{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T13:10:03Z","timestamp":1749561003413,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319448046"},{"type":"electronic","value":"9783319448053"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44805-3_25","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T01:03:04Z","timestamp":1472000584000},"page":"314-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Revocable Anonymisation in Video Surveillance: A \u201cDigital Cloak of Invisibility\u201d"],"prefix":"10.1007","author":[{"given":"Linus","family":"Feiten","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sebastian","family":"Sester","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Zimmermann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sebastian","family":"Volkmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laura","family":"Wehle","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bernd","family":"Becker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"25_CR1","unstructured":"Gesetzentwurf Bundesregierung Drucksache 461\/00, 18 August 2000. http:\/\/dipbt.bundestag.de\/doc\/brd\/2000\/D461+00.pdf"},{"issue":"2","key":"25_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/JPROC.2005.862423","volume":"94","author":"R Anderson","year":"2006","unstructured":"Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors - a survey. Proc. IEEE 94(2), 357\u2013369 (2006)","journal-title":"Proc. IEEE"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Andriluka, M., Roth, S., Schiele, B.: Pictorial structures revisited: people detection and articulated pose estimation. In: Essa, I., Kang, S.B., Pollefeys, M. (eds.) Proceedings of Computer Vision and Pattern Recognition (CVPR), pp. 1014\u20131021. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206754"},{"key":"25_CR4","volume-title":"Resilienz in der offenen Gesellschaft","author":"B Becker","year":"2012","unstructured":"Becker, B., M\u00fcller, G., Polian, I.: Digital tarnkappe: stealth technology for the internet of things. In: Gander, H.H., Perron, W., Poscher, R., Riescher, G., W\u00fcrtenberger, T. (eds.) Resilienz in der offenen Gesellschaft. Nomos, Glash\u00fctte (2012)"},{"key":"25_CR5","unstructured":"Becker, T.: Kommentar zum BDSG sowie Datenschutzbestimmungen des TMG und TKG, 1st edn. Verlag Dr. Otto Schmidt (2013). Kai-Uwe Plath"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Benenson, R., Mathias, M., Timofte, R., Gool, L.V.: Pedestrian detection at 100 frames per second. In: Belongie, S., Blake, A., Luo, J., Yuille, A. (eds.) Proceedings of Computer Vision and Pattern Recognition (CVPR), pp. 2903\u20132910. IEEE (2012)","DOI":"10.1109\/CVPR.2012.6248017"},{"key":"25_CR7","first-page":"5:1","volume":"2009","author":"P Carrillo","year":"2009","unstructured":"Carrillo, P., Kalva, H., Magliveras, S.: Compression independent reversible encryption for privacy in video surveillance. EURASIP J. Inf. Secur. 2009, 5:1\u20135:13 (2009)","journal-title":"EURASIP J. Inf. Secur."},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-1-84882-301-3_2","volume-title":"Protecting Privacy in Video Surveillance","author":"SC Cheung","year":"2009","unstructured":"Cheung, S.C., Venkatesh, M., Paruchuri, J., Zhao, J., Nguyen, T.: Protecting and managing privacy information in video surveillance systems. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 11\u201333. Springer, London (2009). http:\/\/dx.doi.org\/10.1007\/978-1-84882-301-3_2"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-319-02895-8_2","volume-title":"Advanced Concepts for Intelligent Vision Systems","author":"J Cichowski","year":"2013","unstructured":"Cichowski, J., Czy\u017cewski, A., Kostek, B.: Visual data encryption for privacy enhancement in surveillance systems. In: Blanc-Talon, J., Kasinski, A., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2013. LNCS, vol. 8192, pp. 13\u201324. Springer, Heidelberg (2013)"},{"issue":"15","key":"25_CR10","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.1016\/j.patrec.2006.02.018","volume":"27","author":"R Cucchiara","year":"2006","unstructured":"Cucchiara, R., Prati, A., Vezzani, R.: A system for automatic face obscuration for privacy purposes. Pattern Recogn. Lett. 27(15), 1809\u20131815 (2006). Vision for Crime Detection and Prevention","journal-title":"Pattern Recogn. Lett."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: Schmid, C., Soatto, S., Tomasi, C. (eds.) Proceedings of Computer Vision and Pattern Recognition (CVPR), pp. 886\u2013893. IEEE (2005)","DOI":"10.1109\/CVPR.2005.177"},{"key":"25_CR12","volume-title":"Allgemeines Verwaltungsrecht","author":"S Detterbeck","year":"2010","unstructured":"Detterbeck, S.: Allgemeines Verwaltungsrecht, 8th edn. Verlag C. H. Beck, Munich (2010)","edition":"8"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Schmid, C., Soatto, S., Tomasi, C. (eds.) Proceedings of Computer Vision and Pattern Recognition (CVPR), Workshop Privacy Research in Vision (PRIV), pp. 160\u2013160, June 2006","DOI":"10.1109\/CVPRW.2006.184"},{"key":"25_CR14","unstructured":"European Commission: Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Procedure 2012\/0010\/COD (2012). http:\/\/ec.europa.eu\/justice\/data-protection\/document\/review2012\/com_2012_11_en.pdf"},{"key":"25_CR15","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674332485","volume-title":"An Anatomy of Values","author":"C Fried","year":"1970","unstructured":"Fried, C.: An Anatomy of Values. Harvard University Press, Cambridge (1970)"},{"volume-title":"Vision Assessment: Shaping Technology in 21st Century Society Towards a Repertoire for Technology Assessment","year":"2000","key":"25_CR16","unstructured":"Grin, J., Grunwald, A. (eds.): Vision Assessment: Shaping Technology in 21st Century Society Towards a Repertoire for Technology Assessment. Springer, Heidelberg (2000)"},{"key":"25_CR17","unstructured":"Huber, M., M\u00fcller-Quade, J., Nilges, T., Thal, C.: A provably privacy preserving video surveillance architecture for an assisted living community. In: 44. Jahrestagung der Gesellschaft f\u00fcr Informatik, Informatik 2014, Big Data - Komplexit\u00e4t meistern, 22\u201326 September 2014, Stuttgart, Deutschland, pp. 563\u2013574 (2014)"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Leykin, A., Hammoud, R.: Real-time estimation of human attention field in LWIR and color surveillance videos. In: Proceedings of Workshop on Object Tracking and Classification Beyond the Visible Spectrum (OTCBVS), pp. 1\u20136. IEEE (2008)","DOI":"10.1109\/CVPRW.2008.4563059"},{"key":"25_CR19","unstructured":"Liu, X., Krahnstoever, N., Yu, T., Tu, P.: What are customers looking at? In: Macq, B. (ed.) Proceedings of Advanced Video and Signal based Surveillance (AVSS), pp. 405\u2013410. IEEE (2007)"},{"issue":"9","key":"25_CR20","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1016\/j.eswa.2015.01.041","volume":"42","author":"JR Padilla-Lopez","year":"2015","unstructured":"Padilla-Lopez, J.R., Chaaraoui, A.A., Florez-Revuelta, F.: Visual privacy protection methods: a survey. Expert Syst. Appl. 42(9), 4177\u20134195 (2015)","journal-title":"Expert Syst. Appl."},{"key":"25_CR21","volume-title":"National Security Issues","author":"DD Pegarkov","year":"2006","unstructured":"Pegarkov, D.D.: National Security Issues. Nova Publishers, New York (2006)"},{"key":"25_CR22","unstructured":"Petermann, T.: Technikfolgen-Absch\u00e4tzung - Konstituierung und Ausdifferenzierung eines Leitbilds. In: Br\u00f6chler, S., Simonis, G., Sundermann, K. (eds.) Handbuch Technikfolgenabsch\u00e4tzung, pp. 17\u201349. Edition Sigma (1999)"},{"key":"25_CR23","first-page":"65","volume-title":"Introduction to Hardware Security and Trust","author":"U Ruhrmair","year":"2011","unstructured":"Ruhrmair, U., Devadas, S., Koushanfar, F.: Security based on physical unclonability and disorder. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust, pp. 65\u2013102. Springer, New York (2011). chap. 4"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: Henderson, T.C. (ed.) Proceedings of Intelligent Robots and Systems, pp. 971\u2013978, October 2007","DOI":"10.1109\/IROS.2007.4399122"},{"issue":"3","key":"25_CR25","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2005.65","volume":"3","author":"A Senior","year":"2005","unstructured":"Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50\u201357 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"25_CR26","first-page":"27","volume-title":"Introduction to Hardware Security and Trust","author":"Z Shi","year":"2011","unstructured":"Shi, Z., Ma, C., Cote, J., Wang, B.: Hardware implementation of hash functions. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust, pp. 27\u201350. Springer, New York (2011). chap. 2"},{"key":"25_CR27","volume-title":"Angriff auf die Freiheit: Sicherheitswahn: \u00dcberwachungsstaat und der Abbau b\u00fcrgerlicher Rechte","author":"I Trojanow","year":"2009","unstructured":"Trojanow, I., Zeh, J.: Angriff auf die Freiheit: Sicherheitswahn: \u00dcberwachungsstaat und der Abbau b\u00fcrgerlicher Rechte. Hanser, Munich (2009)"},{"key":"25_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-15567-3_14","volume-title":"Computer Vision \u2013 ECCV 2010","author":"S Walk","year":"2010","unstructured":"Walk, S., Schindler, K., Schiele, B.: Disparity statistics for pedestrian detection: combining appearance, motion and stereo. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010, Part VI. LNCS, vol. 6316, pp. 182\u2013195. Springer, Heidelberg (2010)"}],"container-title":["IFIP Advances in Information and Communication Technology","Technology and Intimacy: Choice or Coercion"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44805-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T12:47:57Z","timestamp":1749559677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44805-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319448046","9783319448053"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44805-3_25","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}