{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T07:25:23Z","timestamp":1745047523418},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859767","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T12:19:16Z","timestamp":1406722756000},"page":"1294-1299","source":"Crossref","is-referenced-by-count":10,"title":["Person de-identification in activity videos"],"prefix":"10.1109","author":[{"given":"M.","family":"Ivasic-Kos","sequence":"first","affiliation":[]},{"given":"A.","family":"Iosifidis","sequence":"additional","affiliation":[]},{"given":"A.","family":"Tefas","sequence":"additional","affiliation":[]},{"given":"I.","family":"Pitas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Computer and Robot Vision","year":"1992","author":"haralick","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CVMP.2009.19"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175921"},{"key":"14","article-title":"Learning human identity using view-invariant multi-view moverment representation","author":"iosifidis","year":"2011","journal-title":"Biometrics & ID Management COST 2101 International Workshop (BioID)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77409-9_14"},{"key":"12","article-title":"Digital privacy: Replacing pedestrians from google street view images","author":"nodari","year":"2012","journal-title":"21st Int Conference of Pattern Recognition (ICPR)"},{"key":"3","article-title":"Balancing privacy and awareness in home media spaces","author":"neustaedter","year":"2003","journal-title":"Workshop on Ubicomp Communities Privacy as Boundary Negotiation"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/330534.330540"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358935"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2105551"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587369"},{"key":"5","article-title":"Integrating utility into face de-identification","author":"gross","year":"2005","journal-title":"Workshop on Privacy Enhancing Technologies (PET)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2009.5206750"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12297-2_26"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859767.pdf?arnumber=6859767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T12:04:26Z","timestamp":1490270666000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859767","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}