{"id":"https://openalex.org/W2541108089","doi":"https://doi.org/10.1109/wifs.2012.6412629","title":"Privacy-preserving architecture for forensic image recognition","display_name":"Privacy-preserving architecture for forensic image recognition","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2541108089","doi":"https://doi.org/10.1109/wifs.2012.6412629","mag":"2541108089"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2012.6412629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/5439812/Andreas_06412629.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056553463","display_name":"Peter Andreas","orcid":"https://orcid.org/0000-0003-2929-5001"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Andreas Peter","raw_affiliation_strings":["Security Engineering Group, TU Darmstadt and CASED, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Security Engineering Group, TU Darmstadt and CASED, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010829193","display_name":"Thomas Hartmann","orcid":"https://orcid.org/0000-0002-0465-6280"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Hartmann","raw_affiliation_strings":["Security Engineering Group, TU Darmstadt and CASED, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Security Engineering Group, TU Darmstadt and CASED, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066885874","display_name":"S. Raschid Muller","orcid":"https://orcid.org/0000-0002-1742-7575"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sascha Muller","raw_affiliation_strings":["Security Engineering Group, TU Darmstadt and CASED, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Security Engineering Group, TU Darmstadt and CASED, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036400192","display_name":"Stefan Katzenbeisser","orcid":"https://orcid.org/0009-0005-3608-874X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Stefan Katzenbeisser","raw_affiliation_strings":["Technische Universitat Darmstadt Fachbereich Biologie, Darmstadt, Hessen, DE"],"affiliations":[{"raw_affiliation_string":"Technische Universitat Darmstadt Fachbereich Biologie, Darmstadt, Hessen, DE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056553463"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":0.7432,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76795755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2320","issue":null,"first_page":"79","last_page":"84"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7106130123138428},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6200964450836182},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4766441285610199},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.46367499232292175},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.45065921545028687},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4012020230293274},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3294376730918884},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.06673303246498108}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7106130123138428},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6200964450836182},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4766441285610199},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.46367499232292175},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.45065921545028687},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4012020230293274},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3294376730918884},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.06673303246498108},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/wifs.2012.6412629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:publications/7c855c0d-ff9e-47f7-906b-ac5a4afc7448","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/7c855c0d-ff9e-47f7-906b-ac5a4afc7448","pdf_url":"https://ris.utwente.nl/ws/files/5439812/Andreas_06412629.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Peter, A, Hartman, T, Muller, S & Katzenbeisser, S 2013, Privacy-preserving architecture for forensic image recognition. in IEEE International Workshop on Information Forensics and Security, WIFS 2012. Information Forensics and Security (WIFS), 2012 IEEE International Workshop, no. 13249609, IEEE, USA, pp. 79-84, IEEE International Workshop on Information Forensics and Security, WIFS 2012, Costa Adeje, Spain, 2/12/12. https://doi.org/10.1109/WIFS.2012.6412629","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.396.1257","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.396.1257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://eprints.eemcs.utwente.nl/23752/01/Andreas_06412629.pdf","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:publications/7c855c0d-ff9e-47f7-906b-ac5a4afc7448","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/7c855c0d-ff9e-47f7-906b-ac5a4afc7448","pdf_url":"https://ris.utwente.nl/ws/files/5439812/Andreas_06412629.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Peter, A, Hartman, T, Muller, S & Katzenbeisser, S 2013, Privacy-preserving architecture for forensic image recognition. in IEEE International Workshop on Information Forensics and Security, WIFS 2012. Information Forensics and Security (WIFS), 2012 IEEE International Workshop, no. 13249609, IEEE, USA, pp. 79-84, IEEE International Workshop on Information Forensics and Security, WIFS 2012, Costa Adeje, Spain, 2/12/12. https://doi.org/10.1109/WIFS.2012.6412629","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2541108089.pdf","grobid_xml":"https://content.openalex.org/works/W2541108089.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1647732624","https://openalex.org/W1660562555","https://openalex.org/W1788576983","https://openalex.org/W1799922503","https://openalex.org/W1936974923","https://openalex.org/W2052267638","https://openalex.org/W2063355793","https://openalex.org/W2065049398","https://openalex.org/W2074176936","https://openalex.org/W2107211792","https://openalex.org/W2127098089","https://openalex.org/W2127697997","https://openalex.org/W2129905915","https://openalex.org/W2145853380","https://openalex.org/W2146813141","https://openalex.org/W2148864534","https://openalex.org/W2166554499","https://openalex.org/W2168573702","https://openalex.org/W2185917628","https://openalex.org/W2521732389","https://openalex.org/W3145609436","https://openalex.org/W4285719527","https://openalex.org/W4289127653","https://openalex.org/W6682319640","https://openalex.org/W6726915050"],"related_works":["https://openalex.org/W2588198209","https://openalex.org/W1909006023","https://openalex.org/W4205824991","https://openalex.org/W3200723557","https://openalex.org/W4312713546","https://openalex.org/W2362195430","https://openalex.org/W2347494122","https://openalex.org/W2567983276","https://openalex.org/W2802298219","https://openalex.org/W2393996461"],"abstract_inverted_index":{"Forensic":[0],"image":[1,45,51,130],"recognition":[2,24,131],"is":[3,38],"an":[4,14],"important":[5],"tool":[6],"in":[7,61,101,132],"many":[8],"areas":[9],"of":[10,20,25,48,64,98],"law":[11,162],"enforcement":[12,163],"where":[13],"agency":[15,164],"wants":[16],"to":[17,107,120,127],"prosecute":[18],"possessors":[19],"illegal":[21,26,67,85,155],"images.":[22,68],"The":[23],"images":[27,78,156],"that":[28,79,94,153],"might":[29],"have":[30,80],"undergone":[31],"human":[32],"imperceptible":[33],"changes":[34],"(e.g.,":[35],"a":[36,43,49,62,133],"JPEG-recompression)":[37],"commonly":[39],"done":[40],"by":[41,112,160],"computing":[42],"perceptual":[44,58],"hash":[46,56,59],"function":[47],"given":[50],"and":[52,86,151],"then":[53],"matching":[54],"this":[55,90],"with":[57],"values":[60],"database":[63],"previously":[65],"collected":[66],"To":[69],"prevent":[70],"privacy":[71],"violation,":[72],"agencies":[73,103],"should":[74],"only":[75,154],"learn":[76],"about":[77],"been":[81],"reliably":[82],"detected":[83],"as":[84],"nothing":[87],"else.":[88],"In":[89],"work,":[91],"we":[92,145],"argue":[93],"the":[95,109,122,143,161],"prevalent":[96],"presence":[97],"separate":[99],"departments":[100],"such":[102],"can":[104,146,157],"be":[105,158],"used":[106],"enforce":[108],"need-to-know":[110],"principle":[111],"separating":[113],"duties":[114],"among":[115],"them.":[116],"This":[117],"enables":[118],"us":[119],"construct":[121],"first":[123],"practically":[124],"efficient":[125],"architecture":[126],"perform":[128],"forensic":[129],"privacy-preserving":[134],"manner.":[135],"By":[136],"deriving":[137],"unique":[138],"cryptographic":[139],"keys":[140],"directly":[141],"from":[142],"images,":[144],"encrypt":[147],"all":[148,166],"sensitive":[149],"data":[150],"ensure":[152],"recovered":[159],"while":[165],"other":[167],"information":[168],"remains":[169],"protected.":[170]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
