{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:09:27Z","timestamp":1776110967537,"version":"3.50.1"},"reference-count":78,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/cvprw.2017.176","type":"proceedings-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T20:55:19Z","timestamp":1503608119000},"page":"1343-1351","source":"Crossref","is-referenced-by-count":42,"title":["Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images"],"prefix":"10.1109","author":[{"given":"Yifang","family":"Li","sequence":"first","affiliation":[]},{"given":"Nishant","family":"Vishwamitra","sequence":"additional","affiliation":[]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Kelly","family":"Caine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","year":"2016","journal-title":"Blur moving objects in your video with the new custom blurring tool on youtube"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631422"},{"key":"ref71","article-title":"My privacy my decision: Control of photo sharing on online social networks","author":"xu","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027537"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.39"},{"key":"ref77","author":"zhang","year":"2014","journal-title":"Enable portrait privacy protection in photo capturing and sharing"},{"key":"ref74","year":"2012","journal-title":"Face blurring when footage requires anonymity"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0107"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712094"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1178657.1178665"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530530"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"ref31","first-page":"21","article-title":"Computer vision: Evolution and promise","author":"huang","year":"1996","journal-title":"CERN European Organization for Nuclear Research-Reports- CERN"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613097"},{"key":"ref37","first-page":"88560t","article-title":"Framework for objective evaluation of privacy filters","author":"korshunov","year":"2013","journal-title":"SPIE Optical Engineering+ Applications"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2013.6636641"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2012.6343472"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858417"},{"key":"ref60","first-page":"33","article-title":"Relationship between willingness to share photos and preferred level of photo blurring for privacy protection","author":"tanaka","year":"2015","journal-title":"Proceedings of the ASE BigData and Social Informatics 2015"},{"key":"ref62","first-page":"1317","article-title":"Privacy-cnh: A framework to detect photo privacy with convolutional neural network using hierarchical features","author":"tran","year":"2016","journal-title":"AAAI"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/978-3-642-14527-8_14","article-title":"unfriendly: Multiparty privacy risks in social networks","author":"thomas","year":"2010","journal-title":"International Symposium on Privacy Enhancing Technologies Symposium"},{"key":"ref63","year":"2010","journal-title":"American factfinder &#x2014; race results"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.03.011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0047"},{"key":"ref65","author":"venkatraman","year":"2007","journal-title":"Why blurring sensitive information is a bad idea"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2587640"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078875"},{"key":"ref68","author":"von zezschwitz","year":"2015","journal-title":"Filter selection and evaluation"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126158"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"ref1","author":"agrawal","year":"2010","journal-title":"De-Identification for Privacy Protection in Surveillance Videos"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2014.6918642"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1093\/hcr\/27.1.153"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072308"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.125"},{"key":"ref25","first-page":"227","article-title":"Integrating utility into face de-identification","author":"gross","year":"2005","journal-title":"International Workshop on Privacy Enhancing Technologies"},{"key":"ref50","author":"murray","year":"2010","journal-title":"Freedom of choice ease of use and the formation of interface preferences"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_2"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320729"},{"key":"ref57","author":"simonyan","year":"2014","journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v4i1.379"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1207-9"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1086\/521898"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.84.6.940"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/s150612959"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9722-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3_7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/1099-0720(200101\/02)15:1<101::AID-ACP697>3.0.CO;2-7"},{"key":"ref12","author":"chen","year":"2014","journal-title":"Semantic image segmentation with deep convolutional nets and fully connected crfs"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5244\/C.25.68"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3_2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2003.1211538"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"539","DOI":"10.2307\/20650308","article-title":"Exploring human images in website design: a multi-method approach","author":"cyr","year":"2009","journal-title":"MIS Quarterly"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5334\/pb-47-4-261"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3233\/THC-2009-0530","article-title":"Older adults' privacy considerations for vision based recognition methods of eldercare applications","volume":"17","author":"demiris","year":"2009","journal-title":"Technology and Health Care"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2384556.2384557"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520704"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761847"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358935"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"ref8","author":"caine","year":"2009","journal-title":"Exploring Everyday Privacy Behaviors and Misclosures"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.7.3.207"},{"key":"ref49","article-title":"Cashtags: Prevent leaking sensitive information through screen display","author":"mitchell","year":"2015","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/154193120504902108"},{"key":"ref46","author":"mao","year":"2014","journal-title":"Explain images with multimodal recurrent neural networks"},{"key":"ref45","author":"li","year":"2017","journal-title":"Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos"},{"key":"ref48","author":"meissner","year":"2001","journal-title":"Thirty years of investigating the own-race bias in memory for faces A meta-analytic review"},{"key":"ref47","author":"mcpherson","year":"2016","journal-title":"Defeating image obfuscation with deep learning"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2016.7733008"},{"key":"ref41","author":"ledig","year":"2016","journal-title":"Photo-realistic single image super-resolution using a generative adversarial network"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213601694"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874089"}],"event":{"name":"2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","location":"Honolulu, HI, USA","start":{"date-parts":[[2017,7,21]]},"end":{"date-parts":[[2017,7,26]]}},"container-title":["2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8014302\/8014734\/08014910.pdf?arnumber=8014910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T06:24:27Z","timestamp":1602829467000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/8014910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":78,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/cvprw.2017.176","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}