{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,19]],"date-time":"2023-03-19T19:40:56Z","timestamp":1679254856110},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11623-022-1711-7","type":"journal-article","created":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T11:15:19Z","timestamp":1672658119000},"page":"27-30","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["De-Identifikation von Gesichtsbildern"],"prefix":"10.1007","volume":"47","author":[{"given":"Una","family":"Kelly","sequence":"first","affiliation":[]},{"given":"Luuk","family":"Spreeuwers","sequence":"additional","affiliation":[]},{"given":"Raymond","family":"Veldhuis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,2]]},"reference":[{"key":"1711_CR1","unstructured":"K. Hill. The secretive company that might end privacy as we know it. https:\/\/www.nytimes.com\/2020\/01\/18\/technology\/clearview-privacy-facial-recognition.html, Jan. 2020."},{"key":"1711_CR2","unstructured":"Clearview.ai"},{"key":"1711_CR3","unstructured":"https:\/\/the-decoder.de\/900-millionen-gesichter-im-web-gesichtssuche-pimeyes-vs-privatsphaere\/"},{"key":"1711_CR4","doi-asserted-by":"crossref","unstructured":"F. Vakhshiteh, A. Nickabadi und R. Ramachandra. Adversarial Attacks Against Face Recognition: A Comprehensive Study, in\u00a0IEEE Access, vol. 9, pp. 92735-92756, 2021.","DOI":"10.1109\/ACCESS.2021.3092646"},{"key":"1711_CR5","doi-asserted-by":"crossref","unstructured":"Q. Sun, A. Tewari, W. Xu, M. Fritz, C. Theobalt und B. Schiele. A hybrid model for identity obfuscation by face replacement. ArXiv, abs\/1804.04779, 2018.","DOI":"10.1007\/978-3-030-01246-5_34"},{"key":"1711_CR6","doi-asserted-by":"crossref","unstructured":"O. Gafni, L. Wolf und Y. Taigman. Live face deidentification in video. In 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pages 9377\u20139386, 2019.","DOI":"10.1109\/ICCV.2019.00947"},{"key":"1711_CR7","doi-asserted-by":"crossref","unstructured":"R. Gross, L. Sweeney, J. Cohn, F. De la Torre und S. Baker. Face De-identification. In:\u00a0Protecting Privacy in Video Surveillance, pages 129\u2013146. 07 2009.","DOI":"10.1007\/978-1-84882-301-3_8"},{"key":"1711_CR8","doi-asserted-by":"crossref","unstructured":"S. Ribaric und N. Pavesic. An overview of face deidentification in still images and videos. In 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), volume 04, pages 1\u20136, 2015.","DOI":"10.1109\/FG.2015.7285017"},{"key":"1711_CR9","unstructured":"R. McPherson, R. Shokri und V. Shmatikov. Defeating image obfuscation with deep learning. CoRR, abs\/1609.00408, 2016."},{"key":"1711_CR10","unstructured":"Y. Wu, F. Yang und H. Ling. Privacy-protective-GAN for face de-identification. CoRR, abs\/1806.08906, 2018."},{"key":"1711_CR11","doi-asserted-by":"crossref","unstructured":"T. Li und L. Lin. Anonymousnet: Natural face de-identification with measurable privacy. CoRR, abs\/1904.12620, 2019.","DOI":"10.1109\/CVPRW.2019.00013"},{"key":"1711_CR12","doi-asserted-by":"crossref","unstructured":"J. Li, Lutong Han, R. Chen, Hua Zhang, B. Han, L. Wang und X. Cao. 2021. Identity-Preserving Face Anonymization via Adaptively Facial Attributes Obfuscation. In Proceedings of the 29th ACM International Conference on Multimedia (MM \u201821). Association for Computing Machinery, New York, NY, USA, 3891\u20133899. https:\/\/doi.org\/10.1145\/3474085.3475367","DOI":"10.1145\/3474085.3475367"},{"key":"1711_CR13","doi-asserted-by":"crossref","unstructured":"Z. Wang, A. Bovik, H. Sheikh und E. Simoncelli. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4):600\u2013612, 2004.","DOI":"10.1109\/TIP.2003.819861"},{"key":"1711_CR14","doi-asserted-by":"crossref","unstructured":"E. Chatzikyriakidis, C. Papaioannidis und I. Pitas. Adversarial face de-identification. In 2019 IEEE International Conference on Image Processing (ICIP), pages 684\u2013688, 2019.","DOI":"10.1109\/ICIP.2019.8803803"},{"key":"1711_CR15","doi-asserted-by":"crossref","unstructured":"Z. Liu, P. Luo, X. Wang und X. Tang. Deep Learning Face Attributes in the Wild. In Proceedings of International Conference on Computer Vision, 2015.","DOI":"10.1109\/ICCV.2015.425"},{"key":"1711_CR16","unstructured":"S. Shan, E. Wenger, J. Zhang, H. Li, H. Zheng und B. Y. Zhao. Fawkes: Protecting personal privacy against unauthorized deep learning models. CoRR, abs\/2002.08327, 2020."},{"key":"1711_CR17","doi-asserted-by":"crossref","unstructured":"D. Deb, J. Zhang und A. K. Jain. Advfaces: Adversarial face synthesis. In 2020 IEEE International Joint Conference on Biometrics (IJCB), pages 1\u201310, 2020.","DOI":"10.1109\/IJCB48548.2020.9304898"},{"key":"1711_CR18","doi-asserted-by":"crossref","unstructured":"U. Kelly, L. Spreeuwers und R. Veldhuis. Exploring Face De-Identification using Latent Spaces. In 2022 IEEE International Joint Conference on Biometrics (IJCB).","DOI":"10.1109\/IJCB54206.2022.10007990"},{"key":"1711_CR19","doi-asserted-by":"crossref","unstructured":"J. Zhang, J. Sang, X. Zhao, X. Huang, Y. Sun und Y. Hu. Adversarial Privacy-Preserving Filter, page 1423\u20131431. Association for Computing Machinery, New York, NY, USA, 2020.","DOI":"10.1145\/3394171.3413906"},{"key":"1711_CR20","unstructured":"G. Hinton und S. Roweis. Stochastic neighbor embedding. In Advances in Neural Information Processing Systems, volume 15. MIT Press, 2002."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1711-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-022-1711-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1711-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,19]],"date-time":"2023-03-19T19:18:56Z","timestamp":1679253536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-022-1711-7"}},"subtitle":["Wie Gesichtserkennung umgangen werden kann"],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["1711"],"URL":"https:\/\/doi.org\/10.1007\/s11623-022-1711-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}