{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T06:35:41Z","timestamp":1648881341056},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s11042-019-7376-z","type":"journal-article","created":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T18:03:31Z","timestamp":1552500211000},"page":"14091-14108","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A context-driven privacy enforcement system for autonomous media capture devices"],"prefix":"10.1007","volume":"78","author":[{"given":"Giovanni Maria","family":"Farinella","sequence":"first","affiliation":[]},{"given":"Christian","family":"Napoli","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Nicotra","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"Riccobene","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"key":"7376_CR1","unstructured":"Abowd G, Rehg J, Starner T, Arriaga R (2007) Using information technologies to support detection of developmental delay. In: Assisted cognition workshop"},{"key":"7376_CR2","doi-asserted-by":"crossref","unstructured":"Aditya P, Sen R, Druschel P, Joon Oh S, Benenson R, Fritz M, Schiele B, Bhattacharjee B, Wu TT (2016) I-pic: a platform for privacy-compliant image capture. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services, pp 235\u2013248. ACM","DOI":"10.1145\/2906388.2906412"},{"issue":"1","key":"7376_CR3","first-page":"47","volume":"75","author":"AL Allen","year":"2008","unstructured":"Allen AL (2008) Dredging up the past: lifelogging, memory, and surveillance. The University of Chicago Law Review 75(1):47\u201374","journal-title":"The University of Chicago Law Review"},{"issue":"15","key":"7376_CR4","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"7376_CR5","doi-asserted-by":"crossref","unstructured":"Avidan S, Butman M (2006) Blind vision. In: European conference on computer vision, pp 1\u201313. Springer","DOI":"10.1007\/11744078_1"},{"key":"7376_CR6","unstructured":"Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing system (NIPS), pp 57\u201364"},{"key":"7376_CR7","doi-asserted-by":"crossref","unstructured":"Battiato S, Farinella GM, Napoli C, Nicotra G, Riccobene S (2017) Recognizing context for privacy preserving of first person vision image sequences. In: International conference on image analysis and processing, pp 580\u2013590. Springer","DOI":"10.1007\/978-3-319-68548-9_53"},{"key":"7376_CR8","doi-asserted-by":"crossref","unstructured":"Bay H, Tuytelaars T, Van Gool L (2006) Surf: Speeded up robust features. In: Computer vision \u2013 ECCV 2006, pp 404\u2013417. Springer, Berlin","DOI":"10.1007\/11744023_32"},{"key":"7376_CR9","doi-asserted-by":"crossref","unstructured":"Bo C, Shen G, Liu J, Li XY, Zhang Y, Zhao F (2014) Privacy. tag: Privacy concern expressed and respected. In: Proceedings of the 12th ACM conference on embedded network sensor systems, pp 163\u2013176. ACM","DOI":"10.1145\/2668332.2668339"},{"key":"7376_CR10","doi-asserted-by":"crossref","unstructured":"Butler DJ, Huang J, Roesner F, Cakmak M (2015) The privacy-utility tradeoff for remotely teleoperated robots. In: Proceedings of the 10th annual ACM\/IEEE international conference on human-robot interaction, pp 27\u201334. ACM","DOI":"10.1145\/2696454.2696484"},{"key":"7376_CR11","unstructured":"Campbell C (2000) Algorithmic approaches to training support vector machines: a survey. In: 8th european symposium on artificial neural networks, pp 27\u201354"},{"key":"7376_CR12","doi-asserted-by":"crossref","unstructured":"Chen Y, Jones GJ (2010) Augmenting human memory using personal lifelogs. In: Proceedings of the 1st augmented human international conference, p 24. ACM","DOI":"10.1145\/1785455.1785479"},{"key":"7376_CR13","doi-asserted-by":"crossref","unstructured":"Cheng WC, Golubchik L, Kay DG (2004) Total recall: are privacy changes inevitable?. In: Proceedings of the the 1st ACM workshop on continuous archival and retrieval of personal experiences, pp 86\u201392. ACM","DOI":"10.1145\/1026653.1026666"},{"key":"7376_CR14","doi-asserted-by":"crossref","unstructured":"Chon Y, Lane ND, Li F, Cha H, Zhao F (2012) Automatically characterizing places with opportunistic crowdsensing using smartphones. In: Proceedings of the 2012 ACM conference on ubiquitous computing, pp 481\u2013490. ACM","DOI":"10.1145\/2370216.2370288"},{"key":"7376_CR15","doi-asserted-by":"crossref","unstructured":"Cramer R, Damg\u00e5rd I, Nielsen JB (2001) Multiparty computation from threshold homomorphic encryption. In: International conference on the theory and applications of cryptographic techniques, pp 280\u2013300. Springer","DOI":"10.1007\/3-540-44987-6_18"},{"key":"7376_CR16","unstructured":"Csurka G, Dance CR, Fan L, Willamowski J, Bray C (2004) Visual categorization with bags of keypoints. In: In workshop on statistical learning in computer vision, ECCV, pp 1\u201322"},{"key":"7376_CR17","doi-asserted-by":"crossref","unstructured":"Dai J, Saghafi B, Wu J, Konrad J, Ishwar P (2015) Towards privacy-preserving recognition of human activities. In: 2015 IEEE international conference on image processing (ICIP), pp 4238\u20134242. IEEE","DOI":"10.1109\/ICIP.2015.7351605"},{"key":"7376_CR18","doi-asserted-by":"crossref","unstructured":"Du W, Atallah MJ (2001) Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 workshop on New security paradigms, pp 13\u201322. ACM","DOI":"10.1145\/508171.508174"},{"issue":"2","key":"7376_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32 (2):5","journal-title":"ACM Trans Comput Syst (TOCS)"},{"key":"7376_CR20","doi-asserted-by":"crossref","unstructured":"Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: International symposium on privacy enhancing technologies symposium, pp 235\u2013253. Springer","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"7376_CR21","volume-title":"Foundations of cryptography: volume 2, basic applications","author":"O Goldreich","year":"2009","unstructured":"Goldreich O (2009) Foundations of cryptography: volume 2, basic applications. Cambridge University Press, Cambridge"},{"key":"7376_CR22","doi-asserted-by":"crossref","unstructured":"Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: Proceedings of the 19th annual ACM symposium on theory of computing, pp 218\u2013229. ACM","DOI":"10.1145\/28395.28420"},{"issue":"3","key":"7376_CR23","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3(3):1157\u20131182","journal-title":"J Mach Learn Res"},{"key":"7376_CR24","doi-asserted-by":"crossref","unstructured":"Hoyle R, Templeman R, Armes S, Anthony D, Crandall D, Kapadia A (2014) Privacy behaviors of lifeloggers using wearable cameras. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, pp 571\u2013582. ACM","DOI":"10.1145\/2632048.2632079"},{"key":"7376_CR25","doi-asserted-by":"crossref","unstructured":"Jana S, Narayanan A, Shmatikov V (2013) A scanner darkly: protecting user privacy from perceptual applications. In: 2013 IEEE symposium on security and privacy (SP), pp 349\u2013363. IEEE","DOI":"10.1109\/SP.2013.31"},{"key":"7376_CR26","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/TSMC.1985.6313426","volume":"15","author":"JM Keller","year":"1985","unstructured":"Keller JM, Gray MR, Givens JA (1985) A fuzzy k-nearest neighbor algorithm. IEEE Trans Syst Man Cybern 15:580\u2013585","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"7376_CR27","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems 25, pp 1097-1105. Curran Associates Inc"},{"key":"7376_CR28","doi-asserted-by":"crossref","unstructured":"Kumar R, Novak J, Tomkins A (2010) Structure and evolution of online social networks. In: Link mining: models, algorithms, and applications, pp 337\u2013357. Springer","DOI":"10.1007\/978-1-4419-6515-8_13"},{"issue":"1","key":"7376_CR29","first-page":"5","volume":"1","author":"Y Lindell","year":"2009","unstructured":"Lindell Y, Pinkas B (2009) Secure multiparty computation for privacy-preserving data mining. J Priv Confid 1(1):5","journal-title":"J Priv Confid"},{"issue":"2","key":"7376_CR30","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/2.566147","volume":"30","author":"S Mann","year":"1997","unstructured":"Mann S (1997) Wearable computing: a first step toward personal imaging. Comput 30(2):25\u201332","journal-title":"Comput"},{"key":"7376_CR31","unstructured":"Mihailidis A, Hoey J, Boutilier C, Boger J (2007) Towards the development of an intelligent home to support agingin-place. In: Assisted cognition workshop"},{"key":"7376_CR32","doi-asserted-by":"crossref","unstructured":"Miluzzo E, Lane ND, Fodor K, Peterson R, Lu H, Musolesi M, Eisenman SB, Zheng X, Campbell AT (2008) Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In: Proceedings of the 6th ACM conference on embedded network sensor systems, pp 337\u2013350. ACM","DOI":"10.1145\/1460412.1460445"},{"key":"7376_CR33","doi-asserted-by":"crossref","unstructured":"Nauman M, Khan S, Zhang X (2010) Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM symposium on information, computer and communications security, pp 328\u2013332. ACM","DOI":"10.1145\/1755688.1755732"},{"issue":"1","key":"7376_CR34","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s12394-009-0008-4","volume":"1","author":"K O\u2019Hara","year":"2008","unstructured":"O\u2019Hara K, Tuffield MM, Shadbolt N (2008) Lifelogging: privacy and empowerment with memories for life. Identity Inf Soc 1(1):155\u2013172","journal-title":"Identity Inf Soc"},{"key":"7376_CR35","doi-asserted-by":"crossref","unstructured":"Ongtang M, Butler K, McDaniel P (2010) Porscha: policy oriented secure content handling in android. In: Proceedings of the 26th annual computer security applications conference, pp 221\u2013230. ACM","DOI":"10.1145\/1920261.1920295"},{"issue":"3","key":"7376_CR36","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/JSAC.2016.2525418","volume":"34","author":"MR Palattella","year":"2016","unstructured":"Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510\u2013527","journal-title":"IEEE J Sel Areas Commun"},{"key":"7376_CR37","unstructured":"Park S, Kautz HA (2008) Privacy-preserving recognition of activities in daily living from multi-view silhouettes and rfid-based training. In: AAAI Fall symposium: AI in eldercare: new solutions to old problems, pp 70\u201377"},{"key":"7376_CR38","doi-asserted-by":"crossref","unstructured":"Portokalidis G, Homburg P, Anagnostakis K, Bos H (2010) Paranoid android: versatile protection for smartphones. In: Proceedings of the 26th annual computer security applications conference, pp 347\u2013356. ACM","DOI":"10.1145\/1920261.1920313"},{"issue":"11","key":"7376_CR39","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613\u2013620","journal-title":"Commun ACM"},{"key":"7376_CR40","doi-asserted-by":"crossref","unstructured":"Taigman Y, Yang M, Ranzato M, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1701\u20131708","DOI":"10.1109\/CVPR.2014.220"},{"key":"7376_CR41","doi-asserted-by":"crossref","unstructured":"Templeman R, Korayem M, Crandall DJ, Kapadia A (2014) Placeavoider: steering first-person cameras away from sensitive spaces. In: Network and distributed system security symposium (NDSS)","DOI":"10.14722\/ndss.2014.23014"},{"issue":"1","key":"7376_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-1962-2-1","volume":"2","author":"T Teraoka","year":"2012","unstructured":"Teraoka T (2012) Organization and exploration of heterogeneous personal data collected in daily life. Human-Centric Comput Inf Sci 2(1):1","journal-title":"Human-Centric Comput Inf Sci"},{"issue":"2","key":"7376_CR43","first-page":"6","volume":"21","author":"AD Thierer","year":"2015","unstructured":"Thierer AD (2015) The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation. Richmond J Law Technol 21(2):6","journal-title":"Richmond J Law Technol"},{"key":"7376_CR44","doi-asserted-by":"crossref","unstructured":"Thomaz E, Parnami A, Bidwell J, Essa I, Abowd GD (2013) Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, pp 739\u2013748. ACM","DOI":"10.1145\/2493432.2493509"},{"key":"7376_CR45","doi-asserted-by":"crossref","unstructured":"Truong KN, Patel SN, Summet JW, Abowd GD (2005) Preventing camera recording by designing a capture-resistant environment. In: International conference on ubiquitous computing, pp 73\u201386. Springer","DOI":"10.1007\/11551201_5"},{"issue":"1","key":"7376_CR46","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3 (1):71\u201386","journal-title":"J Cogn Neurosci"},{"key":"7376_CR47","unstructured":"Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: IEEE Computer society conference on computer vision and pattern recognition (CVPR), vol 1, pp I\u2013I. IEEE"},{"issue":"3","key":"7376_CR48","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MCE.2014.2317895","volume":"3","author":"J Wei","year":"2014","unstructured":"Wei J (2014) How wearables intersect with the cloud and the internet of things: Considerations for the developers of wearables. IEEE Consumer Electron Mag 3(3):53\u201356","journal-title":"IEEE Consumer Electron Mag"},{"key":"7376_CR49","doi-asserted-by":"crossref","unstructured":"Wu J, Osuntogun A, Choudhury T, Philipose M, Rehg JM (2007) A scalable approach to activity recognition based on object use. In: IEEE international conference on computer vision (ICCV), pp 1\u20138. IEEE","DOI":"10.1109\/ICCV.2007.4408865"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7376-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7376-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7376-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T00:24:04Z","timestamp":1583972644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7376-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":49,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["7376"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7376-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,13]]},"assertion":[{"value":"30 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}