{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T09:16:10Z","timestamp":1767777370356,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/percomw.2012.6197644","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T22:30:23Z","timestamp":1337898623000},"page":"914-919","source":"Crossref","is-referenced-by-count":14,"title":["Towards a trustworthy privacy in pervasive video surveillance systems"],"prefix":"10.1109","author":[{"given":"Antoni","family":"Martinez-Balleste","sequence":"first","affiliation":[]},{"given":"Hatem A.","family":"Rashwan","sequence":"additional","affiliation":[]},{"given":"Domenec","family":"Puig","sequence":"additional","affiliation":[]},{"given":"Antonia Paniza","family":"Fullana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Open Source Computer Vision Library [Online]","year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.905291"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-6616-7"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359558"},{"key":"15","first-page":"121","article-title":"An iterative image registration technique with an application to stereo vision","author":"lucas","year":"0","journal-title":"1981 DARPA Image Understanding Workshop"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923723"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(93)90173-9"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1999.784637"},{"key":"14","first-page":"3061","article-title":"Background modeling and subtraction by codebook construction","volume":"5","author":"kim","year":"0","journal-title":"International Conference on Image Processing 2004"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.007"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.11.003"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"journal-title":"Vision and Autonomous Systems Center's Image Database [Online]","year":"0","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3_4"},{"journal-title":"Directive 95\/46\/ec of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data [Online]","year":"0","key":"24"},{"journal-title":"Ley Orga?nica de Proteccio?n de Datos de Cara?cter Personal [Online]","year":"0","key":"25"},{"journal-title":"Ley Orga?nica 4\/1997 de 4 de Agosto Que Regula la Utilizacio?n de Videoca?maras Por Las Fuerzas de Seguridad Ciudadana en Lugares Pu?blicos [Online]","year":"0","key":"26"},{"journal-title":"Ley 23\/1992 de 30 de Julio de Seguridad Privada [Online]","year":"0","key":"27"},{"journal-title":"Gui?a Sobre Videovigilancia de la Agencia Espan?ola de Proteccio?n de Datos [Online]","year":"0","key":"28"},{"key":"29","first-page":"61","article-title":"Ana?lisis de la doctrina administrativa de la agencia espan?ola de proteccio?n de datos en relacio?n con el tratamiento de ima?genes a trave?s de videovigilancia","author":"bermejo-bosch","year":"2011","journal-title":"Revista Aranzadi de Derecho y Nuevas Tecnologi?as"},{"journal-title":"The Universal Declaration of Human Rights [Online]","year":"0","key":"3"},{"journal-title":"Advances in Artificial Intelligence for Data Privacy and Security","year":"2009","author":"solanas","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245124"},{"journal-title":"Introducing Pits and Pets Technologies Affecting Privacy [Online]","year":"2001","author":"clarke","key":"1"},{"key":"30","article-title":"Coto a las ca?maras de seguridad","author":"moscoso","year":"2011","journal-title":"Actualidad Juri?ica Aranzadi"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1865987.1866009"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3"},{"key":"31","article-title":"The sybil attack","volume":"1","author":"douceur","year":"2002","journal-title":"LNCS"},{"journal-title":"Convention for the Protection of Human Rights and Fundamental Freedoms [Online]","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25237-2"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.223"}],"event":{"name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2012,3,19]]},"location":"Lugano, Switzerland","end":{"date-parts":[[2012,3,23]]}},"container-title":["2012 IEEE International Conference on Pervasive Computing and Communications Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6192378\/6197445\/06197644.pdf?arnumber=6197644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T18:12:08Z","timestamp":1490119928000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6197644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/percomw.2012.6197644","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}