{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T20:18:14Z","timestamp":1773433094109,"version":"3.50.1"},"reference-count":74,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cvpr.2015.7298628","type":"proceedings-article","created":{"date-parts":[[2015,10,15]],"date-time":"2015-10-15T18:42:06Z","timestamp":1444934526000},"page":"314-324","source":"Crossref","is-referenced-by-count":41,"title":["Privacy preserving optics for miniature vision sensors"],"prefix":"10.1109","author":[{"given":"Francesco","family":"Pittaluga","sequence":"first","affiliation":[]},{"given":"Sanjeev J.","family":"Koppal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009605"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126315"},{"key":"ref71","article-title":"Optical pattern recognition. Optical Pattern Recognition, by Francis TS Yu, Suganda lutamu-lia","volume":"2008","author":"yu","year":"2008"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1033027"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.175"},{"key":"ref39","first-page":"217","article-title":"A theory of coprime blurred pairs","author":"li","year":"2011","journal-title":"Computer Vision (ICCV) 2011 IEEE International Conference on"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/1276377.1276464","article-title":"Image and depth from a conventional camera with a coded aperture","volume":"26","author":"levin","year":"2007","journal-title":"ACM Transactions on Graphics (TOG)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.24"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/srep03543"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2005.1568597"},{"key":"ref30","article-title":"Phasor imaging: A generalization of correlation-based time-of-flight imaging","author":"gupta","year":"2014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-008-0463-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995338"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.22"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICBN.2005.1589704"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937581"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2008.2005902"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_15"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.161"},{"key":"ref27","article-title":"Introduction to Fourier optics","volume":"2","author":"goodman","year":"1968"},{"key":"ref65","first-page":"1430","article-title":"Privacy aware learning","author":"wainwright","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312577"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587369"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1073204.1073259"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2005.1626518"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2010.38"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2105551"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2010.5627119"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1016\/j.adhoc.2011.02.003","article-title":"On coverage issues in directional sensor networks: A survey","volume":"9","author":"ercan","year":"2011","journal-title":"Ad Hoc Networks"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","article-title":"Privacy-preserving face recognition","author":"erkin","year":"2009","journal-title":"Privacy Enhancing Technologies"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2006.06.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.834669"},{"key":"ref23","article-title":"Learning deep face representation","author":"fan","year":"2014","journal-title":"ArXiv Preprint arXiv 1403 2802"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011172403203"},{"key":"ref25","article-title":"Random lens imaging","author":"fergus","year":"2006"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.203"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2009.5206750"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2008.925019"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-642-14423-3_16","article-title":"Efficient privacy-preserving face recognition","author":"sadeghi","year":"2010","journal-title":"Information, Security and Cryptology - ICISC 2009"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1145\/1141911.1141957","article-title":"Coded exposure photography: motion deblurring using fluttered shutter","volume":"25","author":"raskar","year":"2006","journal-title":"ACM Transactions on Graphics (TOG)"},{"key":"ref56","article-title":"Pre-capture privacy web page","author":"pittaluga","year":"0","journal-title":"focus ece ufi edu\/precaptureprivacy"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-319-10584-0_4","article-title":"Deblurring face images with exemplars","author":"pan","year":"2014","journal-title":"Computer Vision-ECCV 2014"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2185520.2185535"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.39"},{"key":"ref10","first-page":"40","article-title":"Micropower wireless sensors","volume":"30","author":"chandrakasan","year":"2006","journal-title":"Power"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383413"},{"key":"ref40","article-title":"Scale-space theory in computer vision","author":"lindeberg","year":"1993"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2009.13"},{"key":"ref13","article-title":"The smashed filter for compressive classification and target recognition","author":"davenport","year":"2007","journal-title":"Electronic Imaging 2007 pages 64980H-64980H International Society for Optics and Photonics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2108306"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/978-3-642-40779-6_2","article-title":"Achieving anonymity against major face recognition algorithms","author":"driessen","year":"2013","journal-title":"Communications and Multimedia Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.914730"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928225"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(90)90350-K"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/11776178_24","article-title":"Optimal placement and selection of camera network nodes for target localization","author":"ercan","year":"2006","journal-title":"Distributed Computing in Sensor Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1399504.1360638"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61123-1_171"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/4.705358"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358935"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.98"},{"key":"ref7","article-title":"High resolution, Low cost, Privacy preserving Human motion tracking System via passive thermal sensing","author":"browarek","year":"2010"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1145\/1073204.1073256","article-title":"Fourier slice photography","volume":"24","author":"ng","year":"2005","journal-title":"ACM Transactions on Graphics (TOG)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0667-3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-005-3102-6"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2010.01.038"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1143518.1143519"},{"key":"ref42","article-title":"Knapsack problems: algorithms and computer implementations","author":"martello","year":"1990"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1379287.1379296"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/NCVPRIPG.2011.48"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1364\/JOSA.54.001060"}],"event":{"name":"2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","location":"Boston, MA, USA","start":{"date-parts":[[2015,6,7]]},"end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7293313\/7298593\/07298628.pdf?arnumber=7298628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T12:14:13Z","timestamp":1567253653000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7298628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/cvpr.2015.7298628","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}