Face Privacy Protection Based on Attribute Manipulation
Abstract
References
Recommendations
Face deidentification with controllable privacy protection
Highlights- CPP-DeID is a face deidentification algorithm allowing for controllable privacy.
AbstractPrivacy protection has become a crucial concern in today’s digital age. Particularly sensitive here are facial images, which typically not only reveal a person’s identity, but also other sensitive personal information. To address this ...
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks
Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533Online Social Networks (OSNs) such as Facebook, Twitter, and so on recently are major impact in communication and social interaction. Users can share any information with others. However, they have concerns about losing privacy due to lack of an ...
Privacy Protection on Multiple Sensitive Attributes
Information and Communications SecurityAbstractIn recent years, a privacy model called k-anonymity has gained popularity in the microdata releasing. As the microdata may contain multiple sensitive attributes about an individual, the protection of multiple sensitive attributes has become an ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- Yunnan Innovation Team of Education Informatization for Nationalities, and Yunnan ExpertWorkstation of Xiaochun Cao
- postgraduate scientific research innovation project of Yunnan Normal University
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 74Total Downloads
- Downloads (Last 12 months)13
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format