{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:39:03Z","timestamp":1765485543109,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642218262"},{"type":"electronic","value":"9783642218279"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21827-9_52","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T06:34:50Z","timestamp":1309242890000},"page":"511-521","source":"Crossref","is-referenced-by-count":9,"title":["Negotiating Privacy Preferences in Video Surveillance Systems"],"prefix":"10.1007","author":[{"given":"Mukhtaj S.","family":"Barhm","sequence":"first","affiliation":[]},{"given":"Nidal","family":"Qwasmi","sequence":"additional","affiliation":[]},{"given":"Faisal Z.","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Khalil","family":"el-Khatib","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","unstructured":"Office of The Privacy Commissioner of Canada, http:\/\/www.priv.gc.ca"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Cavallaro, A.: Privacy in Video Surveillance [In the Spotlight], pp. 166\u2013168 (March 2007)","DOI":"10.1109\/MSP.2007.323270"},{"key":"52_CR3","unstructured":"Privacy International, http:\/\/www.privacyinternational.org"},{"issue":"3","key":"52_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2005.65","volume":"3","author":"A. Senior","year":"2005","unstructured":"Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.-L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Transactions on Security and Privacy\u00a03(3), 50\u201357 (2005)","journal-title":"IEEE Transactions on Security and Privacy"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Boult, T.E.: PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP. In: Proc. CVPR 2007, Minneapolis, MN, pp. 1\u20138 (June 2007)","DOI":"10.1109\/CVPR.2007.383413"},{"issue":"1","key":"52_CR6","first-page":"1","volume":"2007","author":"D. Chen","year":"2007","unstructured":"Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for Protecting the Privacy of Specific Individuals in Video. EURASIP Journal on Advances in Signal Processing\u00a02007(1), 1\u201310 (2007), http:\/\/www.hindawi.com\/journals\/asp\/2007\/075427.abs.html","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In: Proc. IROS 2007, San Diego, CA, pp. 971\u2013978 (November 2007)","DOI":"10.1109\/IROS.2007.4399122"},{"issue":"2","key":"52_CR8","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"E.M. Newton","year":"2005","unstructured":"Newton, E.M., Sweeney, L., Malin, B.: Preserving Privacy by De-Identifying Face Images. IEEE Transactions on Knowledge and Data Engineering\u00a017(2), 232\u2013243 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"52_CR9","unstructured":"Berger, A.M.: Privacy Mode for Acquisition Cameras and Camcorders. US patent 6,067,399 to Sony Corp., Patent and Trademark Office (2000)"},{"key":"52_CR10","unstructured":"Wada, J., Wakiyama, K., Kogane, H., Takada, N.: Monitor Camera System and Method of Displaying Pictures from Monitor Camera Thereof. European patent EP 1 081 955 A3 to Matsushita Electric Industrial, European Patent Office (2001)"},{"key":"52_CR11","first-page":"609","volume-title":"Proc. CIKM 2005","author":"J. Fan","year":"2005","unstructured":"Fan, J., Luo, H., Hacid, M.-S., Bertino, E.: A novel approach for privacy-preserving video sharing. In: Proc. CIKM 2005, pp. 609\u2013616. ACM, New York (2005)"},{"key":"52_CR12","unstructured":"Senior, A., Pankanti, S., Hampapur, A., Brown, L.: Blinkering Surveillance: Enabling Video Privacy Through Computer Vision, NY, pp. 1\u20139 (2003)"},{"key":"52_CR13","first-page":"1","volume-title":"Proc. PUI 2001","author":"S. Tansuriyavong","year":"2001","unstructured":"Tansuriyavong, S., Hanaki, S.-i.: Privacy protection by concealing persons in circumstantial video image. In: Proc. PUI 2001, pp. 1\u20134. ACM Press, Orlando (2001), http:\/\/portal.acm.org\/citation.cfm?doid=971478.971519"},{"key":"52_CR14","first-page":"868","volume-title":"Proc. ICIP 2005","author":"W. Zhang","year":"2005","unstructured":"Zhang, W., Cheung, S., Chen, M.: Hiding privacy information in video surveillance system. In: Proc. ICIP 2005, pp. 868\u2013871. IEEE, Genova (2005), http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=1530530"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Hudson, S.E., Smith, I.: Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems. In: Proc. of the CCSCW 1996, Boston, pp. 248\u2013257 (November 1996)","DOI":"10.1145\/240080.240295"},{"key":"52_CR16","doi-asserted-by":"crossref","unstructured":"Qureshi, F.Z.: Object-Video Streams for Preserving Privacy in Video Surveillance. In: Proc. AVSS 2009, Genovo, Italy, pp. 1\u20138 (September 2009)","DOI":"10.1109\/AVSS.2009.97"},{"key":"52_CR17","volume-title":"Learning OpenCV: Computer Vision with the OpenCV Library","author":"G. Bradski","year":"2008","unstructured":"Bradski, G., Kaehler, A.: Learning OpenCV: Computer Vision with the OpenCV Library. O\u2019Reilly Media, Inc., Sebastopol (2008)"},{"key":"52_CR18","doi-asserted-by":"crossref","unstructured":"Turk, M., Pentland, A.: Face Recognition Using Eigenfaces. In: Proc. CVPR 1991, Maui, Hawaii, pp. 586\u2013591 (June 1991)","DOI":"10.1109\/CVPR.1991.139758"},{"key":"52_CR19","unstructured":"Hoprasert, T., Harwood, D., Davis, L.S.: A statistical approach for real-time robust background subtraction and shadow detection. In: Proc. Framerate Workshop ICCV 1999, Kerhyra, pp. 1\u201319 (September 1999)"},{"key":"52_CR20","doi-asserted-by":"crossref","unstructured":"Chen, H.-T., Lin, H.-H., Liu, T.-L.: Multi-object tracking using dynamical graph matching. In: Proc. CVPR 2001, Hawaii, vol.\u00a02, pp. 210\u2013217 (December 2001)","DOI":"10.1109\/CVPR.2001.990962"},{"key":"52_CR21","unstructured":"Malik, S.: Real-time Hand Tracking and Finger Tracking for Interaction, Toronto, pp. 1\u201321 (2003)"}],"container-title":["Lecture Notes in Computer Science","Modern Approaches in Applied Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21827-9_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:38:51Z","timestamp":1741289931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21827-9_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642218262","9783642218279"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21827-9_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}