{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:22:43Z","timestamp":1743042163263,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":108,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642415111"},{"type":"electronic","value":"9783642415128"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41512-8_5","type":"book-chapter","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T14:16:12Z","timestamp":1385561772000},"page":"83-105","source":"Crossref","is-referenced-by-count":6,"title":["Surveillance Privacy Protection"],"prefix":"10.1007","author":[{"given":"Nikki","family":"Gulzar","sequence":"first","affiliation":[]},{"given":"Basra","family":"Abbasi","sequence":"additional","affiliation":[]},{"given":"Eddie","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Ozbal","sequence":"additional","affiliation":[]},{"given":"WeiQi","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"5_CR1","first-page":"1","volume":"3","author":"A. Adams","year":"2012","unstructured":"Adams, A., Ferryman, J.M.: The future of video analytics for surveillance and its ethical implications. Secur. J. 3(1), 1\u201322 (2012)","journal-title":"Secur. J."},{"key":"5_CR2","volume-title":"The Right to Privacy","author":"E. Alderman","year":"1995","unstructured":"Alderman, E., Kennedy, C.: The Right to Privacy. Vintage Book, New York (1995)"},{"key":"5_CR3","first-page":"1","volume":"2","author":"B.D. Baker","year":"2005","unstructured":"Baker, B.D., Gunter, W.D.: Surveillance: concepts and practices for fraud, security and crime investigation. Int. Found. Prot. Off. 2, 1\u201317 (2005)","journal-title":"Int. Found. Prot. Off."},{"key":"5_CR4","first-page":"105","volume":"4","author":"T. Barrett","year":"2010","unstructured":"Barrett, T.: Data privacy day is just around the corner\u2014are you respecting privacy, safeguarding data and enabling trust? Nat. Cyber Secur. Alliance 4, 105\u2013114 (2010)","journal-title":"Nat. Cyber Secur. Alliance"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1111\/j.1083-6101.2009.01461.x","volume":"14","author":"N.K. Baym","year":"2009","unstructured":"Baym, N.K.: A call for grounding in the face of blurred boundaries. J. Comput.-Mediat. Commun. 14(3), 720\u2013723 (2009)","journal-title":"J. Comput.-Mediat. Commun."},{"key":"5_CR6","first-page":"77","volume":"3","author":"T. Beagle","year":"2009","unstructured":"Beagle, T.: Search and surveillance act threatens privacy. Tech Lib. NZ 3, 77\u201385 (2009)","journal-title":"Tech Lib. NZ"},{"issue":"1","key":"5_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2005.9","volume":"2","author":"E. Bertino","year":"2005","unstructured":"Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secure Comput. 2(1), 2\u201319 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR8","volume-title":"Face Processing, Advanced Modeling and Methods","author":"R. Beveridge","year":"2005","unstructured":"Beveridge, R., Draper, B., Givens, G., Fisher, W.: Introduction to the statistical evaluation of face recognition algorithms. In: Face Processing, Advanced Modeling and Methods. Elsevier, Amsterdam (2005)"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/CVIIE.2005.16","volume-title":"Proceedings of the Computer Vision for Interactive and Intelligent Environment","author":"T.E. Boult","year":"2005","unstructured":"Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: Proceedings of the Computer Vision for Interactive and Intelligent Environment, pp. 27\u201338 (2005)"},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/MTAS.2004.1273467","volume":"23","author":"K.W. Bowyer","year":"2004","unstructured":"Bowyer, K.W.: Face recognition technology: security versus privacy. IEEE Technol. Soc. Mag. 23(1), 9\u201319 (2004)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"5_CR11","first-page":"1306","volume":"1","author":"C. Calvel","year":"2005","unstructured":"Calvel, C., Ehrette, T., Richard, G.: Event detection for audio-based surveillance system. IEEE Multimed. Expo. 1, 1306\u20131309 (2005)","journal-title":"IEEE Multimed. Expo."},{"key":"5_CR12","volume-title":"Communications: Technologies for Expression and for Censorship","author":"G. Capdevila","year":"2003","unstructured":"Capdevila, G.: Communications: Technologies for Expression and for Censorship. Inter. Press Service, Geneva (2003)"},{"key":"5_CR13","first-page":"273","volume-title":"IEEE ICME","author":"P. Carrillo","year":"2008","unstructured":"Carrillo, P., Kalva, H., Magliveras, S.: Compression independent object encryption for ensuring privacy in video surveillance. In: IEEE ICME, pp. 273\u2013276 (2008)"},{"key":"5_CR14","first-page":"20","volume":"5","author":"M. Carter","year":"2006","unstructured":"Carter, M., DeMolay, J., Kuszai, J.: Global positioning satellites as surveillance devices. Prog. Astronaut. Aeronaut. 5, 20\u201328 (2006)","journal-title":"Prog. Astronaut. Aeronaut."},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/MSP.2007.323270","volume":"24","author":"A. Cavallaro","year":"2007","unstructured":"Cavallaro, A.: Privacy in video surveillance. IEEE Signal Process. Mag. 24(2), 168\u2013169 (2007)","journal-title":"IEEE Signal Process. Mag."},{"issue":"1","key":"5_CR16","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1186\/s13634-023-01060-9","volume":"1","author":"D. Chen","year":"2007","unstructured":"Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Adv. Signal Process. 1(1), 107 (2007)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"2","key":"5_CR17","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-77409-9_14","volume":"4903","author":"K. Chinomi","year":"2008","unstructured":"Chinomi, K., Nitta, N., lto, Y., Babaguchi, N.: PriSurv: privacy protected video surveillance system using adaptive visual abstraction. Adv. Multimed. Model. Lect. Notes Comput. Sci. 4903(2), 144\u2013154 (2008)","journal-title":"Adv. Multimed. Model. Lect. Notes Comput. Sci."},{"key":"5_CR18","first-page":"2","volume":"1","author":"D.K. Citron","year":"2012","unstructured":"Citron, D.K., Gray, D.: Total surveillance\u2019s privacy harms: a reply to Professor Neil Richards. Harvard Law Rev. 1, 2\u201310 (2012)","journal-title":"Harvard Law Rev."},{"issue":"2","key":"5_CR19","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/293411.293475","volume":"42","author":"R. Clarke","year":"1999","unstructured":"Clarke, R.: Internet privacy concerns confirm the case for intervention. Commun. ACM 42(2), 60\u201367 (1999)","journal-title":"Commun. ACM"},{"key":"5_CR20","unstructured":"Collins, R.T., Lipton, A.J., Kanade, T., Fujiyoshi, H., Duggins, D., Tsin, Y., Tolliver, D., Enomoto, N., Hasegawa, O., Burt, P., Wixson, L.: A system for video surveillance and monitoring. United States of America: Robotics Institute at Carnegie Mellon University (CMU) (2000). http:\/\/www.ri.cmu.edu\/publication_view.html?pub_id=3325"},{"issue":"1","key":"5_CR21","first-page":"3","volume":"1","author":"W.D. Cotton","year":"2007","unstructured":"Cotton, W.D., Uson, J.M.: Image pixelization and dynamic range. Nat. Radio Astron. Obs. 1(1), 3\u201310 (2007)","journal-title":"Nat. Radio Astron. Obs."},{"issue":"1","key":"5_CR22","first-page":"455","volume":"490","author":"W.D. Cotton","year":"2008","unstructured":"Cotton, W.D., Uson, J.M.: Pixelization and dynamic range in radio interferometry. Astron. Instrum. 490(1), 455\u2013460 (2008)","journal-title":"Astron. Instrum."},{"issue":"3","key":"5_CR23","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1108\/14684520910969871","volume":"33","author":"R. Cullen","year":"2009","unstructured":"Cullen, R.: Identify and information privacy in the age of digital government. Online Inf. Rev. 33(3), 405\u2013421 (2009)","journal-title":"Online Inf. Rev."},{"issue":"4","key":"5_CR24","first-page":"375","volume":"49","author":"J.F. DeBeer","year":"2009","unstructured":"DeBeer, J.F., Clemmer, C.D.: Global trends in online copyright enforcement: a non-neutral role for network intermediaries? Jurimetrics 49(4), 375\u2013409 (2009)","journal-title":"Jurimetrics"},{"key":"5_CR25","first-page":"257","volume-title":"Introduction to Private Security","author":"J.S. Dempsey","year":"2010","unstructured":"Dempsey, J.S.: Electronic surveillance and interception. In: Introduction to Private Security, vol. 4, p. 257 (2010)"},{"issue":"2","key":"5_CR26","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1049\/ip-vis:20041234","volume":"152","author":"X. Desurmont","year":"2005","unstructured":"Desurmont, X., Bastide, A., Chaudy, C., Parisot, C., Delaigle, J., Macq, B.: Image analysis architectures and techniques for intelligent surveillance systems. IEE Proc., Vis. Image Signal Process. 152(2), 224\u2013231 (2005)","journal-title":"IEE Proc., Vis. Image Signal Process."},{"issue":"12","key":"5_CR27","first-page":"975","volume":"27","author":"T. Doi","year":"1979","unstructured":"Doi, T., Itoh, T., Ogawa, H.: A long-play digital audio disk system. J. Audio Eng. Soc. 27(12), 975\u2013981 (1979)","journal-title":"J. Audio Eng. Soc."},{"key":"5_CR28","first-page":"377","volume-title":"IEEE ICASSP\u201904","author":"X. Dong","year":"2004","unstructured":"Dong, X.: Data hiding via phase manipulation of audio signals. In: IEEE ICASSP\u201904, pp.\u00a0377\u2013380 (2004)"},{"key":"5_CR29","first-page":"87","volume":"2","author":"R. Dube","year":"2005","unstructured":"Dube, R.: How to protect yourself from government cellphone surveillance. N.Y. Times 2, 87\u201395 (2005)","journal-title":"N.Y. Times"},{"key":"5_CR30","first-page":"1688","volume-title":"IEEE ICIP","author":"F. Dufaux","year":"2008","unstructured":"Dufaux, F., Ebrahimi, T.: H.264\/AVC video scrambling for privacy protection. In: IEEE ICIP, pp. 1688\u20131691 (2008)"},{"key":"5_CR31","first-page":"66","volume-title":"IEEE ICME","author":"F. Dufaux","year":"2010","unstructured":"Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: IEEE ICME, pp. 66\u201371 (2010)"},{"key":"5_CR32","first-page":"22","volume":"1","author":"M. Fickes","year":"2004","unstructured":"Fickes, M.: Automated eye in the sky. Gov. Secur. 1, 22 (2004)","journal-title":"Gov. Secur."},{"key":"5_CR33","first-page":"75","volume-title":"Protecting Privacy in Surveillance Societies","author":"D. Flaherty","year":"1989","unstructured":"Flaherty, D.: Protecting Privacy in Surveillance Societies, vol. 22(17), pp. 75\u201389. University of North Carolina Press, Chapel Hill (1989)"},{"key":"5_CR34","first-page":"82","volume":"3","author":"J. Flemming","year":"2003","unstructured":"Flemming, J.: Privacy: the menace of satellite surveillance. USA Evid. Lawsuit Filed 3, 82\u2013105 (2003)","journal-title":"USA Evid. Lawsuit Filed"},{"issue":"1","key":"5_CR35","first-page":"10","volume":"3","author":"D.T. Fraser","year":"2004","unstructured":"Fraser, D.T.: Privacy law and video surveillance: guidance from the ontario courts. Mcinnes Cooper 3(1), 10\u201313 (2004)","journal-title":"Mcinnes Cooper"},{"key":"5_CR36","first-page":"4","volume":"1","author":"N. Gilens","year":"2012","unstructured":"Gilens, N.: New justice department documents show huge increase in warrantless electronic surveillance. ACLU Speech, Priv. Technol. Proj. 1, 4\u20137 (2012)","journal-title":"ACLU Speech, Priv. Technol. Proj."},{"issue":"2","key":"5_CR37","first-page":"9","volume":"3","author":"V. Gouaillier","year":"2009","unstructured":"Gouaillier, V.: Intelligent video surveillance: promises and challenges technological and commercial intelligence report. CRIM Technop\u00f4le Def. Secur. 3(2), 9\u201368 (2009)","journal-title":"CRIM Technop\u00f4le Def. Secur."},{"issue":"7","key":"5_CR38","first-page":"1855","volume":"88","author":"L. Graves","year":"2010","unstructured":"Graves, L.: The right to privacy in light of presidents\u2019 programs: what project MINARET\u2019s admissions reveal about modern surveillance of Americans. Tex. Law Rev. 88(7), 1855\u20131904 (2010)","journal-title":"Tex. Law Rev."},{"issue":"3","key":"5_CR39","doi-asserted-by":"crossref","first-page":"314","DOI":"10.24908\/ss.v1i3.3343","volume":"1","author":"M. Gray","year":"2003","unstructured":"Gray, M.: Urban surveillance and panopticism: will we recognize the facial recognition society? Surveill. Soc. 1(3), 314\u2013330 (2003)","journal-title":"Surveill. Soc."},{"key":"5_CR40","first-page":"1","volume":"4","author":"C. Grigoras","year":"2003","unstructured":"Grigoras, C.: Digital audio recording analysis: the electric network frequency criterion. Diam. Cut Product. Inc. 4, 1\u20136 (2003)","journal-title":"Diam. Cut Product. Inc."},{"key":"5_CR41","first-page":"3729","volume-title":"Machine Learning and Cybernetics","author":"G.S. Gu","year":"2006","unstructured":"Gu, G.S., Han, G.Q.: The application of chaos and DWT in image scrambling. In: Machine Learning and Cybernetics, pp. 3729\u20133733 (2006)"},{"issue":"2","key":"5_CR42","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2005.1406476","volume":"22","author":"A. Hampapur","year":"2005","unstructured":"Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Process. Mag. 22(2), 38\u201351 (2005)","journal-title":"IEEE Signal Process. Mag."},{"issue":"6","key":"5_CR43","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1177\/0268580910394007","volume":"26","author":"S.P. Hier","year":"2011","unstructured":"Hier, S.P., Walby, K.: Privacy pragmatism and streetscape video surveillance in Canada. Int. Sociol. 26(6), 844\u2013861 (2011)","journal-title":"Int. Sociol."},{"key":"5_CR44","first-page":"30","volume":"2","author":"M. Hill","year":"2004","unstructured":"Hill, M.: Government funds chat room surveillance research. USA Today Tech 2, 30\u201338 (2004)","journal-title":"USA Today Tech"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Hooper, T., Vos, M.: Establishing business integrity in an online environment: an examination of New Zealand web site privacy notices. Online Inf. Rev., 343\u2013361 (2009)","DOI":"10.1108\/14684520910951258"},{"issue":"1","key":"5_CR46","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/S0734-189X(87)80153-6","volume":"38","author":"R.A. Hummel","year":"1987","unstructured":"Hummel, R.A., Kimia, B., Zucker, S.W.: Deblurring Gaussian blur. Comput. Vis. Graph. Image Process. 38(1), 66\u201380 (1987)","journal-title":"Comput. Vis. Graph. Image Process."},{"issue":"1","key":"5_CR47","first-page":"192","volume":"37","author":"R.S. Julie","year":"2000","unstructured":"Julie, R.S.: High-tech surveillance tools and the fourth amendment: reasonable expectations of privacy in the technological age. Am. Crim. Law Rev. 37(1), 192\u2013222 (2000)","journal-title":"Am. Crim. Law Rev."},{"issue":"5","key":"5_CR48","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/j.patcog.2003.10.012","volume":"37","author":"K. Junga","year":"2004","unstructured":"Junga, K., Kimb, K.I., Jainc, A.K.: Text information extraction in images and video: a survey. Pattern Recognit. 37(5), 977\u2013997 (2004)","journal-title":"Pattern Recognit."},{"key":"5_CR49","first-page":"17","volume-title":"Video Surveillance","author":"A. Karimaa","year":"2011","unstructured":"Karimaa, A.: Efficient video surveillance: performance evaluation in distributed video surveillance systems. In: Video Surveillance, pp. 17\u201326. InTech, Rijeka (2011)"},{"issue":"2","key":"5_CR50","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1191\/030913200668791096","volume":"24","author":"H. Koskela","year":"2000","unstructured":"Koskela, H.: \u2018The gaze without eyes\u2019: video-surveillance and the changing nature of urban space. Prog. Hum. Geogr. 24(2), 243\u2013265 (2000)","journal-title":"Prog. Hum. Geogr."},{"issue":"1","key":"5_CR51","first-page":"46","volume":"2","author":"G.S. Kumar","year":"2011","unstructured":"Kumar, G.S., Ragu, S., Kumar, N.S.: Embedded video surveillance with real time monitoring on web. Int. J. Math. Trends Technol. 2(1), 46\u201349 (2011)","journal-title":"Int. J. Math. Trends Technol."},{"key":"5_CR52","first-page":"62","volume-title":"The Economist Intelligence","author":"S. Labaton","year":"2007","unstructured":"Labaton, S.: Learning to live with big brother, from civil liberties: surveillance and privacy. In: The Economist Intelligence, vol. 384(8548), pp. 62\u201364 (2007)"},{"key":"5_CR53","doi-asserted-by":"crossref","DOI":"10.46692\/9781847421272","volume-title":"The Glass Consumer: Life in a Surveillance Society","author":"S. Lace","year":"2005","unstructured":"Lace, S.: The Glass Consumer: Life in a Surveillance Society. Policy Press, Bristol (2005)"},{"key":"5_CR54","unstructured":"Lambert, T.A.: Digital surveillance system with pre-event recording. U.S. Patent WO\/2001\/035668 (2001)"},{"key":"5_CR55","first-page":"273","volume-title":"Proceedings of UbiComp","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design\u2014principles of privacy-aware ubiquitous systems. In: Proceedings of UbiComp, pp. 273\u2013291 (2001)"},{"issue":"4","key":"5_CR56","first-page":"2","volume":"3","author":"G. Li","year":"2009","unstructured":"Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Multimed. Inf. Secur. 3(4), 2\u20139 (2009)","journal-title":"EURASIP J. Multimed. Inf. Secur."},{"issue":"4","key":"5_CR57","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1111\/j.1468-4446.2011.01389_7.x","volume":"62","author":"D. Lyon","year":"2011","unstructured":"Lyon, D.: Identifying citizens: ID cards as surveillance. Br. J. Sociol. 62(4), 749\u2013750 (2011)","journal-title":"Br. J. Sociol."},{"key":"5_CR58","first-page":"2264","volume-title":"IEEE TENCON","author":"S. Maheshwari","year":"2010","unstructured":"Maheshwari, S., Gunjan, R., Laxmi, V., Gour, M.S.: A DCT based permuted image digital watermarking method. In: IEEE TENCON, pp. 2264\u20132268 (2010)"},{"issue":"3","key":"5_CR59","doi-asserted-by":"crossref","first-page":"331","DOI":"10.24908\/ss.v1i3.3344","volume":"1","author":"S. Mann","year":"2003","unstructured":"Mann, S., Nolan, J., Wellman, B.: Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. IEEE Surveill. Soc. 1(3), 331\u2013355 (2003)","journal-title":"IEEE Surveill. Soc."},{"issue":"8","key":"5_CR60","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1109\/TCSVT.2008.927110","volume":"18","author":"K. Martin","year":"2008","unstructured":"Martin, K., Plataniotis, K.N.: Privacy protected surveillance using secure visual object coding. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1152\u20131162 (2008)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"5_CR61","first-page":"101","volume":"2","author":"A. McCarthy","year":"2012","unstructured":"McCarthy, A.: Closed circuit television. Mus. Broadcast Commun. 2, 101 (2012)","journal-title":"Mus. Broadcast Commun."},{"key":"5_CR62","first-page":"8","volume":"1","author":"D. McCullagh","year":"2012","unstructured":"McCullagh, D.: Privacy bill requires search warrants for e-mail. Cell Track. 1, 8\u201313 (2012)","journal-title":"Cell Track."},{"key":"5_CR63","volume-title":"Modern Data Management","author":"P. Milan","year":"2007","unstructured":"Milan, P., Jonker, W.: Security, privacy, and trust. In: Modern Data Management. Springer, New York (2007)"},{"key":"5_CR64","first-page":"1","volume":"1","author":"M. Miller","year":"2005","unstructured":"Miller, M.: Understanding digital audio formats. Que Publ. 1, 1\u20134 (2005)","journal-title":"Que Publ."},{"key":"5_CR65","first-page":"3","volume":"2","author":"T. Millett","year":"2012","unstructured":"Millett, T.: Copyright guidelines for research student. Libr. Consort. N.Z. 2, 3\u201314 (2012)","journal-title":"Libr. Consort. N.Z."},{"key":"5_CR66","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1145\/1753326","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"E. Mynatt","year":"2010","unstructured":"Mynatt, E., Back, M., Want, R., Baer, M., Ellis, J.: Designing audio aura. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 566\u2013573 (2010)"},{"issue":"2","key":"5_CR67","first-page":"84","volume":"20","author":"T. Nabbali","year":"2004","unstructured":"Nabbali, T., Perry, M.: Computer law & security report. Elsevier Sci. Ltd. 20(2), 84\u201394, (2004)","journal-title":"Elsevier Sci. Ltd."},{"key":"5_CR68","first-page":"20","volume":"5","author":"A. Nagendran","year":"2010","unstructured":"Nagendran, A., Harper, D., Shah, M.: New system performs persistent wide-area aerial surveillance. SPIE Newsroom 5, 20\u201328 (2010)","journal-title":"SPIE Newsroom"},{"issue":"2","key":"5_CR69","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"E.M. Newton","year":"2005","unstructured":"Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232\u2013243 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2\/3","key":"5_CR70","first-page":"110","volume":"2","author":"C. Norris","year":"2004","unstructured":"Norris, C., McCahill, M., Wood, D.: The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveill. Soc. 2(2\/3), 110\u2013135 (2004)","journal-title":"Surveill. Soc."},{"issue":"4","key":"5_CR71","first-page":"1125","volume":"75","author":"G. Orwell","year":"2002","unstructured":"Orwell, G.: Go on, watch me: people are voluntarily surrendering their privacy. The Economist 75(4), 1125\u20131192 (2002)","journal-title":"The Economist"},{"issue":"3","key":"5_CR72","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2005.65","volume":"3","author":"S. Pankanti","year":"2005","unstructured":"Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50\u201357 (2005)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"5_CR73","first-page":"18","volume":"8","author":"J.K. Paruchuri","year":"2009","unstructured":"Paruchuri, J.K., Cheung, C.S., Hail, M.W.: Video data hiding for managing privacy information in surveillance systems. EURASIP J. Multimed. Inf. Secur. 8(3), 18 (2009)","journal-title":"EURASIP J. Multimed. Inf. Secur."},{"key":"5_CR74","first-page":"586","volume-title":"Proceedings of IEEE CVPR","author":"A. Pentland","year":"1991","unstructured":"Pentland, A.: Face recognition using eigenfaces. In: Proceedings of IEEE CVPR, pp. 586\u2013591 (1991)"},{"issue":"10","key":"5_CR75","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/34.879790","volume":"22","author":"P.J. Phillips","year":"2000","unstructured":"Phillips, P.J., Moon, H., Rauss, P.J., Rizvi, S.A.: The FERET evaluation methodology for face recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 252\u2013274 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"5_CR76","first-page":"380","volume":"5","author":"D.A. Pollock","year":"2002","unstructured":"Pollock, D.A.: Method of electronic audio surveillance. Law J. Libr. 5(12), 380\u2013385 (2002)","journal-title":"Law J. Libr."},{"key":"5_CR77","first-page":"40","volume":"1","author":"K. Poulsen","year":"2007","unstructured":"Poulsen, K.: FBI\u2019s secret spyware tracks down teen who made bomb threats. Priv. Secur. Crime Online 1, 40\u201344 (2007)","journal-title":"Priv. Secur. Crime Online"},{"key":"5_CR78","first-page":"177","volume-title":"Proceedings of International Conference on Circuits, System and Simulation","author":"I. Promyarut","year":"2011","unstructured":"Promyarut, I., Suvonvorn, N., Limsiroratana, S.: Video scrambling for privacy protection in surveillance system. In: Proceedings of International Conference on Circuits, System and Simulation, pp. 177\u2013182 (2011)"},{"key":"5_CR79","volume-title":"Discrete Cosine Transform: Algorithms, Advantages, Applications","author":"K.R. Rao","year":"2007","unstructured":"Rao, K.R., Yip, P.C., Britanak, V.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press, San Diego (2007)"},{"key":"5_CR80","volume-title":"Campus Technology","author":"D. Raths","year":"2011","unstructured":"Raths, D.: Video surveillance: all eyes turn to IP. In: Campus Technology (2011)"},{"key":"5_CR81","first-page":"12","volume":"2","author":"R. Richmond","year":"2009","unstructured":"Richmond, R.: 12 ways technology threatens your privacy (and how to protect yourself). Inf. Manag. Comput. Secur. 2, 12\u201313 (2009)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"5_CR82","first-page":"15","volume":"2","author":"M. Roberti","year":"2005","unstructured":"Roberti, M.: Two stories higlight the RFID debate. RFID J. 2, 15\u201322 (2005)","journal-title":"RFID J."},{"issue":"6","key":"5_CR83","first-page":"98","volume":"85","author":"R.I. Rubin","year":"2011","unstructured":"Rubin, R.I., Stempler, M.J.: Video surveillance in personal injury cases. Fla. Bar J. 85(6), 98 (2011)","journal-title":"Fla. Bar J."},{"key":"5_CR84","doi-asserted-by":"crossref","unstructured":"Saini, M., Atrey, P.K., Mehrota, S., Kankanhalli, M.S.: W3-privacy: understanding what, when and where inference channels in multi-camera surveillance video. Multimed. Tools Appl., 1\u201324 (2012)","DOI":"10.1007\/s11042-012-1207-9"},{"issue":"9","key":"5_CR85","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1109\/TCSVT.2007.905532","volume":"17","author":"H. Schwarz","year":"2007","unstructured":"Schwarz, H., Marpe, D., Wiegand, T.: Overview of the scalable video coding extension of the H.264\/AVC standard. IEEE Trans. Circuits Syst. Video Technol. 17(9), 1103\u20131120 (2007)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"5_CR86","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3","volume-title":"Protecting Privacy in Video Surveillance","author":"A. Senior","year":"2009","unstructured":"Senior, A.: Protecting Privacy in Video Surveillance. Springer, London (2009)"},{"key":"5_CR87","unstructured":"Shamsi, H., Abdo A, A.: Privacy and surveillance post-9\/11. Hum. Rights 38(1) (2011)"},{"issue":"1\u20132","key":"5_CR88","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s11263-009-0273-6","volume":"87","author":"L. Sigal","year":"2010","unstructured":"Sigal, L., Balan, A.O., Black, M.J.: Synchronized video and motion capture dataset and baseline algorithm for evaluation of articulated human motion. Int. J. Comput. Vis. 87(1\u20132), 4\u201327 (2010)","journal-title":"Int. J. Comput. Vis."},{"key":"5_CR89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2011\/190431","volume":"2","author":"F.D. Simone","year":"2011","unstructured":"Simone, F.D., Naccari, M., Tagliasacchi, M., Dufaux, F., Tubaro, S., Ebrahimi, T.: Subjective quality assessment of H.264\/AVC video streaming with packet losses. AEURASIP J. Image Video Process. 2, 1\u201312 (2011)","journal-title":"AEURASIP J. Image Video Process."},{"issue":"2","key":"5_CR90","first-page":"30","volume":"72","author":"C. Slobogin","year":"2002","unstructured":"Slobogin, C.: Public privacy: camera surveillance of public places and the right to anonymity. Miss. Law J. 72(2), 30\u201360 (2002)","journal-title":"Miss. Law J."},{"key":"5_CR91","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226762944.001.0001","volume-title":"Privacy at Risk: The New Government Surveillance and the Fourth Amendment","author":"C. Slobogin","year":"2007","unstructured":"Slobogin, C.: Privacy at Risk: The New Government Surveillance and the Fourth Amendment. University of Chicago Press, Chicago (2007)"},{"key":"5_CR92","unstructured":"Smithsimon, M.: Private lives, public spaces: the surveillance state. Dissertation, University of Pennsylvania Press, USA (2003)"},{"issue":"3","key":"5_CR93","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00530-007-0083-z","volume":"13","author":"D. Socek","year":"2007","unstructured":"Socek, D., Kalva, H., Magliveras, S.S., Marques, O., Culibrk, D., Furht, B.: New approaches to encryption and steganography for digital videos. Multimed. Syst. 13(3), 191\u2013204 (2007)","journal-title":"Multimed. Syst."},{"key":"5_CR94","first-page":"424","volume-title":"IEEE AVSS","author":"H. Sohn","year":"2009","unstructured":"Sohn, H., AnzaKu, E., Neve, W., Ro, Y.M., Plataniotis, K.: Privacy protection in video surveillance systems using scalable video coding. In: IEEE AVSS, pp. 424\u2013429 (2009)"},{"key":"5_CR95","first-page":"111","volume-title":"Effective Surveillance for Homeland Security. Balancing Technology and Social Issues","author":"H. Sohn","year":"2013","unstructured":"Sohn, H., Lee, D., Neve, W.D., Plataniotis, K.N., Ro, Y.M.: An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR. In: Effective Surveillance for Homeland Security. Balancing Technology and Social Issues, vol. 3, pp. 111\u2013140 (2013)"},{"key":"5_CR96","volume-title":"The Digital Person: Technology and Privacy in the Information Age","author":"D.J. Solove","year":"2004","unstructured":"Solove, D.J.: The Digital Person: Technology and Privacy in the Information Age. NYU Press, New York (2004)"},{"issue":"3","key":"5_CR97","first-page":"110","volume":"42","author":"R.N. Strassfeld","year":"2010","unstructured":"Strassfeld, R.N., Ough, C.: Somebody\u2019s watching me: surveillance and privacy in an age of national insecurity. Case West. Reserve J. Int. Law 42(3), 110\u2013543 (2010)","journal-title":"Case West. Reserve J. Int. Law"},{"key":"5_CR98","volume-title":"Cybercrime: Law Enforcement, Security and Surveillance in the Information Age","author":"D. Thomas","year":"2000","unstructured":"Thomas, D., Loader, B.D.: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Routledge, London (2000)"},{"key":"5_CR99","first-page":"9","volume":"1","author":"L. Tien","year":"2003","unstructured":"Tien, L., Abernathy, W.: Biometrics: who\u2019s watching you? Electron. Front. Found. 1, 9\u201311 (2003)","journal-title":"Electron. Front. Found."},{"issue":"6","key":"5_CR100","first-page":"21","volume":"64","author":"B. Trent","year":"2004","unstructured":"Trent, B.: Technology and tomorrow: a challenge to liberty. Humanist 64(6), 21\u201324 (2004)","journal-title":"Humanist"},{"issue":"4","key":"5_CR101","doi-asserted-by":"publisher","first-page":"597","DOI":"10.5840\/soctheorpract200935434","volume":"35","author":"M. Tunick","year":"2009","unstructured":"Tunick, M.: Privacy in public places: do GPS and video surveillance provide plain views? Soc. Theory Pract. 35(4), 597\u2013622 (2009)","journal-title":"Soc. Theory Pract."},{"key":"5_CR102","unstructured":"Vaile, D.: Law in the information age 2.0. Masters Thesis, The University of New South Wales, Australia (2012)"},{"key":"5_CR103","first-page":"21","volume-title":"IEEE AVSS","author":"G. Valenzise","year":"2007","unstructured":"Valenzise, G., Gerosa, L., Tagliasacchi, M., Antonacci, F., Sarti, A.: Scream and gunshot detection and localisation for audio surveillance. In: IEEE AVSS, pp. 21\u201326 (2007)"},{"issue":"2","key":"5_CR104","first-page":"10","volume":"5","author":"R. Walczak","year":"2011","unstructured":"Walczak, R.: Network video surveillance technology tools expectations. Real World Video Surveill. 5(2), 10\u201316 (2011)","journal-title":"Real World Video Surveill."},{"issue":"1","key":"5_CR105","first-page":"81","volume":"4","author":"A.B. Waterson","year":"1994","unstructured":"Waterson, A.B.: Image compression using the discrete consine transform. Math. J. 4(1), 81\u201388 (1994)","journal-title":"Math. J."},{"key":"5_CR106","first-page":"437","volume-title":"IEEE ICIP","author":"S.J. Wee","year":"2001","unstructured":"Wee, S.J., Apostolopoulos, J.G.: Secure scalable streaming enabling transcoding without decryption. In: IEEE ICIP, pp. 437\u2013440 (2001)"},{"key":"5_CR107","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/AFGR.1998.670971","volume-title":"Proceedings of IEEE International Conference on Automatic Face and Gesture Recognition","author":"W. Zhao","year":"1998","unstructured":"Zhao, W., Chellappa, R., Krishnaswamy, A., Wen, J.: Discriminant analysis of principal components for face recognition. In: Proceedings of IEEE International Conference on Automatic Face and Gesture Recognition, pp. 336\u2013341 (1998)"},{"key":"5_CR108","unstructured":"Zhou, N., Zhou, M.L., Xu, Y.P.: BACnet for video surveillance. BACnet Today, 18\u201323 (2004)"}],"container-title":["Intelligent Multimedia Surveillance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41512-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T15:31:28Z","timestamp":1716219088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-41512-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642415111","9783642415128"],"references-count":108,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41512-8_5","relation":{},"subject":[],"published":{"date-parts":[[2013]]}}}