{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:33:53Z","timestamp":1729647233078,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/icip.2014.7026220","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T17:41:49Z","timestamp":1423158109000},"page":"6046-6050","source":"Crossref","is-referenced-by-count":10,"title":["Scrambling faces for privacy protection using background self-similarities"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Melle","sequence":"first","affiliation":[]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928225"},{"key":"ref11","first-page":"5","article-title":"Get-ting the face behind the squares: reconstructing pixelized video streams","author":"cavedon","year":"0","journal-title":"Proceedings of the 5th USENIX conference on Offensive technologies Berkeley CA USA 2011 WOOT'II"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2000.840616"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"ref14","first-page":"10510","article-title":"Differential vector quantization of achromatic imagery","author":"baker","year":"1983","journal-title":"Proc Intl Picture Coding Symp"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/ICASSP.1985.1168449","article-title":"Compression of color digital images using vector quantization in product codes","volume":"10","author":"budge","year":"1985","journal-title":"Acoustics Speech and Signal Processing IEEE International Conference on ICASSP '85"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/83.128028"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560427"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04101-3","author":"paar","year":"2010","journal-title":"Understanding Cryptography A Textbook for Students and Practitioners"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACV.1994.341300"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-011-0241-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.65"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-011-0246-9"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/CVIIE.2005.16","article-title":"Pico: Privacy through invertible cryptographic ob-scuration","author":"boult","year":"2005","journal-title":"Computer Vision for Interactive and Intelligent Environment 2005"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1117\/12.564828","article-title":"Video surveillance using JPEG 2000","volume":"5588","author":"dufaux","year":"2004","journal-title":"Proceedings of the SPIE"},{"key":"ref7","first-page":"5:1","article-title":"Com-pression independent reversible encryption for privacy in video surveillance","volume":"2009","author":"carrillo","year":"2009","journal-title":"EURASIP J Inf Secur"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2010.522094"},{"key":"ref1","first-page":"110","article-title":"Editorial: The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space","volume":"2","author":"norris","year":"2004","journal-title":"Surveillance and Society"},{"key":"ref9","article-title":"Robust human face hiding ensuring privacy","author":"martnez-ponte","year":"2005","journal-title":"Proc 8th Int Workshop Image Analy Multimedia Interactive Services (WIAMIS)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2011.6042938"},{"key":"ref22","first-page":"26","article-title":"The complete gabor-fisher classifier for robust face recognition","volume":"2010","author":"struc","year":"2010","journal-title":"EURASIP Advances in Signal Processing"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref23","article-title":"Mediaeval 2013 visual privacy task: Warping-based privacy protection tool","author":"korshunov","year":"2013","journal-title":"MediaEval"}],"event":{"name":"2014 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2014,10,27]]},"location":"Paris, France","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6992914\/7024995\/07026220.pdf?arnumber=7026220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T17:27:18Z","timestamp":1566322038000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7026220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icip.2014.7026220","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}