{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:49:18Z","timestamp":1742986158860,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319267616"},{"type":"electronic","value":"9783319267623"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26762-3_21","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T10:37:42Z","timestamp":1448966262000},"page":"235-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Smart Privacy Visor: Bridging the Privacy Gap"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Dabrowski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar R.","family":"Weippl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,12,2]]},"reference":[{"key":"21_CR1","unstructured":"Harvey, A.: CV Dazzle (2010\u20132012) http:\/\/cvdazzle.com\/ and http:\/\/ahprojects.com\/projects\/cv-dazzle. Accessed 2 November 2014"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Yamada, T., Gohshi, S., Echizen, I.: Use of invisible noise signals to prevent privacy invasion through face recognition from camera images. In: Proceedings of the 20th ACM International Conference on Multimedia, MM 2012, pp. 1315\u20131316. ACM (2012)","DOI":"10.1145\/2393347.2396460"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-40779-6_13","volume-title":"Communications and Multimedia Security","author":"T Yamada","year":"2013","unstructured":"Yamada, T., Gohshi, S., Echizen, I.: Privacy visor: method for preventing face image detection by using differences in human and device sensitivity. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 152\u2013161. Springer, Heidelberg (2013)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Yamada, T., Gohshi, S., Echizen, I.: Privacy visor: method based on light absorbing and reflecting properties for preventing face image detection. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2013)","DOI":"10.1109\/SMC.2013.271"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-1-84882-301-3_11","volume-title":"Protecting Privacy in Video Surveillance","author":"SN Patel","year":"2009","unstructured":"Patel, S.N., Summet, J.W., Truong, K.N.: Blindspot: creating capture-resistant spaces. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 185\u2013201. Springer, London (2009)"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-1-84882-301-3_5","volume-title":"Protecting Privacy in Video Surveillance","author":"J Schiff","year":"2009","unstructured":"Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65\u201389. Springer, London (2009)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Weippl, E.R., Echizen, I.: Framework based on privacy policy hiding for preventing unauthorized face image processing. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2013)","DOI":"10.1109\/SMC.2013.83"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Pallas, F., Ulbricht, M.R., Jaume-Palas\u00ed, L., H\u00f6ppner, U.: Offlinetags: a novel privacy approach to online photo sharing. In: CHI 2014 Extended Abstracts on Human Factors in Computing Systems, pp. 2179\u20132184. ACM (2014)","DOI":"10.1145\/2559206.2581195"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/978-3-642-21827-9_52","volume-title":"Modern Approaches in Applied Intelligence","author":"MS Barhm","year":"2011","unstructured":"Barhm, M.S., Qwasmi, N., Qureshi, F.Z., El-Khatib, K.: Negotiating privacy preferences in video surveillance systems. In: Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K., Ali, M. (eds.) IEA\/AIE 2011, Part II. LNCS, vol. 6704, pp. 511\u2013521. Springer, Heidelberg (2011)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Henne, B., Szongott, C., Smith, M.: Snapme if you can: privacy threats of other peoples\u2019 geo-tagged media and what we can do about it. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 95\u2013106. ACM (2013)","DOI":"10.1145\/2462096.2462113"},{"key":"21_CR11","unstructured":"Brassil, J.: Using mobile communications to assert privacy from video surveillance. In: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, p. 8. IEEE (2005)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Yus, R., Pappachan, P., Das, P.K., Mena, E., Joshi, A., Finin, T.: Demo: Faceblock: privacy-aware pictures for google glass. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services. ACM (2014)","DOI":"10.1145\/2594368.2601473"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48\u201355. ACM (2004)","DOI":"10.1145\/1027527.1027537"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-77409-9_14","volume-title":"Advances in Multimedia Modeling","author":"K Chinomi","year":"2008","unstructured":"Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. In: Satoh, S., Nack, F., Etoh, M. (eds.) MMM 2008. LNCS, vol. 4903, pp. 144\u2013154. Springer, Heidelberg (2008)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Moon, H.M., Seo, C.H., Chung, Y., Pan, S.B.: Privacy protection technology in video surveillance system. In: 4th International Conference on Embedded and Multimedia Computing, EM-Com 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/EM-COM.2009.5402973"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Ashok, A., Nguyen, V., Gruteser, M., Mandayam, N., Yuan, W., Dana, K.: Do not share! invisible light beacons for signaling preferences to privacy-respecting cameras. In: Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, pp. 39\u201344. ACM (2014)","DOI":"10.1145\/2643164.2643168"},{"key":"21_CR17","unstructured":"Koster, M.: A Standard for Robot Exclusion. http:\/\/www.robotstxt.org\/orig.html. Accessed 15 July 2015"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Lin, D., Tang, X.: Quality-driven face occlusion detection and recovery. In: Computer Vision and Pattern Recognition, CVPR 2007, pp. 1\u20137. IEEE (2007)","DOI":"10.1109\/CVPR.2007.383052"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Mo, Z., Lewis, J.P., Neumann, U.: Face inpainting with local linear representations. In: BMVC, pp. 1\u201310 (2004)","DOI":"10.5244\/C.18.37"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1007\/978-3-540-74549-5_73","volume-title":"Advances in Biometrics","author":"B-W Hwang","year":"2007","unstructured":"Hwang, B.-W., Lee, S.-W.: Reconstructing a whole face image from a partially damaged or occluded image by multiple matching. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 692\u2013701. Springer, Heidelberg (2007)"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-319-19321-2_39","volume-title":"Digital-Forensics and Watermarking","author":"AE Jimenez","year":"2015","unstructured":"Jimenez, A.E., Dabrowski, A., Sonehara, N., Martinez, J.M.M., Echizen, I.: Tag detection for preventing unauthorized face image processing. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 513\u2013524. Springer, Heidelberg (2015)"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26762-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T18:07:22Z","timestamp":1697911642000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-26762-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319267616","9783319267623"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26762-3_21","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"2 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2015","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2015","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2015","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11169","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}