{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:19:41Z","timestamp":1740100781749,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,16]]},"DOI":"10.1109\/comm54429.2022.9817196","type":"proceedings-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T19:41:28Z","timestamp":1657741288000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Securing Personal Data in a Video Identification System"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5255-2590","authenticated-orcid":false,"given":"Florin","family":"Rastoceanu","sequence":"first","affiliation":[{"name":"University POLITEHNICA of Bucharest,Faculty of Automatic Control and Computers,Bucharest,Romania"}]},{"given":"Daniel","family":"Hritcu","sequence":"additional","affiliation":[{"name":"Ministery of Defense,Bucharest,Romania"}]},{"given":"Constantin","family":"Grozea","sequence":"additional","affiliation":[{"name":"Ministery of Defense,Bucharest,Romania"}]},{"given":"Marilena","family":"Lazar","sequence":"additional","affiliation":[{"name":"Ministery of Defense,Bucharest,Romania"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.833105"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1504\/IJTMCC.2013.052523"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2007.4399122"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1178657.1178665"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2008.4607424"},{"key":"ref15","article-title":"Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations","volume":"2007","author":"socek","year":"0","journal-title":"Hindawi Publishing Corporation EURASIP Journal on Information Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s21134419"},{"key":"ref17","first-page":"530s","article-title":"Video content authentication techniques: a comprehensive survey","volume":"24","author":"singh","year":"2017","journal-title":"Multimedia Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/763693.763695"},{"year":"202","key":"ref19"},{"year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2020.2994403"},{"key":"ref6","first-page":"169","author":"rajpoot","year":"2014","journal-title":"Security and Privacy in Video Surveillance Requirements and Challenges"},{"journal-title":"Identity Theft Resource Center's 2021 Data Breach Annual Report Sontiq a TransUnion Company","year":"2022","key":"ref5"},{"key":"ref8","article-title":"Applied Cryptography and Network Security","author":"conti","year":"2020","journal-title":"LNCS 12147 18th International Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.09.009"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"12003","DOI":"10.1088\/1757-899X\/806\/1\/012003","article-title":"Research on Personal Data Protection of EU General Data Protection Regulation","volume":"806","author":"hu","year":"2019","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"ref1","first-page":"1","article-title":"REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","volume":"l 119","year":"0","journal-title":"Official Journal of the European Union EN 4 5 2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/530354"}],"event":{"name":"2022 14th International Conference on Communications (COMM)","start":{"date-parts":[[2022,6,16]]},"location":"Bucharest, Romania","end":{"date-parts":[[2022,6,18]]}},"container-title":["2022 14th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9817096\/9817149\/09817196.pdf?arnumber=9817196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:42:22Z","timestamp":1659660142000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9817196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,16]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/comm54429.2022.9817196","relation":{},"subject":[],"published":{"date-parts":[[2022,6,16]]}}}