{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T20:54:10Z","timestamp":1761252850203},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407789"},{"type":"electronic","value":"9783642407796"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_13","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T11:32:11Z","timestamp":1379331131000},"page":"152-161","source":"Crossref","is-referenced-by-count":29,"title":["Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity"],"prefix":"10.1007","author":[{"given":"Takayuki","family":"Yamada","sequence":"first","affiliation":[]},{"given":"Seiichi","family":"Gohshi","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"13_CR1","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"L. Cutillo","year":"2009","unstructured":"Cutillo, L., Molva, R.: Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine\u00a047(12), 94\u2013101 (2009)","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"13_CR2","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B. Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J., Horn, A.: Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication\u00a015(1), 83\u2013108 (2009)","journal-title":"Journal of Computer-Mediated Communication"},{"key":"13_CR3","first-page":"341","volume":"313","author":"J. Blackman","year":"2009","unstructured":"Blackman, J.: Omniveillance, Google, Privacy in Public, and the Right to Your Digital Identity: A Tort for Recording and Disseminating an Individual\u2019s Image Over the Internet. 49 Santa Clara Law Review\u00a0313, 341\u2013392 (2009)","journal-title":"49 Santa Clara Law Review"},{"key":"13_CR4","unstructured":"Face Recognition Study FAQ, \n                      \n                        http:\/\/www.heinz.cmu.edu\/~acquisti\/face-recognition-study-FAQ\/"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Yamada, T., Gohshi, S., Echizen, I.: Preventing re-recording based on difference between sensory perceptions of humans and devices. In: Proc. of the 17th International Conference on Image Processing, ICIP 2010, pp. 993\u2013996 (2010)","DOI":"10.1109\/ICIP.2010.5650525"},{"key":"13_CR6","unstructured":"GAIA, VEASYBLE, \n                      \n                        http:\/\/www.veasyble.com\/index.html"},{"key":"13_CR7","unstructured":"Harvey, A.: CV Dazzle, \n                      \n                        http:\/\/ahprojects.com\/projects\/cv-dazzle"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/10720076_12","volume-title":"MICAI 2000: Advances in Artificial Intelligence","author":"R.S. Feris","year":"2000","unstructured":"Feris, R.S., de Campos, T.E., Cesar Jr., R.M.: Detection and Tracking of Facial Features in Video Sequences. In: Cair\u00f3, O., Cant\u00fa, F.J. (eds.) MICAI 2000. LNCS, vol.\u00a01793, pp. 127\u2013135. Springer, Heidelberg (2000)"},{"issue":"2","key":"13_CR9","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P. Viola","year":"2004","unstructured":"Viola, P., Jones, M.: Robust Real-Time Face Detection. International Journal of Computer Vision (IJCV)\u00a057(2), 134\u2013157 (2004)","journal-title":"International Journal of Computer Vision (IJCV)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Schanda, J. (ed.): Colorimetry: Understanding the CIE System. Wiley-Interscience (2007)","DOI":"10.1002\/9780470175637"},{"key":"13_CR11","unstructured":"Holst, G., Lomheim, T.: CMOS\/CCD Sensors and Camera Systems. SPIE-International Society for Optical Engine (2007)"},{"key":"13_CR12","unstructured":"Bradski, G., Kaehler, A.: Learning Open CV Computer Vision with the Open CV Library. O\u2019Reilly Media (2008)"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-540-45243-0_39","volume-title":"Pattern Recognition","author":"R. Lienhart","year":"2003","unstructured":"Lienhart, R., Kuranov, A., Pisarevsky, V.: Empirical Analysis of Detection Cascades of Boosted Classifiers for Rapid Object Detection. In: Michaelis, B., Krell, G. (eds.) DAGM 2003. LNCS, vol.\u00a02781, pp. 297\u2013304. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T09:54:21Z","timestamp":1558086861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40779-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40779-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}