{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T14:20:01Z","timestamp":1738506001581,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":59,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540894292"},{"type":"electronic","value":"9783540894308"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89430-8_10","type":"book-chapter","created":{"date-parts":[[2008,11,4]],"date-time":"2008-11-04T08:42:02Z","timestamp":1225788122000},"page":"176-193","source":"Crossref","is-referenced-by-count":1,"title":["Augmented Privacy with Virtual Humans"],"prefix":"10.1007","author":[{"given":"Yang","family":"Cai","sequence":"first","affiliation":[]},{"given":"Iryna","family":"Pavlyshak","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Laws","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Magargle","sequence":"additional","affiliation":[]},{"given":"James","family":"Hoburg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Laws, J., Cai, Y.: Feature Hiding in 3D Human Body Scans. Journal of Information Visualization\u00a05(4) (2006), http:\/\/www.palgrave-journals.com\/ivs\/journal\/v5\/n4\/abs\/9500136a.html","DOI":"10.1057\/palgrave.ivs.9500136"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1007\/11758549_116","volume-title":"Computational Science \u2013 ICCS 2006","author":"J. Laws","year":"2006","unstructured":"Laws, J., Cai, Y.: A Privacy Algorithm for 3D Human Body Scans. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol.\u00a03994, pp. 870\u2013877. Springer, Heidelberg (2006)"},{"key":"10_CR3","unstructured":"Cai, Y., et al.: Spatiotemporal data mining for tracking ocean objects. In: Proceedings of IEEE Space Mission Challenges to IT, Pasadena, CA (2006)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Cai, Y., et al.: Visual Transform for spatiotemporal data mining. Journal of Knowledge and Information Systems (to appear, 2007)","DOI":"10.1007\/s10115-007-0075-5"},{"key":"10_CR5","unstructured":"BodySearch imaging system, American Science and Engineering, Inc., 829 Middlesex Turnpike, Billerica, MA 01821"},{"key":"10_CR6","unstructured":"Secure 1000 imaging system, IRT Corporation, 6020 Cornerstone Court West, San Diego, CA 92121"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"McMakin, D.L., Sheen, D.M., Collins, H.D., Hall, T.E., Severtsen, R.H.: Wideband, millimeter-wave, holographic surveillance systems. In: EUROPTO International Symposium on Law Enforcement Technologies: Identification Technologies and Traffic Safety, Munich, FRG, SPIE, vol.\u00a02092, pp. 131\u2013141 (1995)","DOI":"10.1117\/12.219585"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Sheen, D.M., McMakin, D.L., Collins, H.D.: Circular scanned millimeter-wave imaging system for weapon detection. In: EUROPTO International Symposium on Law Enforcement Technologies: Identification Technologies and Traffic Safety, Munich, FRG, SPIE, vol.\u00a02092, pp. 122\u2013130 (1995)","DOI":"10.1117\/12.219584"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"McMakin, D.L., Sheen, D.M., Collins, H.D., Hall, T.E., Smith, R.R.: Millimeter-wave, high-resolution, holographic surveillance system. In: EUROPTO International Symposium on Substance Identification Technologies, Innsbruck, Austria, SPIE, vol.\u00a02092, pp. 525\u2013535 (1993)","DOI":"10.1117\/12.171270"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Sheen, D.M., McMakin, D.L., Collins, H.D., Hall, T.E.: Weapon detection using a wideband millimeter-wave linear array imaging technique. In: EUROPTO International Symposium on Substance Identification Technologies, Innsbruck, Austria, SPIE, vol.\u00a02092, pp. 536\u2013547 (1993)","DOI":"10.1117\/12.171271"},{"key":"10_CR11","unstructured":"Huguenin, G.R., Goldsmith, P.F., Deo, N.C., Walker, D.K.: Contraband Detection System. U. S. Patent 5, 073, 782 (1991)"},{"key":"10_CR12","unstructured":"Browne, J.: MM waves aid commercial applications. Microwaves and RF, 113\u2013116 (July 1992)"},{"key":"10_CR13","unstructured":"Goodman, J.W.: Introduction to Fourier Optics. McGraw-Hill, New York"},{"issue":"9","key":"10_CR14","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1109\/78.134436","volume":"39","author":"M. Soumekh","year":"1991","unstructured":"Soumekh, M.: Bistatic synthetic aperture radar inversion with application in dynamic object imaging. IEEE Transactions on Signal Processing\u00a039(9), 2044\u20132055 (1991)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10_CR15","volume-title":"Fourier Array Imaging","author":"M. Soumekh","year":"1994","unstructured":"Soumekh, M.: Fourier Array Imaging. Prentice-Hall, Englewood Cliffs (1994)"},{"key":"10_CR16","unstructured":"Anthropometry Resource (CAESAR), Final Report, vol. I: Summary, AFRL-HE-WP-TR-2002-0169, United States Air Force Research Laboratory, Human Effectiveness Directorate, Crew System Interface Division, 2255 H Street, Wright-Patterson AFB OH 45433-7022 and SAE International, 400 Commonwealth Dr., Warrendale, PA 15096"},{"key":"10_CR17","unstructured":"Bansal, M.: Analysis of curvature in genomic DNA, http:\/\/www.ibab.ac.in\/bansal.htm"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/4078.4081","volume":"17","author":"P.J. Besl","year":"1985","unstructured":"Besl, P.J., Jain, R.C.: Three-dimensional object recognition. ACM Comput. Surveys\u00a017(1), 75\u2013145 (1985)","journal-title":"ACM Comput. Surveys"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0734-189X(85)90001-5","volume":"32","author":"M. Brady","year":"1985","unstructured":"Brady, M., Ponce, J., Yuille, A., Asada, H.: Describing surfaces. Comput. Vision, Graphics, Image Processing\u00a032, 1\u201328 (1985)","journal-title":"Comput. Vision, Graphics, Image Processing"},{"key":"10_CR20","first-page":"179","volume-title":"Gaussian curvature and shell structures. The Mathematics of Surfaces","author":"C.R. Calladine","year":"1985","unstructured":"Calladine, C.R.: Gaussian curvature and shell structures. The Mathematics of Surfaces, pp. 179\u2013196. Oxford University Press, Oxford (1985)"},{"key":"10_CR21","unstructured":"Chen, H.H., Huang, T.S.: Maximal matching of two three-dimensional point sets. In: Proc. ICPR (October 1986)"},{"key":"10_CR22","unstructured":"Coleman, R., Burr, M., Souvaine, D., Cheng, A.: An intuitive approach to measuring protein surface curvature. Proteins: structure, function and bioinformatics\u00a061(4), 1068\u20131074"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Fan, T.G., Medioni, G., Nevatia, R.: Description of surfaces from range data using curvature properties. In: Proc. CVPR (May 1986)","DOI":"10.1117\/12.939973"},{"issue":"1","key":"10_CR24","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1008145029462","volume":"32","author":"D.A. Forsyth","year":"1999","unstructured":"Forsyth, D.A., Fleck, M.M.: Automatic detection of human nudes. International Journal of Computer Vision\u00a032(1), 63\u201377 (1999)","journal-title":"International Journal of Computer Vision"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Forsyth, D.A., Fleck, M.M.: Body Plans. In: Proc. CVPR 1997, pp. 678\u2013683 (1997)","DOI":"10.1109\/CVPR.1997.609399"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Forsyth, D.A., Fleck, M.M.: Identifying nude pictures. In: Proceeding of Third IEEE Workshop on Applications of Computer Vision, pp. 103\u2013108 (1996)","DOI":"10.1109\/ACV.1996.572010"},{"key":"10_CR27","unstructured":"Goldgof, D.B., Huang, T.S., Lee, H.: Curvature based approach to terrain recognition. Coord. Sci. Lab., Univ. Illinois, Urbana-Champaign, Tech. Note ISP-910 (April 1989)"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Goldgof, D.B., Huang, T.S., Lee, H.: Feature extraction and terrain matching. In: Proc. IEEE Comput. Soc. Conf. Comput. Vision Pattern Recognition, Ann Arbor, MI (May 1988)","DOI":"10.1109\/CVPR.1988.196339"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Goldgof, D.B., Huang, T.S., Lee, H.: A Curvature-Based Approach to Terrain Recognition \u00a011(11), 1213\u20131217 (1989)","DOI":"10.1109\/34.42859"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Gordon, G.: Face recognition based on depth and curvature features. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Champaign, Illinois, pp. 108\u2013110 (1992)","DOI":"10.1109\/CVPR.1992.223253"},{"issue":"4","key":"10_CR31","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TPAMI.1987.4767941","volume":"9","author":"R.M. Haralick","year":"1987","unstructured":"Haralick, R.M., Sternberg, S.R., Zhuang, X.: Image analysis using mathematical morphology. IEEE Trans. Pattern Anal. Machine Intell.\u00a0PAMI\u00a09(4), 532\u2013550 (1987)","journal-title":"IEEE Trans. Pattern Anal. Machine Intell.\u00a0PAMI"},{"key":"10_CR32","unstructured":"http:\/\/www.dace.co.uk\/proportion.htm"},{"key":"10_CR33","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/S0143-8166(97)00006-7","volume":"28","author":"P.R.M. Jones","year":"1997","unstructured":"Jones, P.R.M., Rioux, M.: Three-dimensional surface anthropometry: applications to the human body. Optics and Lasers in Engineering\u00a028, 89\u2013117 (1997)","journal-title":"Optics and Lasers in Engineering"},{"key":"10_CR34","unstructured":"Li, P., Corner, B.D., Paquette, S.: Evaluation of a surface curvature based landmark extraction method for three dimensional head scans. In: International Ergonomics Conference, Seoul (2003)"},{"key":"10_CR35","unstructured":"Liu, X., Kim, W., Drerup, B.: 3D Characterization and Localization of Anatomical Landmarks of the Foot. In: Proceeding (417), Biomedical Engineering. Acta Press (2004), http:\/\/www.actapress.com\/PaperInfo.aspx?PaperID=16382"},{"key":"10_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/3-540-61123-1_173","volume-title":"Computer Vision - ECCV \u201996","author":"M.M. Fleck","year":"1996","unstructured":"Fleck, M.M., Forsyth, D.A., Bregler, C.: Finding naked people. In: Buxton, B.F., Cipolla, R. (eds.) ECCV 1996. LNCS, vol.\u00a01065, pp. 593\u2013602. Springer, Heidelberg (1996)"},{"key":"10_CR37","volume-title":"3-D human modeling and animation","author":"P. Ratner","year":"2003","unstructured":"Ratner, P.: 3-D human modeling and animation. John Wiley & Sons, Chichester (2003)"},{"key":"10_CR38","unstructured":"Robinette, K.M., Blackwell, S., Daanen, H.A.M., Fleming, S., Boehmer, M., Brill, T., Hoeferlin, D., Burnsides, D.: Civilian American and European Surface Anthropometry Resource (2002)"},{"issue":"1","key":"10_CR39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1011179004708","volume":"43","author":"S. Ioffe","year":"2001","unstructured":"Ioffe, S., Forsyth, D.A.: Probabilistic methods for finding people. International Journal of Computer Vision\u00a043(1), 45\u201368 (2001)","journal-title":"International Journal of Computer Vision"},{"key":"10_CR40","unstructured":"Sonka, M., et al.: Image processing, analysis and machine vision. PWS Publishing (1999)"},{"key":"10_CR41","unstructured":"Suikerbuik, C.A.M.: Automatic Feature Detection in 3D Human Body Scans. Master thesis INF\/SCR-02-23, Institute of Information and Computer Sciences. Utrecht University (2002)"},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Suikerbuik, R., Tangelder, H., Daanen, H., Oudenhuijzen, A.: Automatic feature detection in 3D human body scans. In: Proceedings of SAE Digital Human Modeling Conference, 04-DHM-52 (2004)","DOI":"10.4271\/2004-01-2193"},{"key":"10_CR43","unstructured":"Mathworks MRI Phantom, http:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/loadFile.do?objectId=1759&objectType=file"},{"key":"10_CR44","unstructured":"NLM, Visible Human Project, http:\/\/www.nlm.nih.gov\/research\/visible\/visible_human.html"},{"key":"10_CR45","unstructured":"DARPA Virtual Soldier, http:\/\/www.wired.com\/news\/medtech\/0,1286,60016,00.html"},{"key":"10_CR46","unstructured":"Post-Gazette News about Digital Museum Project, http:\/\/www.post-gazette.com\/pg\/04348\/425914.stm"},{"key":"10_CR47","unstructured":"Virtual Colonoscopy, http:\/\/www.cs.sunysb.edu\/~vislab\/sample_images\/colonoscopy\/"},{"key":"10_CR48","unstructured":"Neill, D.B., Moore, A.W.: Anomalous spatial cluster detection. In: Proc. KDD 2005 Workshop on Data Mining Methods for Anomaly Detection, pp. 41\u201344 (2005)"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Neill, D.B., Moore, A.W.: Rapid detection of significant spatial clusters. In: Proc. 10th ACM SIGKDD Conf. on Knowledge Discovery and Data Mining, pp. 256\u2013265 (2004)","DOI":"10.1145\/1014052.1014082"},{"key":"10_CR50","unstructured":"Salvador, S., Chan, P.: Fastdtw: Toward accurate dynamic time warping in linear time and space. In: KDD Workshop on Mining Temporal and Sequential Data (2004)"},{"key":"10_CR51","unstructured":"Shyu, M.-L., Chen, S.-C., Sarinnapakorn, K., Chang, L.-W.: A novel anomaly detection scheme based on principal component classifier. In: Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop (2003)"},{"key":"10_CR52","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection. In: Symposium on Network Security and Information Assurance \u2013 Proc. of the IEEE International Conference on Communications (ICC), Istanbul, Turkey (June 2006)","DOI":"10.1109\/ICC.2006.255127"},{"key":"10_CR53","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"K. Burbeck","year":"2005","unstructured":"Burbeck, K., Nadjm-Tehrani, S.: ADWICE: Anomaly Detection with Real-time Incremental Clustering. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506. Springer, Heidelberg (2005)"},{"key":"10_CR54","doi-asserted-by":"crossref","unstructured":"Gonzalez, D.D.: An Immuno-Fuzzy Approach to Anomaly Detection. In: The proceedings of the 12th IEEE International Conference on Fuzzy Systems (FUZZIEEE), May 25-28, vol.\u00a02, pp. 1219\u20131224 (2003)","DOI":"10.1109\/FUZZ.2003.1206605"},{"key":"10_CR55","doi-asserted-by":"crossref","unstructured":"Wise, J.A., Thomas, J.J., Pennock, K., Lantrip, D., Pottier, M., Schur, A., Crow, V.: Visualizing the non-visual: spatial analysis and interaction with information from text documents. In: Proceedings of the 1995 IEEE Symposium on Information Visualization, Atlanta, Georgia, October 30-31, p. 51 (1995)","DOI":"10.1109\/INFVIS.1995.528686"},{"key":"10_CR56","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1109\/T-C.1974.223845","volume":"23","author":"R. Rosenfeld","year":"1974","unstructured":"Rosenfeld, R.: Digital straight line segments. IEEE Trans. On Computers\u00a023, 1264\u20131269 (1974)","journal-title":"IEEE Trans. On Computers"},{"key":"10_CR57","volume-title":"Signals and Systems","author":"A.V. Oppenheim","year":"1983","unstructured":"Oppenheim, A.V., et al.: Signals and Systems. Prentice-Hall, Englewood Cliffs (1983)"},{"key":"10_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1007\/11767886","volume-title":"Data Engineering Issues in E-Commerce and Services","author":"P. Keller","year":"2006","unstructured":"Keller, P., McMkin, L., Sheen, D., McKinnon, A., Summet, A.J.: Privacy Algorithm for Cylindrical Holographic Weapons Surveillance Systems. In: Lee, J., Shim, J., Lee, S.-g., Bussler, C.J., Shim, S. (eds.) DEECS 2006. LNCS, vol.\u00a04055, pp. 476\u2013483. Springer, Heidelberg (2006)"},{"key":"10_CR59","doi-asserted-by":"crossref","unstructured":"Sheen, D.M., et al.: Concealed explosive detection on personnel using a wideband holographic millimeter-wave imaging system. In: AEROSENSE Conference, Proceedings of the SPIE, Orlando, FL, vol.\u00a02755 (1996)","DOI":"10.1117\/12.243191"}],"container-title":["Lecture Notes in Computer Science","Digital Human Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89430-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T13:49:08Z","timestamp":1738504148000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89430-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540894292","9783540894308"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89430-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}