{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:34:24Z","timestamp":1772908464812,"version":"3.50.1"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:00:00Z","timestamp":1770681600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004385","name":"Universiteit Gent","doi-asserted-by":"publisher","award":["BOF22\/DOC\/093"],"award-info":[{"award-number":["BOF22\/DOC\/093"]}],"id":[{"id":"10.13039\/501100004385","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100020468","name":"Flanders Make","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100020468","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Vision and Image Understanding"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.cviu.2026.104675","type":"journal-article","created":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:14:17Z","timestamp":1770225257000},"page":"104675","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Securing workers and workspaces: Contextual privacy for vision-based ergonomics"],"prefix":"10.1016","volume":"265","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3070-9814","authenticated-orcid":false,"given":"Sander","family":"De Coninck","sequence":"first","affiliation":[]},{"given":"Emilio","family":"Gamba","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Van Doninck","sequence":"additional","affiliation":[]},{"given":"Abdellatif","family":"Bey-Temsamani","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Cardoen","sequence":"additional","affiliation":[]},{"given":"Sam","family":"Leroux","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Simoens","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cviu.2026.104675_b1","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1111\/j.2517-6161.1995.tb02031.x","article-title":"Controlling the false discovery rate: a practical and powerful approach to multiple testing","volume":"57","author":"Benjamini","year":"1995","journal-title":"J. R. Stat. Soc. Ser. B Stat. Methodol."},{"key":"10.1016\/j.cviu.2026.104675_b2","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.berh.2015.08.002","article-title":"Economic impact of musculoskeletal disorders (msds) on work in Europe","volume":"29","author":"Bevan","year":"2015","journal-title":"Best Pr. Res. Clin. Rheumatol."},{"key":"10.1016\/j.cviu.2026.104675_b3","series-title":"The California Consumer Privacy Act (CCPA): An Implementation Guide","author":"Bukaty","year":"2019"},{"key":"10.1016\/j.cviu.2026.104675_b4","doi-asserted-by":"crossref","unstructured":"Dave,\u00a0I.R., Chen,\u00a0C., Shah,\u00a0M., 2022. Spact: Self-supervised privacy preservation for action recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. CVPR, pp. 20164\u201320173.","DOI":"10.1109\/CVPR52688.2022.01953"},{"key":"10.1016\/j.cviu.2026.104675_b5","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.procir.2025.08.065","article-title":"Enabling privacy-aware ai-based ergonomic analysis","volume":"136","author":"De Coninck","year":"2025","journal-title":"Procedia CIRP"},{"key":"10.1016\/j.cviu.2026.104675_b6","first-page":"1","article-title":"Privacy-preserving visual analysis: training video obfuscation models without sensitive labels","author":"De\u00a0Coninck","year":"2024","journal-title":"Appl. Intell."},{"key":"10.1016\/j.cviu.2026.104675_b7","series-title":"Regulation (eu) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (general data protection regulation)","first-page":"1","author":"EU","year":"2016"},{"key":"10.1016\/j.cviu.2026.104675_b8","doi-asserted-by":"crossref","unstructured":"Gurari,\u00a0D., Li,\u00a0Q., Lin,\u00a0C., Zhao,\u00a0Y., Guo,\u00a0A., Stangl,\u00a0A., Bigham,\u00a0J.P., 2019. Vizwiz-priv: A dataset for recognizing the presence and purpose of private visual information in images taken by blind people. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 939\u2013948.","DOI":"10.1109\/CVPR.2019.00103"},{"key":"10.1016\/j.cviu.2026.104675_b9","series-title":"Multiple View Geometry in Computer Vision","author":"Hartley","year":"2003"},{"key":"10.1016\/j.cviu.2026.104675_b10","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/S0003-6870(99)00039-3","article-title":"Rapid entire body assessment (reba)","volume":"31","author":"Hignett","year":"2000","journal-title":"Appl. Ergon."},{"key":"10.1016\/j.cviu.2026.104675_b11","series-title":"2022 IEEE\/RSJ International Conference on Intelligent Robots and Systems","first-page":"12506","article-title":"Don\u2019t share my face: Privacy preserving inpainting for visual localization","author":"Himmi","year":"2022"},{"key":"10.1016\/j.cviu.2026.104675_b12","doi-asserted-by":"crossref","first-page":"656","DOI":"10.3390\/e19120656","article-title":"Context-aware generative adversarial privacy","volume":"19","author":"Huang","year":"2017","journal-title":"Entropy"},{"key":"10.1016\/j.cviu.2026.104675_b13","series-title":"2025 IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"5239","article-title":"Recoverable anonymization for pose estimation: a privacy-enhancing approach","author":"Huang","year":"2025"},{"key":"10.1016\/j.cviu.2026.104675_b14","series-title":"2023 IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"1329","article-title":"Deepprivacy2: Towards realistic full-body anonymization","author":"Hukkel\u00e5s","year":"2023"},{"key":"10.1016\/j.cviu.2026.104675_b15","doi-asserted-by":"crossref","unstructured":"Hukkel\u00e5s,\u00a0H., Lindseth,\u00a0F., 2023b. Does image anonymization impact computer vision training?. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 140\u2013150.","DOI":"10.1109\/CVPRW59228.2023.00019"},{"key":"10.1016\/j.cviu.2026.104675_b16","doi-asserted-by":"crossref","unstructured":"Hukkel\u00e5s,\u00a0H., Lindseth,\u00a0F., 2023c. Does image anonymization impact computer vision training?. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. pp. 140\u2013150.","DOI":"10.1109\/CVPRW59228.2023.00019"},{"key":"10.1016\/j.cviu.2026.104675_b17","doi-asserted-by":"crossref","unstructured":"Ilic,\u00a0F., Zhao,\u00a0H., Pock,\u00a0T., Wildes,\u00a0R.P., 2024. Selective interpretable and motion consistent privacy attribute obfuscation for action recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. CVPR, pp. 18730\u201318739.","DOI":"10.1109\/CVPR52733.2024.01772"},{"key":"10.1016\/j.cviu.2026.104675_b18","series-title":"Ultralytics YOLO","author":"Jocher","year":"2023"},{"key":"10.1016\/j.cviu.2026.104675_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.ergon.2019.102865","article-title":"A systematic review of comparative studies on ergonomic assessment techniques","volume":"74","author":"Joshi","year":"2019","journal-title":"Int. J. Ind. Ergon."},{"key":"10.1016\/j.cviu.2026.104675_b20","series-title":"Auto-encoding variational bayes","author":"Kingma","year":"2013"},{"key":"10.1016\/j.cviu.2026.104675_b21","doi-asserted-by":"crossref","first-page":"8346","DOI":"10.1109\/ACCESS.2024.3352146","article-title":"Balancing privacy and accuracy: Exploring the impact of data anonymization on deep learning models in computer vision","volume":"12","author":"Lee","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.cviu.2026.104675_b22","series-title":"2022 IEEE International Parallel and Distributed Processing Symposium Workshops","first-page":"1003","article-title":"Tinymlops: Operational challenges for widespread edge ai adoption","author":"Leroux","year":"2022"},{"key":"10.1016\/j.cviu.2026.104675_b23","series-title":"Microsoft coco: Common objects in context","author":"Lin","year":"2015"},{"key":"10.1016\/j.cviu.2026.104675_b24","series-title":"Decoupled weight decay regularization","author":"Loshchilov","year":"2019"},{"key":"10.1016\/j.cviu.2026.104675_b25","series-title":"Proceedings of the 23rd Workshop on Privacy in the Electronic Society","first-page":"193","article-title":"Rad: Realistic anonymization of images using stable diffusion","author":"Malm","year":"2024"},{"key":"10.1016\/j.cviu.2026.104675_b26","doi-asserted-by":"crossref","unstructured":"Orekondy,\u00a0T., Fritz,\u00a0M., Schiele,\u00a0B., 2018. Connecting pixels to privacy and utility: Automatic redaction of private information in images. In: Conference on Computer Vision and Pattern Recognition. CVPR.","DOI":"10.1109\/CVPR.2018.00883"},{"key":"10.1016\/j.cviu.2026.104675_b27","doi-asserted-by":"crossref","first-page":"2382","DOI":"10.1109\/TSC.2021.3051771","article-title":"A multi-view deep learning approach for predictive business process monitoring","volume":"15","author":"Pasquadibisceglie","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.cviu.2026.104675_b28","unstructured":"Patwari,\u00a0K., Chuah,\u00a0C.N., Lyu,\u00a0L., Sharma,\u00a0V., 2024. Perceptanon: exploring the human perception of image anonymization beyond pseudonymization for gdpr. In: Forty-First International Conference on Machine Learning."},{"key":"10.1016\/j.cviu.2026.104675_b29","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/TIP.2005.859378","article-title":"Image information and visual quality","volume":"15","author":"Sheikh","year":"2006","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.cviu.2026.104675_b30","article-title":"Adversarial scene editing: Automatic object removal from weak supervision","volume":"31","author":"Shetty","year":"2018","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.cviu.2026.104675_b31","doi-asserted-by":"crossref","first-page":"777","DOI":"10.3390\/s21030777","article-title":"Wearable devices for ergonomics: A systematic literature review","volume":"21","author":"Stefana","year":"2021","journal-title":"Sens."},{"key":"10.1016\/j.cviu.2026.104675_b32","article-title":"Privacy assessment on reconstructed images: are existing evaluation metrics faithful to human perception?","volume":"36","author":"Sun","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.cviu.2026.104675_b33","series-title":"Advances in Neural Information Processing Systems","first-page":"103619","article-title":"Private attribute inference from images with vision-language models","author":"T\u00f6mek\u00e7e","year":"2024"},{"key":"10.1016\/j.cviu.2026.104675_b34","doi-asserted-by":"crossref","unstructured":"Tseng,\u00a0Y.Y., Sharma,\u00a0T., Zhang,\u00a0L., Stangl,\u00a0A., Findlater,\u00a0L., Wang,\u00a0Y., Gurari,\u00a0D., 2025. Biv-priv-seg: Locating private content in images taken by people with visual impairments. In: Proceedings of the Winter Conference on Applications of Computer Vision. WACV, pp. 430\u2013440.","DOI":"10.1109\/WACV61041.2025.00052"},{"key":"10.1016\/j.cviu.2026.104675_b35","doi-asserted-by":"crossref","unstructured":"Uittenbogaard,\u00a0R., Sebastian,\u00a0C., Vijverberg,\u00a0J., Boom,\u00a0B., Gavrila,\u00a0D.M., With,\u00a0P.H.d., 2019. Privacy protection in street-view panoramas using depth and multi-view imagery. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. CVPR.","DOI":"10.1109\/CVPR.2019.01083"},{"key":"10.1016\/j.cviu.2026.104675_b36","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.cviu.2026.104675_b37","doi-asserted-by":"crossref","unstructured":"Wang,\u00a0Y., Li,\u00a0M., Cai,\u00a0H., Chen,\u00a0W.M., Han,\u00a0S., 2022. Lite pose: Efficient architecture design for 2d human pose estimation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 13126\u201313136.","DOI":"10.1109\/CVPR52688.2022.01278"},{"key":"10.1016\/j.cviu.2026.104675_b38","series-title":"The burden of musculoskeletal conditions at the start of the new millennium: report of a who scientific group","author":"WHO","year":"2003"},{"key":"10.1016\/j.cviu.2026.104675_b39","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.aei.2017.11.001","article-title":"Development of ergonomic posture recognition technique based on 2d ordinary camera for construction hazard prevention through view-invariant features in 2d skeleton motion","volume":"34","author":"Yan","year":"2017","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.cviu.2026.104675_b40","doi-asserted-by":"crossref","DOI":"10.1061\/(ASCE)CO.1943-7862.0001647","article-title":"Joint-level vision-based ergonomic assessment tool for construction workers","volume":"145","author":"Yu","year":"2019","journal-title":"J. Constr. Eng. Manag."},{"key":"10.1016\/j.cviu.2026.104675_b41","doi-asserted-by":"crossref","unstructured":"Yun,\u00a0S., Han,\u00a0D., Oh,\u00a0S.J., Chun,\u00a0S., Choe,\u00a0J., Yoo,\u00a0Y., 2019. Cutmix: Regularization strategy to train strong classifiers with localizable features. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp. 6023\u20136032.","DOI":"10.1109\/ICCV.2019.00612"},{"key":"10.1016\/j.cviu.2026.104675_b42","series-title":"Multi-p2a: A multi-perspective benchmark on privacy assessment for large vision-language models","author":"Zhang","year":"2025"},{"key":"10.1016\/j.cviu.2026.104675_b43","series-title":"mixup: Beyond empirical risk minimization","author":"Zhang","year":"2017"},{"key":"10.1016\/j.cviu.2026.104675_b44","doi-asserted-by":"crossref","unstructured":"Zhang,\u00a0R., Isola,\u00a0P., Efros,\u00a0A.A., Shechtman,\u00a0E., Wang,\u00a0O., 2018. The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp. 586\u2013595.","DOI":"10.1109\/CVPR.2018.00068"},{"key":"10.1016\/j.cviu.2026.104675_b45","doi-asserted-by":"crossref","DOI":"10.1145\/3708501","article-title":"Visual content privacy protection: A survey","volume":"57","author":"Zhao","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.cviu.2026.104675_b46","article-title":"Deep learning-based human pose estimation: A survey","volume":"56","author":"Zheng","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.cviu.2026.104675_b47","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1109\/TIFS.2020.3029913","article-title":"Personal privacy protection via irrelevant faces tracking and pixelation in video live streaming","volume":"16","author":"Zhou","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.cviu.2026.104675_b48","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/TSMC.2022.3166397","article-title":"Computer vision techniques in manufacturing","volume":"53","author":"Zhou","year":"2023","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."}],"container-title":["Computer Vision and Image Understanding"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1077314226000421?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1077314226000421?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T02:16:13Z","timestamp":1772849773000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1077314226000421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":48,"alternative-id":["S1077314226000421"],"URL":"https:\/\/doi.org\/10.1016\/j.cviu.2026.104675","relation":{},"ISSN":["1077-3142"],"issn-type":[{"value":"1077-3142","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Securing workers and workspaces: Contextual privacy for vision-based ergonomics","name":"articletitle","label":"Article Title"},{"value":"Computer Vision and Image Understanding","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cviu.2026.104675","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"104675"}}