{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:04:34Z","timestamp":1743138274433,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_11","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T06:43:16Z","timestamp":1505198596000},"page":"183-201","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Dashcam \u2013 Towards Lawful Use of\u00a0Dashcams Through Enforcement of External Anonymization"],"prefix":"10.1007","author":[{"given":"Paul","family":"Wagner","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Birnstill","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Krempel","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Bretthauer","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Beyerer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Birnstill, P., Ren, D., Beyerer, J.: A user study on anonymization techniques for smart video surveillance. In: 2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/AVSS.2015.7301805"},{"key":"11_CR2","unstructured":"Bretthauer, S., Krempel, E.: Videomonitoring zur sturzdetektion und alarmierung - eine technische und rechtliche analyse. In: Schweighofer, E., Kummer, F., Htzendorfer, W. (eds.) Transparenz - Tagungsband des 17. Internationalen Rechtsinformatik Symposions. pp. 525\u2013534 (2014)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Bretthauer, S., Krempel, E., Birnstill, P.: Intelligente videoberwachnug in kranken- und pflegeeinrichtungen von morgen. Computer und Recht pp. 239\u2013245 (2015)","DOI":"10.9785\/cr-2015-0406"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Dufaux, F.: Video scrambling for privacy protection in video surveillance: recent results and validation framework. In: Proceeding of SPIE, vol. 8063, pp. 806302\u2013806302-14 (2011). https:\/\/dx.doi.org\/10.1117\/12.883948","DOI":"10.1117\/12.883948"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Dufaux, F., Ebrahimi, T.: Region-based transform-domain video scrambling. In: Proceeding of SPIE, vol. 6077, pp. 60771U\u201360771U-9 (2006). https:\/\/dx.doi.org\/10.1117\/12.643048","DOI":"10.1117\/12.643048"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Ernst, S.: Zur un-zulssigkeit von dashcams. Computer und Recht pp. 620\u2013624 (2015)","DOI":"10.9785\/cr-2015-0910"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Harvan, M., Pretschner, A.: State-based usage control enforcement with data flow tracking using system call interposition. In: 2009 Third International Conference on Network and System Security, NSS 2009, pp. 373\u2013380. IEEE (2009)","DOI":"10.1109\/NSS.2009.51"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Hosang, J., Omran, M., Benenson, R., Schiele, B.: Taking a deeper look at pedestrians. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp. 4073\u20134082 (2015)","DOI":"10.1109\/CVPR.2015.7299034"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Janard, K., Marurngsith, W.: Accelerating real-time face detection on a raspberry pi telepresence robot. In: Proceedings of the Fifth International Conference on Innovative Computing Technology, INTECH 2015, pp. 136\u2013141 (May 2015)","DOI":"10.1109\/INTECH.2015.7173482"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Korshunov, P., Ebrahimi, T.: Using warping for privacy protection in video surveillance. In: 2013 18th International Conference on Digital Signal Processing (DSP), pp. 1\u20136 (July 2013)","DOI":"10.1109\/ICDSP.2013.6622791"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R.: Towards usage control models: Beyond traditional access control. In: Proceedings of 7th ACM Symposium on Access Control Models and Technologies (2002)","DOI":"10.1145\/507711.507722"},{"issue":"9","key":"11_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1151053","volume":"49","author":"A Pretschner","year":"2006","unstructured":"Pretschner, A., Hilty, M., Basin, D.A.: Distributed usage control. Commun. ACM 49(9), 39\u201344 (2006). doi: 10.1145\/1151053","journal-title":"Commun. ACM"},{"key":"11_CR13","doi-asserted-by":"crossref","DOI":"10.1628\/978-3-16-151157-8","volume-title":"Der Vorbehalt des Gesetzes im Europarecht","author":"H Rieckhoff","year":"2007","unstructured":"Rieckhoff, H.: Der Vorbehalt des Gesetzes im Europarecht. Mohr Siebeck, Tbingen (2007)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Rinner, B., Winkler, T.: Privacy-protecting smart cameras. In: Proceedings of the International Conference on Distributed Smart Cameras, ICDSC 2014, pp. 40:1\u201340:5, NY, USA. ACM, New York (2014)","DOI":"10.1145\/2659021.2659044"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Tian, Y., Luo, P., Wang, X., Tang, X.: Pedestrian detection aided by deep learning semantic tasks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5079\u20135087 (2015)","DOI":"10.1109\/CVPR.2015.7299143"},{"key":"11_CR16","unstructured":"Wagner, P.G., Birnstill, P., Krempel, E., Bretthauer, S., Beyerer, J.: Privacy-dashcam - datenschutzfreundliche dashcams durch erzwingen externer anonymisierung. In: Informatik 2016, 46. Jahrestagung der Gesellschaft f\u00fcr Informatik, 26.-30. Klagenfurt, \u00d6sterreich. pp. 427\u2013440 (2016). http:\/\/subs.emis.de\/LNI\/Proceedings\/Proceedings259\/article44.html"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, S., Benenson, R., Omran, M., Hosang, J., Schiele, B.: How far are we from solving pedestrian detection? In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1259\u20131267 (2016)","DOI":"10.1109\/CVPR.2016.141"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, S., Benenson, R., Schiele, B.: Filtered channel features for pedestrian detection. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1751\u20131760. IEEE (2015)","DOI":"10.1109\/CVPR.2015.7298784"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:45:51Z","timestamp":1570085151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}