{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:47:53Z","timestamp":1752360473015},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T00:00:00Z","timestamp":1497398400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11623-017-0804-1","type":"journal-article","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:18:14Z","timestamp":1497352694000},"page":"415-421","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Gesichtsdetektion und -erkennung in Videos aus \u00f6ffentlichen Kamerasystemen"],"prefix":"10.1007","volume":"41","author":[{"given":"Martin","family":"Drahansk\u00fd","sequence":"first","affiliation":[]},{"given":"Tom\u00e1\u0161","family":"Goldmann","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Spurn\u00fd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"804_CR1","unstructured":"IEC\/TC 79. IEC 62676-4:2014. Video surveillance systems for use in security applications\u2013Part 4: Application guidelines. ISBN 978-2-8322-1504-3."},{"key":"804_CR2","unstructured":"Australia and New Zealand Police Recommendations for CCTV Systems. Australia New Zealand Policing Advisory Agency. 2014, National Institute of Forensic Science Australia, S. 2."},{"key":"804_CR3","volume-title":"Biometric Technologies and Verification Systems","author":"J R Vacca","year":"2007","unstructured":"Vacca J. R.: Biometric Technologies and Verification Systems. Butterworth- Heinemann, 2007."},{"issue":"2","key":"804_CR4","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"Paul Viola","year":"2004","unstructured":"Viola P., Jones M. J.: Robust Real-time Face Detection. International Journal of Computer Vision, Vol. 57, No. 2, 2004, S. 137\u2013154.","journal-title":"International Journal of Computer Vision"},{"key":"804_CR5","volume-title":"AdaBoost and Face Detection","author":"J \u0160ochman","year":"2003","unstructured":"\u0160ochman J., Matas J. AdaBoost and Face Detection. Czech Technical University, CZ,2003."},{"key":"804_CR6","first-page":"886","volume-title":"2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition","author":"N Dalal","year":"2005","unstructured":"Dalal N., Triggs B. Histograms of Oriented Gradients for Human Detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, IEEE, 2005, S. 886\u2013893."},{"key":"804_CR7","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/5.628712","volume":"85","author":"J Zhang","year":"1997","unstructured":"Zhang J., Yan Y., Lades M. Face Recognition: Eigenface, Elastic Matching, and Neural Nets. In: Proceedings of the IEEE, 1997, 85.9: 1423-1435.","journal-title":"Proceedings of the IEEE"},{"key":"804_CR8","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"PN Belhumeur","year":"1997","unstructured":"Belhumeur P.N., Hespanha J.P., Kriegman D.J. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection. IEEE Transactions on pattern analysis and machine intelligence, 1997, 19.7: 711\u2013720.","journal-title":"IEEE Transactions on pattern analysis and machine intelligence"},{"key":"804_CR9","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.patcog.2005.09.009","volume":"39","author":"A Colombo","year":"2006","unstructured":"Colombo A., Cusano C., Schettini R. 3D Face Detection Using Curvature Analysis. Pattern recognition, 2006, 39.3: 444\u2013455.","journal-title":"Pattern recognition"},{"key":"804_CR10","first-page":"502","volume-title":"Proceedings of 3D Data Processing, Visualization and Transmission","author":"J Cook","year":"2004","unstructured":"Cook J. et al. Face Recognition from 3D Data Using Iterative Closest Point Algorithm and Gaussian Mixture Models. In: Proceedings of 3D Data Processing, Visualization and Transmission, 2004, IEEE. S. 502\u2013509."},{"key":"804_CR11","doi-asserted-by":"crossref","unstructured":"Piccardi M. Background Subtraction Techniques: A Review. In: IEEE International Conference on Systems, man and cybernetics, IEEE, 2004, S. 3099\u20133104.","DOI":"10.1109\/ICSMC.2004.1400815"},{"key":"804_CR12","first-page":"469","volume-title":"European Conference on Computer Vision. Springer Berlin Heidelberg","author":"T Ahonen","year":"2004","unstructured":"Ahonen T., Hadid A., Pietik\u00e4inen M. Face recognition with Local Binary Patterns. In: European Conference on Computer Vision. Springer Berlin Heidelberg, 2004, S. 469\u2013481."},{"key":"804_CR13","volume-title":"Biometrick\u00e9 rozpozn\u00e1v\u00e1n\u00ed 2D obliceje z kamerov\u00e9ho syst\u00e9mu um\u00edsten\u00e9ho na kvadrokopt\u00e9re","author":"L Mikundov\u00e1","year":"2015","unstructured":"Mikundov\u00e1 L. Biometrick\u00e9 rozpozn\u00e1v\u00e1n\u00ed 2D obliceje z kamerov\u00e9ho syst\u00e9mu um\u00edsten\u00e9ho na kvadrokopt\u00e9re (Biometrische 2D-Gesichtserkennung aus einem auf einem Quadrokopter montierten Kamerasystem), Bachelorarbeit, Brno, FIT TUBrno, 2015."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-017-0804-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-017-0804-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-017-0804-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T05:08:40Z","timestamp":1525842520000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-017-0804-1"}},"subtitle":["Inwieweit lassen sich Daten aus \u00f6ffentlichen Kamerasystemen f\u00fcr polizeiliche Zwecke verwenden?"],"short-title":[],"issued":{"date-parts":[[2017,6,14]]},"references-count":13,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["804"],"URL":"https:\/\/doi.org\/10.1007\/s11623-017-0804-1","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2017,6,14]]}}}