{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:34:27Z","timestamp":1744173267539,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331602"},{"type":"electronic","value":"9783642331619"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33161-9_36","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T13:57:47Z","timestamp":1348149467000},"page":"237-248","source":"Crossref","is-referenced-by-count":1,"title":["User-Centric Protection and Privacy in Smart Surveillance Systems"],"prefix":"10.1007","author":[{"given":"Hauke","family":"Vagts","sequence":"first","affiliation":[]},{"given":"Erik","family":"Krempel","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Beyerer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Hempel, L., T\u00f6pfer, E.: CCTV in Europe. Final Report, Urbaneye Working Paper No. 15 (August 2004)"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Regazzoni, C.S., Fabri, G., Vernazza, G.: Advanced video-based surveillance systems, vol.\u00a0488. Springer (1999)","DOI":"10.1007\/978-1-4615-5085-3"},{"key":"36_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0913-4","volume-title":"Video-based surveillance systems: computer vision and distributed processing","author":"P. Remagnino","year":"2002","unstructured":"Remagnino, P.: Video-based surveillance systems: computer vision and distributed processing. Springer, Netherlands (2002)"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Computer Vision and Pattern Recognition Workshop (CVPRW 2006), p. 160. IEEE (2006)","DOI":"10.1109\/CVPRW.2006.184"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65\u201389. Springer (2009)","DOI":"10.1007\/978-1-84882-301-3_5"},{"key":"36_CR6","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/JPROC.2008.928765","volume":"96","author":"S. Fleck","year":"2008","unstructured":"Fleck, S., Stra\u00dfer, W.: Smart camera based monitoring system and its application to assisted living. Proceedings of the IEEE\u00a096, 1698\u20131714 (2008)","journal-title":"Proceedings of the IEEE"},{"key":"36_CR7","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2005.65","volume":"3","author":"A. Senior","year":"2005","unstructured":"Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Security & Privacy\u00a03, 50\u201357 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"36_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013320. Springer, Heidelberg (2002)"},{"issue":"3","key":"36_CR9","first-page":"341","volume":"16","author":"S. Bag\u00fc\u00e9s","year":"2010","unstructured":"Bag\u00fc\u00e9s, S., Zeidler, A., Klein, C., Valdivielso, C., Matias, I.: Enabling personal privacy for pervasive computing environments. Journal of Universal Computer Science\u00a016(3), 341\u2013371 (2010)","journal-title":"Journal of Universal Computer Science"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Mo\u00dfgraber, J., Reinert, F., Vagts, H.: An architecture for a task-oriented surveillance system \u2013 a service and event based approach. In: Fifth International Conference on Systems ICONS (April 2010)","DOI":"10.1109\/ICONS.2010.32"},{"key":"36_CR11","unstructured":"Bauer, A., Emter, T., Vagts, H., Beyerer, J.: Object oriented world model for surveillance systems. In: Elsner, P. (ed.) Future Security: 4th Security Research Conference, pp. 339\u2013345. Fraunhofer Verlag (October 2009)"},{"key":"36_CR12","unstructured":"Vagts, H., Krempel, E., Beyerer, J.: Privacy enforcement by identity management in smart surveillance systems. In: Proceedings of the International Conference on Distributed Multimedia Systems. Knowledge Systems Institute Graduate School, vol.\u00a016, pp. 64\u201369 (October 2010)"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Vagts, H., Krempel, E., Fischer, Y.: Access controls for privacy protection in pervasive environments. In: The 3rd Workshop on Privacy and Security in Pervasive Environments PSPAE (2011)","DOI":"10.1145\/2141622.2141684"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Vagts, H., Bier, C., Beyerer, J.: Anonymization in intelligent surveillance systems. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20134. IEEE (2011)","DOI":"10.1109\/NTMS.2011.5721053"}],"container-title":["Communications in Computer and Information Science","Future Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33161-9_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:52:57Z","timestamp":1744167177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33161-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331602","9783642331619"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33161-9_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}