{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:12:06Z","timestamp":1725905526911},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319633145"},{"type":"electronic","value":"9783319633152"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63315-2_48","type":"book-chapter","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T08:48:34Z","timestamp":1500540514000},"page":"548-559","source":"Crossref","is-referenced-by-count":0,"title":["Image Firewall for Filtering Privacy or Sensitive Image Content Based on Joint Sparse Representation"],"prefix":"10.1007","author":[{"given":"Zhan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ning","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Donghui","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xiaoxia","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhong-qiu","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,21]]},"reference":[{"issue":"3","key":"48_CR1","first-page":"52","volume":"51","author":"LI Smith","year":"2002","unstructured":"Smith, L.I.: A tutorial on principal components analysis. Inf. Fusion 51(3), 52 (2002)","journal-title":"Inf. Fusion"},{"issue":"10","key":"48_CR2","doi-asserted-by":"crossref","first-page":"4349","DOI":"10.1109\/TIP.2012.2205006","volume":"21","author":"XT Yuan","year":"2012","unstructured":"Yuan, X.T., Liu, X., Yan, S.: Visual classification with multitask joint sparse representation. IEEE Trans. Image Process. Publ. IEEE Sig. Process. Soc. 21(10), 4349\u20134360 (2012)","journal-title":"IEEE Trans. Image Process. Publ. IEEE Sig. Process. Soc."},{"doi-asserted-by":"crossref","unstructured":"Hu, D., et al.: A framework of privacy decision recommendation for image sharing in online social networks. In: IEEE First International Conference on Data Science in Cyberspace IEEE Computer Society, pp. 243\u2013251 (2016)","key":"48_CR3","DOI":"10.1109\/DSC.2016.100"},{"issue":"1","key":"48_CR4","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1137\/080716542","volume":"2","author":"A Beck","year":"2009","unstructured":"Beck, A., Teboulle, M.: A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIAM J. Imaging Sci. 2(1), 183\u2013202 (2009)","journal-title":"SIAM J. Imaging Sci."},{"issue":"8","key":"48_CR5","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1002\/cpa.20124","volume":"59","author":"EJ Cand\u00e8s","year":"2005","unstructured":"Cand\u00e8s, E.J., Romberg, J.K., Tao, T.: Stable signal recovery from incomplete and inaccurate measurements. Commun. Pure Appl. Math. 59(8), 1207\u20131223 (2005)","journal-title":"Commun. Pure Appl. Math."},{"issue":"2","key":"48_CR6","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TPAMI.2008.79","volume":"31","author":"J Wright","year":"2009","unstructured":"Wright, J., et al.: Robust face recognition via sparse representation. IEEE Trans. Pattern Anal. Mach. Intell. 31(2), 210 (2009)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"48_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1137\/090756855","volume":"4","author":"S Becker","year":"2009","unstructured":"Becker, S., Bobin, J., Cand\u00e8s, E.J.: NESTA: a fast and accurate first-order method for sparse recovery. SIAM J. Imaging Sci. 4(1), 1\u201339 (2009)","journal-title":"SIAM J. Imaging Sci."},{"doi-asserted-by":"publisher","unstructured":"Hu, X., et al.: How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control. Multimedia Tools Appl. 1\u201323 (2017). doi:\n            10.1007\/s11042-017-4402-x","key":"48_CR8","DOI":"10.1007\/s11042-017-4402-x"},{"doi-asserted-by":"crossref","unstructured":"Lazebnik, S., Schmid, C., Ponce, J.: Beyond bags of features: spatial pyramid matching for recognizing natural scene categories. In: 2006 IEEE Computer Society Conference on IEEE Computer Vision and Pattern Recognition, pp. 2169\u20132178 (2006)","key":"48_CR9","DOI":"10.1109\/CVPR.2006.68"},{"unstructured":"Yang, J., et al.: Linear spatial pyramid matching using sparse coding for image classification, pp. 1794\u20131801 (2009)","key":"48_CR10"},{"doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Locality-constrained linear coding for image classification. In: Computer Vision and Pattern Recognition IEEE, pp. 3360\u20133367 (2010)","key":"48_CR11","DOI":"10.1109\/CVPR.2010.5540018"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63315-2_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T09:02:32Z","timestamp":1500541352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63315-2_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633145","9783319633152"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63315-2_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}