{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:54:45Z","timestamp":1725555285104},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122965"},{"type":"electronic","value":"9783642122972"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12297-2_26","type":"book-chapter","created":{"date-parts":[[2010,5,5]],"date-time":"2010-05-05T04:13:24Z","timestamp":1273032804000},"page":"266-276","source":"Crossref","is-referenced-by-count":3,"title":["Person De-identification in Videos"],"prefix":"10.1007","author":[{"given":"Prachi","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"P. J.","family":"Narayanan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Collins, R.T., Gross, R., Shi, J.: Silhouette-based human identification from body shape and gait. In: Proceedings of IEEE Conference on Face and Gesture Recognition, pp. 351\u2013356 (2002)","key":"26_CR1","DOI":"10.1109\/AFGR.2002.1004181"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/11558484_18","volume-title":"Advanced Concepts for Intelligent Vision Systems","author":"J.H. Yoo","year":"2005","unstructured":"Yoo, J.H., Hwang, D., Nixon, M.S.: Gender classification in human gait using support vector machine. In: Blanc-Talon, J., Philips, W., Popescu, D.C., Scheunders, P. (eds.) ACIVS 2005. LNCS, vol.\u00a03708, pp. 138\u2013145. Springer, Heidelberg (2005)"},{"key":"26_CR3","first-page":"886","volume-title":"CVPR (1)","author":"N. Dalal","year":"2005","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: CVPR (1), pp. 886\u2013893. IEEE Computer Society, Los Alamitos (2005)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/978-3-540-88693-8_51","volume-title":"Computer Vision \u2013 ECCV 2008","author":"P. Tu","year":"2008","unstructured":"Tu, P., Sebastian, T., Doretto, G., Krahnstoever, N., Rittscher, J., Yu, T.: Unified crowd segmentation. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part IV. LNCS, vol.\u00a05305, pp. 691\u2013704. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Boykov, Y., Jolly, M.P.: Interactive graph cuts for optimal boundary and region segmentation of objects in n-d images. In: ICCV, pp. 105\u2013112 (2001)","key":"26_CR5","DOI":"10.1109\/ICCV.2001.937505"},{"issue":"3","key":"26_CR6","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/1015706.1015720","volume":"23","author":"C. Rother","year":"2004","unstructured":"Rother, C., Kolmogorov, V., Blake, A.: Grabcut: interactive foreground extraction using iterated graph cuts. ACM Trans. Graph.\u00a023(3), 309\u2013314 (2004)","journal-title":"ACM Trans. Graph."},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/166117.166151","volume-title":"SIGGRAPH 1993: Proc. on Computer graphics and interactive techniques","author":"B. Cabral","year":"1993","unstructured":"Cabral, B., Leedom, L.C.: Imaging vector fields using line integral convolution. In: SIGGRAPH 1993: Proc. on Computer graphics and interactive techniques, pp. 263\u2013270. ACM, New York (1993)"},{"doi-asserted-by":"crossref","unstructured":"Senior, A.W.: Privacy enablement in a surveillance system. In: ICIP, pp. 1680\u20131683 (2008)","key":"26_CR8","DOI":"10.1109\/ICIP.2008.4712096"},{"doi-asserted-by":"crossref","unstructured":"Yu, X., Chinomi, K., Koshimizu, T., Nitta, N., Ito, Y., Babaguchi, N.: Privacy protecting visual processing for secure video surveillance. In: ICIP, pp. 1672\u20131675 (2008)","key":"26_CR9","DOI":"10.1109\/ICIP.2008.4712094"},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"E. Newton","year":"2003","unstructured":"Newton, E., Sweeney, L., Malin, B.: Preserving privacy by de-identifying facial images. IEEE Transactions on Knowledge and Data Engineering\u00a017, 232\u2013243 (2003)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/11767831_15","volume-title":"Privacy Enhancing Technologies","author":"R. Gross","year":"2006","unstructured":"Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 227\u2013242. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Gross, R., Sweeney, L., la Torre, F.D., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In: IEEE CVPR (2008)","key":"26_CR12","DOI":"10.1109\/CVPR.2008.4587369"},{"doi-asserted-by":"crossref","unstructured":"Phillips, P.: Privacy operating characteristic for privacy protection in surveillance applications, p. 869 (2005)","key":"26_CR13","DOI":"10.1007\/11527923_91"},{"doi-asserted-by":"crossref","unstructured":"Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: CSCW, pp. 1\u201310 (2000)","key":"26_CR14","DOI":"10.1145\/358916.358935"},{"issue":"1","key":"26_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1143518.1143519","volume":"13","author":"C. Neustaedter","year":"2006","unstructured":"Neustaedter, C., Greenberg, S., Boyle, M.: Blur filtration fails to preserve privacy for home-based video conferencing. ACM Trans. Comput.-Hum. Interact.\u00a013(1), 1\u201336 (2006)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"issue":"3","key":"26_CR16","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/1015706.1015718","volume":"23","author":"A. Agarwala","year":"2004","unstructured":"Agarwala, A., Dontcheva, M., Agrawala, M., Drucker, S.M., Colburn, A., Curless, B., Salesin, D., Cohen, M.F.: Interactive digital photomontage. ACM Trans. Graph.\u00a023(3), 294\u2013302 (2004)","journal-title":"ACM Trans. Graph."},{"issue":"3","key":"26_CR17","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1111\/j.1467-8659.2004.00799.x","volume":"23","author":"V. Blanz","year":"2004","unstructured":"Blanz, V., Scherbaum, K., Vetter, T., Seidel, H.P.: Exchanging faces in images. Comput. Graph. Forum\u00a023(3), 669\u2013676 (2004)","journal-title":"Comput. Graph. Forum"},{"issue":"3","key":"26_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1360612.1360638","volume":"27","author":"D. Bitouk","year":"2008","unstructured":"Bitouk, D., Kumar, N., Dhillon, S., Belhumeur, P., Nayar, S.K.: Face swapping: automatically replacing faces in photographs. ACM Trans. Graph.\u00a027(3), 1\u20138 (2008)","journal-title":"ACM Trans. Graph."},{"issue":"1","key":"26_CR19","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1186\/s13634-023-01060-9","volume":"2007","author":"D. Chen","year":"2007","unstructured":"Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Advances in Signal Processing\u00a02007(1), 107\u2013107 (2007)","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"unstructured":"Park, S., Trivedi, M.: A track-based human movement analysis and privacy protection system adaptive to environmental contexts, pp. 171\u2013176 (2005)","key":"26_CR20"},{"doi-asserted-by":"crossref","unstructured":"Zhang, W., Cheung, S.C.S., Chen, M.: Hiding privacy information in video surveillance system. In: ICIP (3), pp. 868\u2013871 (2005)","key":"26_CR21","DOI":"10.1109\/ICIP.2005.1530530"},{"doi-asserted-by":"crossref","unstructured":"Cheung, S.C.S., Paruchuri, J.K., Nguyen, T.P.: Managing privacy data in pervasive camera networks. In: ICIP, pp. 1676\u20131679 (2008)","key":"26_CR22","DOI":"10.1109\/ICIP.2008.4712095"},{"key":"26_CR23","first-page":"824","volume-title":"ICCV","author":"X. Ren","year":"2005","unstructured":"Ren, X., Berg, A.C., Malik, J.: Recovering human body configurations using pairwise constraints between parts. In: ICCV, pp. 824\u2013831. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"7","key":"26_CR24","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/TPAMI.2006.149","volume":"28","author":"G. Mori","year":"2006","unstructured":"Mori, G., Malik, J.: Recovering 3d human body configurations using shape contexts. IEEE Trans. Pattern Anal. Mach. Intell.\u00a028(7), 1052\u20131062 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ACCV 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12297-2_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T11:58:06Z","timestamp":1711454286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12297-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122965","9783642122972"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12297-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}