{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:27Z","timestamp":1740122847827,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772047"],"award-info":[{"award-number":["61772047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772513"],"award-info":[{"award-number":["61772513"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Fund of Beijing Key Laboratory of Big Data Technology for Food Safety","award":["BTBD2018KF-07"],"award-info":[{"award-number":["BTBD2018KF-07"]}]},{"name":"the Open Project Program of State Key Laboratory of Virtual Reality Technology and Systems","award":["VRLAB2019C03"],"award-info":[{"award-number":["VRLAB2019C03"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["328201906"],"award-info":[{"award-number":["328201906"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-10124-z","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T14:02:45Z","timestamp":1604066565000},"page":"7711-7726","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Random base image representation for efficient blind vision"],"prefix":"10.1007","volume":"80","author":[{"given":"Xin","family":"Jin","sequence":"first","affiliation":[]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongbo","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mingxue","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ruijun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"key":"10124_CR1","doi-asserted-by":"crossref","unstructured":"Avidan S, Butman M (2006) Blind vision. In: Computer vision - ECCV 2006, 9th European conference on computer vision, Graz, Austria, May 7\u201313, 2006, proceedings, Part III, pp 1\u201313","DOI":"10.1007\/11744078_1"},{"key":"10124_CR2","unstructured":"Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems 19, proceedings of the twentieth annual conference on neural information processing systems, Vancouver, British Columbia, Canada, December 4\u20137, 2006, pp 57\u201364"},{"key":"10124_CR3","doi-asserted-by":"crossref","unstructured":"Bost R, Popa RA, Tu S, Goldwasser S (2015) Machine learning classification over encrypted data. In: 22nd annual network and distributed system security symposium, NDSS 2015, San Diego, California, USA, February 8\u201311, 2014","DOI":"10.14722\/ndss.2015.23241"},{"key":"10124_CR4","unstructured":"Chu C-T, Jung J, Liu Z, Mahajan R (2014) Strack: secure tracking in community surveillance. In: Proceedings of the ACM international conference on multimedia, MM\u201914, Orlando, FL, USA, November 03\u201307, 2014, pp 837\u2013840"},{"key":"10124_CR5","unstructured":"Chu C-T, Jung J, Liu Z, Mahajan R (2014) Strack: secure tracking in community surveillance. In: Proceedings of the 22nd ACM international conference on multimedia, MM \u201914, New York, NY, USA. Association for computing machinery, pp 837\u2013840"},{"key":"10124_CR6","unstructured":"Chu K-Y, Kuo Y-H, Hsu WH (2013) Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM international conference on multimedia, MM \u201913, New York, NY, USA. Association for computing machinery, pp 597\u2013600"},{"issue":"1","key":"10124_CR7","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/TMM.2017.2728479","volume":"20","author":"S \u00c7ift\u00e7i","year":"2018","unstructured":"\u00c7ift\u00e7i S, Aky\u00fcz A O, Ebrahimi T (2018) A reliable and reversible image privacy protection based on false colors. IEEE Trans Multimed 20(1):68\u201381","journal-title":"IEEE Trans Multimed"},{"key":"10124_CR8","doi-asserted-by":"crossref","unstructured":"Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR 2005), 20\u201326 June 2005, San Diego, CA, USA, pp 886\u2013893","DOI":"10.1109\/CVPR.2005.177"},{"key":"10124_CR9","doi-asserted-by":"crossref","unstructured":"Ergun OO (2014) Privacy preserving face recognition in encrypted domain. In: 2014 IEEE Asia pacific conference on circuits and systems (APCCAS). IEEE, pp 643\u2013646","DOI":"10.1109\/APCCAS.2014.7032863"},{"issue":"2","key":"10124_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2012.2229783","volume":"30","author":"GC Fanti","year":"2013","unstructured":"Fanti GC, Finiasz M, Ramchandran K (2013) One-way private media search on public databases: the role of signal processing. IEEE Signal Process Mag 30(2):53\u201361","journal-title":"IEEE Signal Process Mag"},{"key":"10124_CR11","unstructured":"Geng Z, Kui G, Xin J (2015) A moving object detection method of surveillance video based on privacy protection in the cloud. Journal of Beijing Electronic Science & Technology Institute (4), 55\u201360"},{"key":"10124_CR12","unstructured":"Jain V, Learned-Miller E (2010) Fddb: a benchmark for face detection in unconstrained settings. Technical Report UM-CS-2010-009, University of Massachusetts Amherst"},{"key":"10124_CR13","doi-asserted-by":"crossref","unstructured":"Jin X, Guo K, Song C, Li X, et al (2016) Private video foreground extraction through chaotic mapping based encryption in the cloud. In: Multimedia modeling - 22nd international conference, MMM 2016, Miami, FL, USA, January 4\u20136, 2016, Proceedings, Part I, pp 562\u2013573","DOI":"10.1007\/978-3-319-27671-7_47"},{"key":"10124_CR14","doi-asserted-by":"crossref","unstructured":"Jin X, Yuan P, Li X, Song C, Ge S, Zhao G, Chen Y (2017) Efficient privacy preserving viola-jones type object detection via random base image representation. In: 2017 IEEE international conference on multimedia and expo, ICME 2017, Hong Kong, China, July 10\u201314, 2017, pp 673\u2013678","DOI":"10.1109\/ICME.2017.8019497"},{"key":"10124_CR15","unstructured":"Ore \u00d8 (1988) Number theory and its history. Dover Pubns, pp 129\u2013131. ISBN: 9780486656205"},{"key":"10124_CR16","doi-asserted-by":"crossref","unstructured":"Osadchy M, Pinkas B, Jarrous A, Moskovich B (2010) Scifi - a system for secure face identification. In: 31St IEEE symposium on security and privacy, s&p 2010, 16\u201319 May 2010, Berleley\/Oakland, California, USA, pp 239\u2013254","DOI":"10.1109\/SP.2010.39"},{"key":"10124_CR17","doi-asserted-by":"crossref","unstructured":"Rabin T, Ben-Or M (1989) Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the twenty-first annual ACM symposium on theory of computing. ACM, pp 73\u201385","DOI":"10.1145\/73007.73014"},{"issue":"2","key":"10124_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"key":"10124_CR19","doi-asserted-by":"crossref","unstructured":"Shashank J, Kowshik P, Srinathan K, Jawahar CV (2008) Private content based image retrieval. In: 2008 IEEE computer society conference on computer vision and pattern recognition (CVPR 2008), 24\u201326 June 2008, Anchorage, Alaska, USA","DOI":"10.1109\/CVPR.2008.4587388"},{"key":"10124_CR20","doi-asserted-by":"crossref","unstructured":"Sohn H, Plataniotis KN, Ro YM (2010) Privacy-preserving watch list screening in video surveillance system. In: Advances in multimedia information processing - PCM 2010 - 11th pacific rim conference on multimedia, Shanghai, China, September 21\u201324, 2010, proceedings, Part I, pp 622\u2013632","DOI":"10.1007\/978-3-642-15702-8_57"},{"key":"10124_CR21","unstructured":"Spacek L (2007) Collection of facial images: faces96. http:\/\/cswww.essex.ac.uk\/mv\/allfaces\/faces96.html"},{"issue":"6","key":"10124_CR22","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.imavis.2009.11.005","volume":"28","author":"CE Thomaz","year":"2010","unstructured":"Thomaz CE, Giraldi GA (2010) A new ranking method for principal components analysis and its application to face image analysis. Image Vision Comput 28(6):902\u2013913","journal-title":"Image Vision Comput"},{"key":"10124_CR23","doi-asserted-by":"crossref","unstructured":"Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2009) Efficient privacy preserving video surveillance. In: IEEE 12th international conference on computer vision, ICCV, Kyoto, Japan, September 27\u2013October 4, pp 1639\u20131646","DOI":"10.1109\/ICCV.2009.5459370"},{"key":"10124_CR24","unstructured":"Viola PA, Jones MJ (2001) Robust real-time face detection. In: IEEE 8th international conference on computer vision ICCV 2011, Vancouver, British Columbia, Canada, July 7\u201314, 2001, p 747"},{"issue":"2","key":"10124_CR25","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"PA Viola","year":"2004","unstructured":"Viola PA, Jones MJ (2004) Robust real-time face detection. Int J Comput Vis 57(2):137\u2013154","journal-title":"Int J Comput Vis"},{"key":"10124_CR26","doi-asserted-by":"publisher","first-page":"3918","DOI":"10.1109\/ACCESS.2018.2889782","volume":"7","author":"Q Wang","year":"2019","unstructured":"Wang Q, Gao L, Wang H, Wei X (2019) Face detection for privacy protected images. IEEE Access 7:3918\u20133927","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10124-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10124-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10124-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T23:51:53Z","timestamp":1614210713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10124-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["10124"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10124-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"9 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}