Differentially Private Obfuscation of Facial Images
暂无分享,去创建一个
[1] Blaz Meden,et al. κ-Same-Net: Neural-Network-Based Face Deidentification , 2017, 2017 International Conference and Workshop on Bioinspired Intelligence (IWOBI).
[2] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[3] Liyue Fan,et al. Image Pixelization with Differential Privacy , 2018, DBSec.
[4] Shree K. Nayar,et al. Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.
[5] Thomas Brox,et al. Learning to Generate Chairs, Tables and Cars with Convolutional Networks , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[7] A. Brand,et al. European Best Practice Guidelines for Quality Assurance, Provision and Use of Genome-based Information and Technologies: the 2012 Declaration of Rome , 2012, Drug metabolism and drug interactions.
[8] L. D. Harmon. The recognition of faces. , 1973, Scientific American.
[9] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[10] Yu Hen Hu,et al. Face de-identification using facial identity preserving features , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[11] Fan Chen,et al. How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control , 2017, Multimedia Tools and Applications.
[12] Marco Zennaro,et al. Large-scale privacy protection in Google Street View , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[13] B Julesz,et al. Masking in Visual Recognition: Effects of Two-Dimensional Filtered Noise , 1973, Science.
[14] Touradj Ebrahimi,et al. Using warping for privacy protection in video surveillance , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[15] Anirban Basu,et al. k-anonymity: Risks and the Reality , 2015, TrustCom 2015.
[16] D. Lundqvist,et al. Karolinska Directed Emotional Faces , 2015 .
[17] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[18] Edoardo M. Airoldi,et al. Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.
[19] Touradj Ebrahimi,et al. Using face morphing to protect privacy , 2013, 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance.
[20] Andrea Cavallaro,et al. Privacy in Video Surveillance [In the Spotlight] , 2007 .
[21] Skyler T. Hawk,et al. Presentation and validation of the Radboud Faces Database , 2010 .
[22] Tal Hassner,et al. Age and gender classification using convolutional neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[23] Erik Blasch,et al. GARP-face: Balancing privacy protection and utility preservation in face de-identification , 2014, IEEE International Joint Conference on Biometrics.
[24] Ting Yu,et al. What are customers looking at? , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.
[25] Ralph Gross,et al. Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[26] Timothy F. Cootes,et al. Active Appearance Models , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[27] Catuscia Palamidessi,et al. Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.
[28] Katie Shilton,et al. Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices , 2016, Inf. Soc..
[29] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[30] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[31] Mahadev Satyanarayanan,et al. OpenFace: A general-purpose face recognition library with mobile applications , 2016 .
[32] Craig A. Knoblock,et al. A Survey of Digital Map Processing Techniques , 2014, ACM Comput. Surv..
[33] Bernhard Rinner,et al. Security and Privacy Protection in Visual Sensor Networks , 2014, ACM Comput. Surv..
[34] P. L. Venetianer,et al. Video verification of point of sale transactions , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.
[35] Hongxin Hu,et al. Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos , 2017, Proc. ACM Hum. Comput. Interact..
[36] Jean-Philippe Domenger,et al. Face de-identification with expressions preservation , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[37] Alexandros André Chaaraoui,et al. Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..