skip to main content
research-article

Eyes See Hazy while Algorithms Recognize Who You Are

Published:10 January 2024Publication History
Skip Abstract Section

Abstract

Facial recognition technology has been developed and widely used for decades. However, it has also made privacy concerns and researchers’ expectations for facial recognition privacy-preserving technologies. To provide privacy, detailed or semantic contents in face images should be obfuscated. However, face recognition algorithms have to be tailor-designed according to current obfuscation methods, as a result the face recognition service provider has to update its commercial off-the-shelf (COTS) products for each obfuscation method. Meanwhile, current obfuscation methods have no clearly quantified explanation. This paper presents a universal face obfuscation method for a family of face recognition algorithms using global or local structure of eigenvector space. By specific mathematical explanations, we show that the upper bound of the distance between the original and obfuscated face images is smaller than the given recognition threshold. Experiments show that the recognition degradation is 0% for global structure based and 0.3%-5.3% for local structure based, respectively. Meanwhile, we show that even if an attacker knows the whole obfuscation method, he/she has to enumerate all the possible roots of a polynomial with an obfuscation coefficient, which is computationally infeasible to reconstruct original faces. So our method shows a good performance in both privacy and recognition accuracy without modifying recognition algorithms.

REFERENCES

  1. [1] Bowyer Kevin W.. 2004. Face recognition technology: Security versus privacy. IEEE Technology and Society Magazine 23, 1 (2004), 919.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Zhang Yuchao, Li Pengmiao, Zhang Zhili, Zhang Chaorui, Wang Wendong, Ning Yishuang, and Lian Bo. 2020. GraphInf: A GCN-based popularity prediction system for short video networks. In International Conference on Web Services. Springer, 6176.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Chandrasekaran Varun, Gao Chuhan, Tang Brian, Fawaz Kassem, Jha Somesh, and Banerjee Suman. 2021. Face-off: Adversarial face obfuscation. Proc. Priv. Enhancing Technol. 2021, 2 (2021), 369390.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Shan Shawn, Wenger Emily, Zhang Jiayun, Li Huiying, Zheng Haitao, and Zhao Ben Y.. 2020. Fawkes: Protecting privacy against unauthorized deep learning models. In 29th USENIX Security Symposium (USENIX Security 20). 15891604.Google ScholarGoogle Scholar
  5. [5] Ilyas Andrew, Santurkar Shibani, Tsipras Dimitris, Engstrom Logan, Tran Brandon, and Madry Aleksander. 2019. Adversarial examples are not bugs, they are features. In Advances in Neural Information Processing Systems, Vol. 32.Google ScholarGoogle Scholar
  6. [6] Cai Jie, Meng Zibo, Khan Ahmed Shehab, O’Reilly James, Li Zhiyuan, Han Shizhong, and Tong Yan. 2021. Identity-free facial expression recognition using conditional generative adversarial network. In 2021 IEEE International Conference on Image Processing (ICIP). IEEE, 13441348.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Frome Andrea, Cheung German, Abdulkader Ahmad, Zennaro Marco, Wu Bo, Bissacco Alessandro, Adam Hartwig, Neven Hartmut, and Vincent Luc. 2009. Large-scale privacy protection in Google Street View. In 2009 IEEE 12th International Conference on Computer Vision. IEEE, 23732380.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Peng Fei, Zhu Xiao-wen, and Long Min. 2013. An ROI privacy protection scheme for H. 264 video based on FMO and chaos. IEEE Transactions on Information Forensics and Security 8, 10 (2013), 16881699.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Chattopadhyay Ankur and Boult Terrance E.. 2007. PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP. In 2007 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Osadchy Margarita, Pinkas Benny, Jarrous Ayman, and Moskovich Boaz. 2010. SCiFI-a system for secure face identification. In 2010 IEEE Symposium on Security and Privacy. IEEE, 239254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Turk Matthew and Pentland Alex. 1991. Eigenfaces for recognition. Journal of Cognitive Neuroscience 3, 1 (1991), 7186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Qin Zhan, Yan Jingbo, Ren Kui, Chen Chang Wen, Wang Cong, and Fu Xinwen. 2014. Privacy-preserving outsourcing of image global feature detection. In 2014 IEEE Global Communications Conference. IEEE, 710715.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Erkin Zekeriya, Franz Martin, Guajardo Jorge, Katzenbeisser Stefan, Lagendijk Inald, and Toft Tomas. 2009. Privacy-preserving face recognition. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 235253.Google ScholarGoogle Scholar
  14. [14] Hsu Chao-Yung, Lu Chun-Shien, and Pei Soo-Chang. 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Transactions on Image Processing 21, 11 (2012), 45934607.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Nazari Sara, Moin Mohammad-Shahram, and Kanan Hamidreza Rashidy. 2016. A face template protection approach using chaos and GRP permutation. Security and Communication Networks 9, 18 (2016), 49574972.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Gross Ralph, Sweeney Latanya, Torre Fernando De la, and Baker Simon. 2006. Model-based face de-identification. In 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW’06). IEEE, 161161.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Wang Cong, Zhang Bingsheng, Ren Kui, and Roveda Janet M.. 2013. Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Transactions on Emerging Topics in Computing 1, 1 (2013), 166177.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Yuan Lin, Korshunov Pavel, and Ebrahimi Touradj. 2015. Privacy-preserving photo sharing based on a secure JPEG. In 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 185190.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Yu Jun, Zhang Baopeng, Kuang Zhengzhong, Lin Dan, and Fan Jianping. 2016. iPrivacy: Image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Transactions on Information Forensics and Security 12, 5 (2016), 10051016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Korshunov Pavel and Ebrahimi Touradj. 2013. Using face morphing to protect privacy. In 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance. IEEE, 208213.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Ma Kede, Zhang Weiming, Zhao Xianfeng, Yu Nenghai, and Li Fenghua. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8, 3 (2013), 553562.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Gomez-Barrero Marta, Rathgeb Christian, Galbally Javier, Fierrez Julian, and Busch Christoph. 2014. Protected facial biometric templates based on local Gabor patterns and adaptive Bloom filters. In 2014 22nd International Conference on Pattern Recognition. IEEE, 44834488.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Bitouk Dmitri, Kumar Neeraj, Dhillon Samreen, Belhumeur Peter, and Nayar Shree K.. 2008. Face swapping: Automatically replacing faces in photographs. In ACM SIGGRAPH 2008 papers. 18.Google ScholarGoogle Scholar
  24. [24] McPherson Richard, Shokri Reza, and Shmatikov Vitaly. 2016. Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408 (2016).Google ScholarGoogle Scholar
  25. [25] Du Liang, Yi Meng, Blasch Erik, and Ling Haibin. 2014. GARP-face: Balancing privacy protection and utility preservation in face de-identification. In IEEE International Joint Conference on Biometrics. IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Newton Elaine M., Sweeney Latanya, and Malin Bradley. 2005. Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge and Data Engineering 17, 2 (2005), 232243.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Huang Yonggang, Zhang Jun, Pan Lei, and Xiang Yang. 2018. Privacy protection in interactive content based image retrieval. IEEE Transactions on Dependable and Secure Computing 17, 3 (2018), 595607.Google ScholarGoogle Scholar
  28. [28] Feng Yi C., Yuen Pong C., and Jain Anil K.. 2009. A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security 5, 1 (2009), 103117.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Ito Izumi and Kiya Hitoshi. 2008. A new class of image registration for guaranteeing secure data management. In 2008 15th IEEE International Conference on Image Processing. IEEE, 269272.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Xia Zhihua, Jiang Leqi, Ma Xiaohe, Yang Wenyuan, Ji Puzhao, and Xiong Neal Naixue. 2019. A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial internet of things. IEEE Transactions on Industrial Informatics 16, 1 (2019), 629638.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Jiang Richard, Al-Maadeed Somaya, Bouridane Ahmed, Crookes Danny, and Celebi M. Emre. 2016. Face recognition in the scrambled domain via salience-aware ensembles of many kernels. IEEE Transactions on Information Forensics and Security 11, 8 (2016), 18071817.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Li Fagen, Wang Jiye, Zhou Yuyang, Jin Chunhua, and Islam S. K.. 2020. A heterogeneous user authentication and key establishment for mobile client–server environment. Wireless Networks 26, 2 (2020), 913924.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Sun Yi, Wang Xiaogang, and Tang Xiaoou. 2014. Deep learning face representation from predicting 10,000 classes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 18911898.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Schroff Florian, Kalenichenko Dmitry, and Philbin James. 2015. FaceNet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 815823.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Wen Yandong, Zhang Kaipeng, Li Zhifeng, and Qiao Yu. 2016. A discriminative feature learning approach for deep face recognition. In European Conference on Computer Vision. Springer, 499515.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Liu Weiyang, Wen Yandong, Yu Zhiding, and Yang Meng. 2016. Large-margin softmax loss for convolutional neural networks. In ICML, Vol. 2. 7.Google ScholarGoogle Scholar
  37. [37] Wang Hao, Wang Yitong, Zhou Zheng, Ji Xing, Gong Dihong, Zhou Jingchao, Li Zhifeng, and Liu Wei. 2018. CosFace: Large margin cosine loss for deep face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 52655274.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Deng Jiankang, Guo Jia, Xue Niannan, and Zafeiriou Stefanos. 2019. ArcFace: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 46904699.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Yang Ming-Hsuan. 2002. Kernal Eigenfaces vs. Kernal Fisherfaces: Face recognition using kernal methods, automatrix face and gesture recognition, 202. In Proceedings, Fourth IEEE International Conference on. 208213.Google ScholarGoogle Scholar
  40. [40] Yilmaz Alper and Gokmen Muhittin. 2000. Eigenhill vs. Eigenface and Eigenedge. In Proceedings 15th International Conference on Pattern Recognition. ICPR-2000, Vol. 2. IEEE, 827830.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Yang Jian, Zhang David, Frangi Alejandro F., and Yang Jing-yu. 2004. Two-dimensional PCA: A new approach to appearance-based face representation and recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 26, 1 (2004), 131137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Martinez Aleix M. and Kak Avinash C.. 2001. PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence 23, 2 (2001), 228233.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] He Xiaofei, Yan Shuicheng, Hu Yuxiao, Niyogi Partha, and Zhang Hong-Jiang. 2005. Face recognition using Laplacianfaces. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 3 (2005), 328340.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Yu Weiwei, Teng Xiaolong, and Liu Chongqing. 2006. Face recognition using discriminant locality preserving projections. Image and Vision Computing 24, 3 (2006), 239248.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Rius Juan M., Parrón Josep, Heldring Alexander, Tamayo José M., and Ubeda Eduard. 2008. Fast iterative solution of integral equations with method of moments and matrix decomposition algorithm–singular value decomposition. IEEE Transactions on Antennas and Propagation 56, 8 (2008), 23142324.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Karthik Kannan and Balaraman Harshit. 2017. Key independent encrypted face clustering. In 2017 IEEE International Conference on Industrial and Information Systems (ICIIS). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Feng Yi C. and Yuen Pong C.. 2011. Binary discriminant analysis for generating binary face template. IEEE Transactions on Information Forensics and Security 7, 2 (2011), 613624.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Maiorana Emanuele, Campisi Patrizio, Fierrez Julian, Ortega-Garcia Javier, and Neri Alessandro. 2010. Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 40, 3 (2010), 525538.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Zhang Huang, Zhang Fangguo, Cheng Rong, and Tian Haibo. 2019. Efficient obfuscation for CNF circuits and applications in cloud computing. Soft Computing 23, 6 (2019), 20612072.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Ng Pauline C. and Henikoff Steven. 2003. SIFT: Predicting amino acid changes that affect protein function. Nucleic Acids Research 31, 13 (2003), 38123814.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Qin Zhan, Yan Jingbo, Ren Kui, Chen Chang Wen, and Wang Cong. 2014. Towards efficient privacy-preserving image feature extraction in cloud computing. In Proceedings of the 22nd ACM International Conference on Multimedia. 497506.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Hsu Chao-Yung, Lu Chun-Shien, and Pei Soo-Chang. 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Transactions on Image Processing 21, 11 (2012), 45934607.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. [53] Hu Shengshan, Wang Qian, Wang Jingjun, Qin Zhan, and Ren Kui. 2016. Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Transactions on Image Processing 25, 7 (2016), 34113425.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Liang Dong, Gao Xinbo, Lu Wen, and He Lihuo. 2020. Deep multi-label learning for image distortion identification. Signal Processing 172 (2020), 107536.Google ScholarGoogle ScholarCross RefCross Ref
  55. [55] Li ChuMiao. 2022. A Survey on Image Deblurring. (2022). arxiv:cs.CV/2202.07456Google ScholarGoogle Scholar
  56. [56] Mi Yuxi, Huang Yuge, Ji Jiazhen, Liu Hongquan, Xu Xingkun, Ding Shouhong, and Zhou Shuigeng. 2022. DuetFace: Collaborative privacy-preserving face recognition via channel splitting in the frequency domain. In Proceedings of the 30th ACM International Conference on Multimedia. 67556764.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. [57] Wang Yinggui, Liu Jian, Luo Man, Yang Le, and Wang Li. 2022. Privacy-preserving face recognition in the frequency domain. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36. 25582566.Google ScholarGoogle ScholarCross RefCross Ref
  58. [58] Xie Yun, Li Peng, Nedjah Nadia, Gupta Brij B., Taniar David, and Zhang Jindan. 2022. Privacy protection framework for face recognition in edge-based Internet of Things. Cluster Computing (2022), 119.Google ScholarGoogle Scholar
  59. [59] Zhao Shan, Zhang Lefeng, and Xiong Ping. 2023. PriFace: A privacy-preserving face recognition framework under untrusted server. Journal of Ambient Intelligence and Humanized Computing (2023), 113.Google ScholarGoogle Scholar
  60. [60] Chamikara Mahawaga Arachchige Pathum, Bertok Peter, Khalil Ibrahim, Liu Dongxi, and Camtepe Seyit. 2020. Privacy preserving face recognition utilizing differential privacy. Computers & Security 97 (2020), 101951.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. [61] Xue Wanli, Shen Yiran, Luo Chengwen, Xu Weitao, Hu Wen, and Seneviratne Aruna. 2022. A differential privacy-based classification system for edge computing in IoT. Computer Communications 182 (2022), 117128.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. [62] Ji Jiazhen, Wang Huan, Huang Yuge, Wu Jiaxiang, Xu Xingkun, Ding Shouhong, Zhang ShengChuan, Cao Liujuan, and Ji Rongrong. 2022. Privacy-preserving face recognition with learnable privacy budgets in frequency domain. In Computer Vision–ECCV 2022: 17th European Conference, Tel Aviv, Israel, October 23–27, 2022, Proceedings, Part XII. Springer, 475491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. [63] Jiang Richard, Al-Maadeed Somaya, Bouridane Ahmed, Crookes Danny, and Celebi M. Emre. 2016. Face recognition in the scrambled domain via salience-aware ensembles of many kernels. IEEE Transactions on Information Forensics and Security 11, 8 (2016), 18071817.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. [64] Belhumeur Peter N., Hespanha Joao P., and Kriegman David J.. 1997. Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 7 (1997), 711720.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. [65] Hu Guosheng, Yang Yongxin, Yi Dong, Kittler Josef, Christmas William, Li Stan Z., and Hospedales Timothy. 2015. When face recognition meets with deep learning: An evaluation of convolutional neural networks for face recognition. In Proceedings of the IEEE International Conference on Computer Vision Workshops. 142150.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Johnson Charles Royal. 1970. Positive definite matrices. The American Mathematical Monthly 77, 3 (1970), 259264.Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Lee Daniel D. and Seung H. Sebastian. 1999. Learning the parts of objects by non-negative matrix factorization. Nature 401, 6755 (1999), 788791.Google ScholarGoogle ScholarCross RefCross Ref
  68. [68] Tao Xinbo Gao, Wen Lu, Dacheng, and Li Xuelong. 2010. Image quality assessment: A multiscale geometric analysis-based framework and examples. (2010).Google ScholarGoogle Scholar
  69. [69] Hernandez-Ortega Javier, Galbally Javier, Fierrez Julian, Haraksim Rudolf, and Beslay Laurent. 2019. FaceQNet: Quality assessment for face recognition based on deep learning. In 2019 International Conference on Biometrics (ICB). IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref
  70. [70] Nisa Auliati, Fajri Radhiyatul, Nashrullah Erwin, Harahap Fandy, Prihantoro Junanto, Wibowanto Gembong, Muliadi Jemie, and Nugroho Anto. 2022. Performance face image quality assessment under the difference of illumination directions in face recognition system using FaceQNet, SDD-FIQA, and SER-FIQ. In The 2022 International Conference on Computer, Control, Informatics and Its Applications. 219223.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. [71] Fu Biying, Kirchbuchner Florian, and Damer Naser. 2021. The effect of wearing a face mask on face image quality. In 2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021). IEEE, 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Okcu Sefa Burak, Özkalaycı Burak Oğuz, and Çığla Cevahir. 2020. An efficient method for face quality assessment on the edge. In Computer Vision–ECCV 2020 Workshops: Glasgow, UK, August 23–28, 2020, Proceedings, Part V 16. Springer, 5470.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. [73] Yu K.-B.. 1991. Recursive updating the eigenvalue decomposition of a covariance matrix. IEEE Transactions on Signal Processing 39, 5 (1991), 11361145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Vadhan Salil. 2017. The complexity of differential privacy. Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (2017), 347450.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Papadimitriou Christos H.. 2003. Computational complexity. In Encyclopedia of Computer Science. 260265.Google ScholarGoogle Scholar
  76. [76] Williams Gareth. 2017. Linear Algebra with Applications. Jones & Bartlett Learning.Google ScholarGoogle Scholar

Index Terms

  1. Eyes See Hazy while Algorithms Recognize Who You Are

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Privacy and Security
          ACM Transactions on Privacy and Security  Volume 27, Issue 1
          February 2024
          369 pages
          ISSN:2471-2566
          EISSN:2471-2574
          DOI:10.1145/3613489
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 January 2024
          • Online AM: 10 November 2023
          • Accepted: 1 November 2023
          • Revised: 11 July 2023
          • Received: 24 May 2022
          Published in tops Volume 27, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
        • Article Metrics

          • Downloads (Last 12 months)154
          • Downloads (Last 6 weeks)26

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text