{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:UPO56CHILIPQHUFZYMJPOK62UP","short_pith_number":"pith:UPO56CHI","canonical_record":{"source":{"id":"1811.07335","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-11-18T14:53:49Z","cross_cats_sorted":["cs.CV"],"title_canon_sha256":"a803b66e0b76a74bf528046ae8939df6d673274a59071abad87b952d1e1efa8a","abstract_canon_sha256":"37a571f3ba0a90e9dee6699567f69f0c932b8dc4fd99cb68b6c47b625a1a61bf"},"schema_version":"1.0"},"canonical_sha256":"a3dddf08e85a1f03d0b9c312f72bdaa3e2c6bb818e6d2a4fca629cde384a6a27","source":{"kind":"arxiv","id":"1811.07335","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1811.07335","created_at":"2026-05-18T00:00:28Z"},{"alias_kind":"arxiv_version","alias_value":"1811.07335v1","created_at":"2026-05-18T00:00:28Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1811.07335","created_at":"2026-05-18T00:00:28Z"},{"alias_kind":"pith_short_12","alias_value":"UPO56CHILIPQ","created_at":"2026-05-18T12:32:56Z"},{"alias_kind":"pith_short_16","alias_value":"UPO56CHILIPQHUFZ","created_at":"2026-05-18T12:32:56Z"},{"alias_kind":"pith_short_8","alias_value":"UPO56CHI","created_at":"2026-05-18T12:32:56Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:UPO56CHILIPQHUFZYMJPOK62UP","target":"record","payload":{"canonical_record":{"source":{"id":"1811.07335","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-11-18T14:53:49Z","cross_cats_sorted":["cs.CV"],"title_canon_sha256":"a803b66e0b76a74bf528046ae8939df6d673274a59071abad87b952d1e1efa8a","abstract_canon_sha256":"37a571f3ba0a90e9dee6699567f69f0c932b8dc4fd99cb68b6c47b625a1a61bf"},"schema_version":"1.0"},"canonical_sha256":"a3dddf08e85a1f03d0b9c312f72bdaa3e2c6bb818e6d2a4fca629cde384a6a27","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:00:28.243208Z","signature_b64":"fQskGc1qaq/VjmjQ4ZgXqDYiBdowSHKB1nbwv0QHkgEIO6XKh0Mo0vfjn30sa5irbj3L/YlyzXexhdHB/7QoAw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a3dddf08e85a1f03d0b9c312f72bdaa3e2c6bb818e6d2a4fca629cde384a6a27","last_reissued_at":"2026-05-18T00:00:28.242573Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:00:28.242573Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1811.07335","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:00:28Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"MD4ZhMN8ObJspj5zF40jz2flagIHnbybs2MpXyr12zgYLDFIKcxHIiFWRe273p2ZKm1fKMPVfDA6AT9DQ94MBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T03:51:24.615866Z"},"content_sha256":"083bd51f81c9e3efd0bdb66ff143105736a33a2675eb746949203140c1d4dbfa","schema_version":"1.0","event_id":"sha256:083bd51f81c9e3efd0bdb66ff143105736a33a2675eb746949203140c1d4dbfa"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:UPO56CHILIPQHUFZYMJPOK62UP","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Distribution Discrepancy Maximization for Image Privacy Preserving","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CV"],"primary_cat":"cs.CR","authors_text":"Jianxin Lin, Sen Liu, Zhibo Chen","submitted_at":"2018-11-18T14:53:49Z","abstract_excerpt":"With the rapid increase in online photo sharing activities, image obfuscation algorithms become particularly important for protecting the sensitive information in the shared photos. However, existing image obfuscation methods based on hand-crafted principles are challenged by the dramatic development of deep learning techniques. To address this problem, we propose to maximize the distribution discrepancy between the original image domain and the encrypted image domain. Accordingly, we introduce a collaborative training scheme: a discriminator $D$ is trained to discriminate the reconstructed im"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1811.07335","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:00:28Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"tfPIep7g8/wpL0FomwWhq2+yuJNs1UBmc7sGE6S/iIksq5n1ne9vDkcissqD8XG3wrBFc6NPLeYTivpmp5L6DA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T03:51:24.616498Z"},"content_sha256":"24ff9d64167e6fc26e645fa74aee603b1943c5641c341dd462dfedf3b36f4a0a","schema_version":"1.0","event_id":"sha256:24ff9d64167e6fc26e645fa74aee603b1943c5641c341dd462dfedf3b36f4a0a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/UPO56CHILIPQHUFZYMJPOK62UP/bundle.json","state_url":"https://pith.science/pith/UPO56CHILIPQHUFZYMJPOK62UP/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/UPO56CHILIPQHUFZYMJPOK62UP/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T03:51:24Z","links":{"resolver":"https://pith.science/pith/UPO56CHILIPQHUFZYMJPOK62UP","bundle":"https://pith.science/pith/UPO56CHILIPQHUFZYMJPOK62UP/bundle.json","state":"https://pith.science/pith/UPO56CHILIPQHUFZYMJPOK62UP/state.json","well_known_bundle":"https://pith.science/.well-known/pith/UPO56CHILIPQHUFZYMJPOK62UP/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:UPO56CHILIPQHUFZYMJPOK62UP","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"37a571f3ba0a90e9dee6699567f69f0c932b8dc4fd99cb68b6c47b625a1a61bf","cross_cats_sorted":["cs.CV"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-11-18T14:53:49Z","title_canon_sha256":"a803b66e0b76a74bf528046ae8939df6d673274a59071abad87b952d1e1efa8a"},"schema_version":"1.0","source":{"id":"1811.07335","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1811.07335","created_at":"2026-05-18T00:00:28Z"},{"alias_kind":"arxiv_version","alias_value":"1811.07335v1","created_at":"2026-05-18T00:00:28Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1811.07335","created_at":"2026-05-18T00:00:28Z"},{"alias_kind":"pith_short_12","alias_value":"UPO56CHILIPQ","created_at":"2026-05-18T12:32:56Z"},{"alias_kind":"pith_short_16","alias_value":"UPO56CHILIPQHUFZ","created_at":"2026-05-18T12:32:56Z"},{"alias_kind":"pith_short_8","alias_value":"UPO56CHI","created_at":"2026-05-18T12:32:56Z"}],"graph_snapshots":[{"event_id":"sha256:24ff9d64167e6fc26e645fa74aee603b1943c5641c341dd462dfedf3b36f4a0a","target":"graph","created_at":"2026-05-18T00:00:28Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"With the rapid increase in online photo sharing activities, image obfuscation algorithms become particularly important for protecting the sensitive information in the shared photos. However, existing image obfuscation methods based on hand-crafted principles are challenged by the dramatic development of deep learning techniques. To address this problem, we propose to maximize the distribution discrepancy between the original image domain and the encrypted image domain. Accordingly, we introduce a collaborative training scheme: a discriminator $D$ is trained to discriminate the reconstructed im","authors_text":"Jianxin Lin, Sen Liu, Zhibo Chen","cross_cats":["cs.CV"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-11-18T14:53:49Z","title":"Distribution Discrepancy Maximization for Image Privacy Preserving"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1811.07335","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:083bd51f81c9e3efd0bdb66ff143105736a33a2675eb746949203140c1d4dbfa","target":"record","created_at":"2026-05-18T00:00:28Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"37a571f3ba0a90e9dee6699567f69f0c932b8dc4fd99cb68b6c47b625a1a61bf","cross_cats_sorted":["cs.CV"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-11-18T14:53:49Z","title_canon_sha256":"a803b66e0b76a74bf528046ae8939df6d673274a59071abad87b952d1e1efa8a"},"schema_version":"1.0","source":{"id":"1811.07335","kind":"arxiv","version":1}},"canonical_sha256":"a3dddf08e85a1f03d0b9c312f72bdaa3e2c6bb818e6d2a4fca629cde384a6a27","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"a3dddf08e85a1f03d0b9c312f72bdaa3e2c6bb818e6d2a4fca629cde384a6a27","first_computed_at":"2026-05-18T00:00:28.242573Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:00:28.242573Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"fQskGc1qaq/VjmjQ4ZgXqDYiBdowSHKB1nbwv0QHkgEIO6XKh0Mo0vfjn30sa5irbj3L/YlyzXexhdHB/7QoAw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:00:28.243208Z","signed_message":"canonical_sha256_bytes"},"source_id":"1811.07335","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:083bd51f81c9e3efd0bdb66ff143105736a33a2675eb746949203140c1d4dbfa","sha256:24ff9d64167e6fc26e645fa74aee603b1943c5641c341dd462dfedf3b36f4a0a"],"state_sha256":"6ff395d406c153cda74a24bb89bf2dfd9707b21ee33573845807fcaa82994949"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ix7rSHww0JmigYvLBPVx7HRf6JpKNcjC27zTpbJ9OQ2Feh0PEik4hEbmazY0jyn79anXNxgwnAnuPmUWNxhtDg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T03:51:24.620200Z","bundle_sha256":"3a6b99080a7f54aca779ed2bc949bdc7bac9744e854ae303c13557ef7974a69b"}}