{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:04:37Z","timestamp":1729616677324,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icpr.2016.7900304","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T17:12:47Z","timestamp":1493053967000},"page":"4268-4273","source":"Crossref","is-referenced-by-count":0,"title":["A foveation technique applied to face de-identification"],"prefix":"10.1109","author":[{"given":"Victor","family":"Alonso-Perez","sequence":"first","affiliation":[]},{"given":"Rogerio","family":"Enriqurez-Caldera","sequence":"additional","affiliation":[]},{"given":"Juan M.","family":"Ramirez-Cortes","sequence":"additional","affiliation":[]},{"given":"L. Enrique","family":"Sucar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2005.04.001"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1117\/12.320120","article-title":"A real-time foveated multiresolution system for low-bandwidth video communication","author":"geisler","year":"1998","journal-title":"Proc SPIE"},{"key":"ref10","first-page":"869","author":"phillips","year":"2005","journal-title":"Privacy Operating Characteristic for Privacy Protection in Surveillance Applications"},{"key":"ref11","first-page":"227","author":"gross","year":"2006","journal-title":"Integrating Utility into Face De-identification"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.125"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859756"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996249"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622791"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2013.6636641"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.2027040"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583552"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVIIE.2005.16"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.06.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1333788"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1143518.1143519"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSP.2008.4697276"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2012.6343472"},{"key":"ref29","first-page":"349","article-title":"Chapter 14-foveated image and video processing and search","volume":"4","author":"floren","year":"2014","journal-title":"Image Video Processing and Analysis Hardware Audio Acoustic and Speech Processing ser APLSP"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027537"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2105551"},{"key":"ref7","first-page":"97","author":"boyle","year":"2009","journal-title":"Privacy Factors in Video-Based Media Spaces"},{"key":"ref2","first-page":"144","author":"chinomi","year":"2008","journal-title":"PriSurv Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX.2012.6263883"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.65"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530530"},{"key":"ref21","article-title":"Robust human face hiding ensuring privacy","author":"martnez-ponte","year":"2005","journal-title":"Proc WIAMIS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2008.4587904"},{"key":"ref23","first-page":"651","author":"yu","year":"2007","journal-title":"Privacy Preserving Hiding a Face in a Face"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S1077-2014(02)00116-X"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2009-293031"}],"event":{"name":"2016 23rd International Conference on Pattern Recognition (ICPR)","start":{"date-parts":[[2016,12,4]]},"location":"Cancun","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 23rd International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7893644\/7899596\/07900304.pdf?arnumber=7900304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T16:02:31Z","timestamp":1569081751000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7900304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icpr.2016.7900304","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}