{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:02:18Z","timestamp":1742943738819,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642019692"},{"type":"electronic","value":"9783642019708"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01970-8_43","type":"book-chapter","created":{"date-parts":[[2009,5,19]],"date-time":"2009-05-19T18:26:23Z","timestamp":1242757583000},"page":"439-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Virtual Human Imaging"],"prefix":"10.1007","author":[{"given":"Yang","family":"Cai","sequence":"first","affiliation":[]},{"given":"Iryna","family":"Pavlyshak","sequence":"additional","affiliation":[]},{"given":"Li","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Magargle","sequence":"additional","affiliation":[]},{"given":"James","family":"Hoburg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Law, J., Cai, Y.: Feature Hiding in 3D Human Body Scans. Journal of Information Visualization\u00a05(4) (2006)","DOI":"10.1057\/palgrave.ivs.9500136"},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1007\/11758549_116","volume-title":"Computational Science \u2013 ICCS 2006","author":"J. Laws","year":"2006","unstructured":"Laws, J., Cai, Y.: A Privacy Algorithm for 3D Human Body Scans. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol.\u00a03994, pp. 870\u2013877. Springer, Heidelberg (2006)"},{"key":"43_CR3","unstructured":"Cai, Y., et al.: Spatiotemporal data mining for tracking ocean objects. In: Proceedings of IEEE Space Mission Challenges to IT, Pasadena, CA (2006)"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Cai, Y., et al.: Visual Transform for spatiotemporal data mining. Journal of Knowledge and Information Systems (to appear) (2007)","DOI":"10.1007\/s10115-007-0075-5"},{"key":"43_CR5","unstructured":"BodySearch imaging system, American Science and Engineering, Inc., 829 Middlesex Turnpike, Billerica, MA 01821 (2007)"},{"key":"43_CR6","unstructured":"Secure 1000 imaging system, IRT Corporation, 6020 Cornerstone Court West, San Diego, CA 92121 (2007)"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"McMakin, D.L., Sheen, D.M., Collins, H.D., Hall, T.E., Severtsen, R.H.: Wideband, millimeter-wave, holographic surveillance systems. In: EUROPTO International Symposium on Law Enforcement Technologies: Identification Technologies and Traffic Safety, Munich, FRG, SPIE, vol.\u00a02092, pp. 131\u2013141 (1995)","DOI":"10.1117\/12.219585"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Sheen, D.M., McMakin, D.L., Collins, H.D.: Circular scanned millimeter-wave imaging system for weapon detection. In: EUROPTO International Symposium on Law Enforcement Technologies: Identification Technologies and Traffic Safety, Munich, FRG, SPIE, vol.\u00a02092, pp. 122\u2013130 (1995)","DOI":"10.1117\/12.219584"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"McMakin, D.L., Sheen, D.M., Collins, H.D., Hall, T.E., Smith, R.R.: Millimeter-wave, high-resolution, holographic surveillance system. In: EUROPTO International Symposium on Substance Identification Technologies, Innsbruck, Austria, SPIE, vol.\u00a02092, pp. 525\u2013535 (1993)","DOI":"10.1117\/12.171270"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Sheen, D.M., McMakin, D.L., Collins, H.D., Hall, T.E.: Weapon detection using a wideband millimeter-wave linear array imaging technique. In: EUROPTO International Symposium on Substance Identification Technologies, Innsbruck, Austria, SPIE, vol.\u00a02092, pp. 536\u2013547 (1993)","DOI":"10.1117\/12.171271"},{"key":"43_CR11","unstructured":"Huguenin, G.R., Goldsmith, P.F., Deo, N.C., Walker, D.K.: Contraband Detection System, U. S. Patent 5,073,782 (1991)"},{"key":"43_CR12","unstructured":"Browne, J.: MM waves aid commercial applications, Microwaves and RF, pp. 113-116 (July 1992)"},{"key":"43_CR13","volume-title":"Introduction to Fourier Optics","author":"J.W. Goodman","year":"2005","unstructured":"Goodman, J.W.: Introduction to Fourier Optics. McGraw-Hill, New York (2005)"},{"issue":"9","key":"43_CR14","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1109\/78.134436","volume":"39","author":"M. Soumekh","year":"1991","unstructured":"Soumekh, M.: Bistatic synthetic aperture radar inversion with application in dynamic object imaging. IEEE Transactions on Signal Processing\u00a039(9), 2044\u20132055 (1991)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"43_CR15","volume-title":"Fourier Array Imaging","author":"M. Soumekh","year":"1994","unstructured":"Soumekh, M.: Fourier Array Imaging. Prentice Hall, Englewood Cliffs (1994)"},{"key":"43_CR16","unstructured":"Anthropometry Resource (CAESAR), Final Report, Volume I: Summary, AFRL-HE-WP-TR-2002-0169, United States Air Force Research Laboratory, Human Effectiveness Directorate, Crew System Interface Division, 2255 H Street, Wright-Patterson AFB OH 45433-7022 and SAE International, 400 Commonwealth Dr., Warrendale, PA 15096 (2007)"},{"issue":"2","key":"43_CR17","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIP.2005.860606","volume":"15","author":"A.C. Jalba","year":"2006","unstructured":"Jalba, A.C., Wilkinson, M.H.F., Roerdink, J.: Shape Representation and Recognition Through Morphological Curvature Scale Spaces. IEEE Trans. Image Processing\u00a015(2), 331\u2013341 (2006)","journal-title":"IEEE Trans. Image Processing"},{"issue":"1","key":"43_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1008145029462","volume":"32","author":"D.A. Forsyth","year":"1999","unstructured":"Forsyth, D.A., Fleck, M.M.: Automatic detection of human nudes. International Journal of Computer Vision\u00a032(1), 63\u201377 (1999)","journal-title":"International Journal of Computer Vision"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Forsyth, D.A., Fleck, M.M.: Body Plans. In: Proc. CVPR 1997, pp. 678\u2013683 (1997)","DOI":"10.1109\/CVPR.1997.609399"},{"key":"43_CR20","doi-asserted-by":"crossref","unstructured":"Forsyth, D.A., Fleck, M.M.: Identifying nude pictures. In: Proceeding Third IEEE Workshop on Applications of Computer Vision, pp. 103\u2013108 (1996)","DOI":"10.1109\/ACV.1996.572010"},{"key":"43_CR21","unstructured":"Goldgof, D.B., Huang, T.S., Lee, H.: Feature extraction and terrain matching. In: Proc. IEEE Comput. Soc. Conf. Comput. Vision Pattern Recognition, Ann Arbor, MI (May 1988)"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Goldgof, D.B., Huang, T.S., Lee, H.: A Curvature-Based Approach to Terrain Recognition, vol.\u00a011(11), pp. 1213\u20131217 (November 1989)","DOI":"10.1109\/34.42859"},{"key":"43_CR23","unstructured":"Gordon, G.: Face recognition based on depth and curvature features. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Champaign Illinois), pp. 108\u2013110 (1992)"},{"key":"43_CR24","unstructured":"Li, P., Corner, B.D., Paquette, S.: Evaluation of a surface curvature based landmark extraction method for three dimensional head scans. In: International Ergonomics Conference, Seoul (2003)"},{"key":"43_CR25","doi-asserted-by":"crossref","unstructured":"Liu, X., Kim, W., Drerup, B.: 3D Characterization and Localization of Anatomical Landmarks of the Foot. In: Proceeding (417), Biomedical Engineering. Acta Press (2004)","DOI":"10.4271\/2004-01-2160"},{"key":"43_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/3-540-61123-1_173","volume-title":"Computer Vision - ECCV \u201996","author":"M.M. Fleck","year":"1996","unstructured":"Fleck, M.M., Forsyth, D.A., Bregler, C.: Finding naked people. In: Buxton, B., Cipolla, R. (eds.) ECCV 1996. LNCS, vol.\u00a01065, pp. 593\u2013602. Springer, Heidelberg (1996)"},{"key":"43_CR27","volume-title":"3-D human modeling and animation","author":"P. Ratner","year":"2003","unstructured":"Ratner, P.: 3-D human modeling and animation. John Wiley & Sons, Inc., Chichester (2003)"},{"key":"43_CR28","unstructured":"Robinette, K.M., Blackwell, S., Daanen, H.A.M., Fleming, S., Boehmer, M., Brill, T., Hoeferlin, D., Burnsides, D.: Civilian American and European Surface Anthropometry Resource (2002)"},{"issue":"1","key":"43_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1011179004708","volume":"43","author":"S. Ioffe","year":"2001","unstructured":"Ioffe, S., Forsyth, D.A.: Probabilistic methods for finding people. International Journal of Computer Vision\u00a043(1), 45\u201368 (2001)","journal-title":"International Journal of Computer Vision"},{"key":"43_CR30","unstructured":"Sonka, M., et al.: Image processing, analysis and machine vision, PWS Publishing (1999)"},{"key":"43_CR31","unstructured":"Suikerbuik, C.A.M.: Automatic Feature Detection in 3D Human Body Scans. Master thesis INF\/SCR-02-23, Institute of Information and Computer Sciences. Utrecht University (2002)"},{"key":"43_CR32","doi-asserted-by":"crossref","unstructured":"Suikerbuik, R., Tangelder, H., Daanen, H., Oudenhuijzen, A.: Automatic feature detection in 3D human body scans. In: Proceedings of SAE Digital Human Modeling Conference, 04-DHM-52 (2004)","DOI":"10.4271\/2004-01-2193"},{"key":"43_CR33","unstructured":"Mathworks MRI Phantom (2008), http:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/loadFile.do?objectId=1759&objectType=file"},{"key":"43_CR34","unstructured":"NLM, Visible Human Project (2008), http:\/\/www.nlm.nih.gov\/research\/visible\/visible_human.html"},{"key":"43_CR35","unstructured":"DARPA Virtual Soldier (2008), http:\/\/www.wired.com\/news\/medtech\/0,1286,60016,00.html"},{"key":"43_CR36","unstructured":"Neill, D.B., Moore, A.W.: Anomalous spatial cluster detection. In: Proc. KDD 2005 Workshop on Data Mining Methods for Anomaly Detection, pp. 41\u201344 (2005)"},{"key":"43_CR37","doi-asserted-by":"crossref","unstructured":"Neill, D.B., Moore, A.W.: Rapid detection of significant spatial clusters. In: Proc. 10th ACM SIGKDD Conf. on Knowledge Discovery and Data Mining, pp. 256\u2013265 (2004)","DOI":"10.1145\/1014052.1014082"},{"key":"43_CR38","unstructured":"Salvador, S., Chan, P.: Fastdtw: Toward accurate dynamic time warping in linear time and space. In: KDD Workshop on Mining Temporal and Sequential Data (2004)"},{"key":"43_CR39","unstructured":"Shyu, M.L., Chen, S.C., Sarinnapakorn, K., Chang, L.W.: A novel anomaly detection scheme based on principal component classifier. In: Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop (2003)"},{"key":"43_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection. In: Symposium on Network Security and Information Assurance \u2013 Proc. of the IEEE International Conference on Communications (ICC), Istanbul, Turkey (June 2006)","DOI":"10.1109\/ICC.2006.255127"},{"key":"43_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/11496618_30","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"K. Burbeck","year":"2005","unstructured":"Burbeck, K., Tehrani, S.N.: ADWICE: Anomaly Detection with Real-time Incremental Clustering. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 407\u2013424. Springer, Heidelberg (2005)"},{"key":"43_CR42","unstructured":"Gomez, J., Gonzalez, F., Dasgupta, D.: An Immuno-Fuzzy Approach to Anomaly Detection. In: the proceedings of the 12th IEEE International Conference on Fuzzy Systems (FUZZIEEE), May 25-28, 2003, vol.\u00a02, pp. 1219\u20131224 (2003)"},{"key":"43_CR43","unstructured":"Wise, J.A., Thomas, J.J., Pennock, K., Lantrip, D., Pottier, M., Schur, A., Crow, V.: Visualizing the non-visual: spatial analysis and interaction with information from text documents. In: Proceedings of the 1995 IEEE Symposium on Information Visualization, Atlanta, Georgia, October 30-31, 1995, p. 51 (1995)"},{"key":"43_CR44","unstructured":"Keller, P., McMkin, L., Sheen, D., McKinnon, A., Summet, A.J.: Privacy Algorithm for Cylindrical Holographic Weapons Surveillance Systems. In: Proc. SPIE, Applications and Science of Computational Intelligence III, vol.\u00a04055, pp. 476\u2013483 (2000)"},{"key":"43_CR45","doi-asserted-by":"crossref","unstructured":"Sheen, D.M., et al.: Concealed explosive detection on personnel using a wideband holographic millimeter-wave imaging system. In: Proceedings of the SPIE, AEROSENSE Conference, Orlando, FL, vol.\u00a02755 (1996)","DOI":"10.1117\/12.243191"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2009"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01970-8_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T15:53:23Z","timestamp":1739116403000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-01970-8_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642019692","9783642019708"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01970-8_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}