{"id":"https://openalex.org/W1972393442","doi":"https://doi.org/10.1145/1943513.1943535","title":"Identifying a critical threat to privacy through automatic image classification","display_name":"Identifying a critical threat to privacy through automatic image classification","publication_year":2011,"publication_date":"2011-02-15","ids":{"openalex":"https://openalex.org/W1972393442","doi":"https://doi.org/10.1145/1943513.1943535","mag":"1972393442"},"language":"en","primary_location":{"id":"doi:10.1145/1943513.1943535","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1943513.1943535","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the first ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078634311","display_name":"David Lorenzi","orcid":null},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Lorenzi","raw_affiliation_strings":["Rutgers University, Newark, NJ, USA","Rutgers University , Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Rutgers University, Newark, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"Rutgers University , Newark, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034878799","display_name":"Jaideep Vaidya","orcid":"https://orcid.org/0000-0002-7420-6947"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jaideep Vaidya","raw_affiliation_strings":["Rutgers University, Newark, NJ, USA","Rutgers University , Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Rutgers University, Newark, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"Rutgers University , Newark, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078634311"],"corresponding_institution_ids":["https://openalex.org/I102322142"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.05498325,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"157","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8643504977226257},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5921963453292847},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.5805763602256775},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5444754958152771},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5398399829864502},{"id":"https://openalex.org/keywords/contextual-image-classification","display_name":"Contextual image classification","score":0.5312003493309021},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.457630455493927},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4347476661205292},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.42626258730888367},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3984350264072418},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3982590436935425},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3852687478065491},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38340094685554504}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8643504977226257},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5921963453292847},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.5805763602256775},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5444754958152771},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5398399829864502},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.5312003493309021},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.457630455493927},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4347476661205292},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.42626258730888367},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3984350264072418},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3982590436935425},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3852687478065491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38340094685554504},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1943513.1943535","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1943513.1943535","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the first ACM conference on Data and application security and privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W91862604","https://openalex.org/W1481866092","https://openalex.org/W1576445103","https://openalex.org/W1980183801","https://openalex.org/W2010124835","https://openalex.org/W2036358294","https://openalex.org/W2037437396","https://openalex.org/W2050042584","https://openalex.org/W2063891319","https://openalex.org/W2074398519","https://openalex.org/W2100428290","https://openalex.org/W2112011646","https://openalex.org/W2139427956","https://openalex.org/W2151161796","https://openalex.org/W2167407098"],"related_works":["https://openalex.org/W2155945226","https://openalex.org/W2408873594","https://openalex.org/W2011339062","https://openalex.org/W2751243624","https://openalex.org/W3123950995","https://openalex.org/W1574707610","https://openalex.org/W1607060163","https://openalex.org/W2940450677","https://openalex.org/W4254194148","https://openalex.org/W2142052769"],"abstract_inverted_index":{"Image":[0],"classification,":[1,64],"in":[2,30,65,177],"general,":[3],"is":[4,11,54,88,98,148,208,255],"considered":[5],"a":[6,47,91,114,149,225,242],"hard":[7],"problem,":[8,50],"though":[9],"it":[10,238],"necessary":[12],"for":[13,216,227],"many":[14,102,181],"useful":[15],"applications":[16,230],"such":[17,77,161,231],"as":[18,78,162,224,232,241],"automatic":[19],"target":[20],"recognition.":[21],"Indeed,":[22],"no":[23],"general":[24],"methods":[25],"exist":[26],"that":[27,97,154,251],"can":[28,142,190],"work":[29],"varying":[31],"scenarios":[32],"and":[33,83,109,119,135,169,180,194,235,248],"still":[34],"achieve":[35],"good":[36],"performance":[37],"across":[38],"the":[39,60,66,211],"board.":[40],"In":[41],"this":[42,111],"paper,":[43],"we":[44],"actually":[45],"identify":[46],"very":[48,198],"interesting":[49,229],"where":[51],"image":[52,63,124,214],"classification":[53,215],"dangerously":[55],"easy.":[56],"We":[57],"look":[58],"at":[59],"problem":[61],"of":[62,69,139,167,213],"specific":[67],"context":[68],"accurately":[70],"classifying":[71],"images":[72,104,129,141],"containing":[73],"highly":[74],"sensitive":[75,103,121,134,140,218],"data":[76,192,246],"drivers":[79,170],"licenses,":[80],"credit":[81],"cards":[82],"passports.":[84],"Our":[85,126],"key":[86],"contribution":[87,207],"to":[89,100,112,116,158,200,209],"build":[90],"Hierarchical":[92],"Temporal":[93],"Memory":[94],"(HTM)":[95],"network":[96],"able":[99],"classify":[101],"with":[105],"over":[106],"90%":[107],"accuracy,":[108],"use":[110,191],"develop":[113],"system":[115,127],"automatically":[117],"derive":[118],"transcribe":[120],"information":[122],"from":[123],"data.":[125],"classifies":[128],"into":[130],"two":[131],"groups":[132],"--":[133],"non-sensitive.":[136],"The":[137],"group":[138],"then":[143],"be":[144],"further":[145],"analyzed.":[146],"This":[147],"real":[150],"world":[151],"security":[152,252],"issue":[153],"could":[155,221],"easily":[156],"lead":[157],"privacy":[159],"problems":[160],"identity":[163],"theft,":[164],"since":[165],"scans":[166],"passports":[168],"licenses":[171],"are":[172,184],"routinely":[173],"emailed":[174],"or":[175],"kept":[176],"digital":[178],"form,":[179],"local":[182],"documents":[183],"left":[185],"unencrypted.":[186],"Essentially,":[187],"an":[188],"attacker":[189],"mining":[193],"machine":[195],"learning":[196],"techniques":[197],"effectively":[199],"breach":[201],"individual":[202],"privacy.":[203],"Thus,":[204,237],"our":[205],"main":[206],"demonstrate":[210],"efficacy":[212],"deriving":[217],"information,":[219],"which":[220],"also":[222,239],"serve":[223],"guide":[226],"other":[228],"document":[233],"detection":[234],"analysis.":[236],"serves":[240],"warning":[243],"against":[244],"leaving":[245],"unencrypted":[247],"again":[249],"proves":[250],"through":[253],"obscurity":[254],"simply":[256],"not":[257],"enough.":[258]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
