf?doi=10.33851\/JMIS.2023.10.1.35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T02:19:09Z","timestamp":1681697949000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jmis.org\/archive\/view_article?doi=10.33851\/JMIS.2023.10.1.35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,31]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,3,31]]}},"alternative-id":["10.33851\/JMIS.2023.10.1.35"],"URL":"https:\/\/doi.org\/10.33851\/jmis.2023.10.1.35","relation":{},"ISSN":["2383-7632"],"issn-type":[{"value":"2383-7632","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,31]]},"assertion":[{"value":"2023-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}}]}}