{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:49:01Z","timestamp":1755838141887},"publisher-location":"London","reference-count":10,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781848823006"},{"type":"electronic","value":"9781848823013"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-1-84882-301-3_11","type":"book-chapter","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T07:14:35Z","timestamp":1246432475000},"page":"185-201","source":"Crossref","is-referenced-by-count":15,"title":["BlindSpot: Creating Capture-Resistant Spaces"],"prefix":"10.1007","author":[{"given":"Shwetak N.","family":"Patel","sequence":"first","affiliation":[]},{"given":"Jay W.","family":"Summet","sequence":"additional","affiliation":[]},{"given":"Khai N.","family":"Truong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"1. Art. 29 Data Protection Working Party. (2004) Opinion 4\/2004 on the Processing of Personal Data by means of Video Surveillance. Document 11750\/02\/EN WP89, European Commission, http:\/\/europa.eu.int\/comm"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"2. Brassil J. (2005) Using Mobile Communications to Assert Privacy from Video Surveillance. Presented at the 1st International Workshop on Security in Systems and Networks 2005.","DOI":"10.1109\/IPDPS.2005.447"},{"key":"11_CR3","unstructured":"3. Chung J. (2004) Threat of Subway Photo Ban Riseth Again. Gothamist, November 30, 2004."},{"key":"11_CR4","unstructured":"4. Eagle Eye. (1997) Bulletin of the Connecticut Academy of Science and Engineering. Vol. 12, No. 2."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"5. Halderman J.A, Waters B. and Felten E.W. (2004) Privacy Management for Portable Recording Devices. In the Proceedings of WPES 2004: 16\u201324.","DOI":"10.1145\/1029179.1029183"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"6. Haro, A., Flickner, M., Essa, I.A. (2000) Detecting and Tracking Eyes by Using Their Physiological Properties, Dynamics, and Appearance. In the proceedings of CVPR 2000: 1163\u20131168.","DOI":"10.1109\/CVPR.2000.855815"},{"key":"11_CR7","unstructured":"7. Iceberg\u2019s Safe Haven. http:\/\/www.iceberg-ip.com\/index.htm"},{"key":"11_CR8","unstructured":"8. Pilu, M. (2007). Detector for Use with Data Encoding Pattern. United States Patent Application. 20070085842, April 19, 2007."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"9. Video Voyeurism Prevention Act of 2004. (2004) 18 USC 1801.","DOI":"10.1016\/S1353-4858(04)00039-X"},{"key":"11_CR10","unstructured":"10. Wagstaff J. (2004) Using Bluetooth to Disable Camera Phones, http:\/\/loosewire.typepad.com\/blog\/2004\/09\/using_bluetooth.html"}],"container-title":["Protecting Privacy in Video Surveillance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-84882-301-3_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T20:01:40Z","timestamp":1605729700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-84882-301-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9781848823006","9781848823013"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-1-84882-301-3_11","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}