{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T12:10:42Z","timestamp":1774872642478,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2011,6,1]],"date-time":"2011-06-01T00:00:00Z","timestamp":1306886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/tcsvt.2011.2133270","type":"journal-article","created":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T21:03:41Z","timestamp":1301432621000},"page":"804-815","source":"Crossref","is-referenced-by-count":79,"title":["Hierarchical Method for Foreground Detection Using Codebook Model"],"prefix":"10.1109","volume":"21","author":[{"family":"Jing-Ming Guo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Yun-Fu Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Chih-Hsien Hsia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Min-Hsiung Shih","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Chih-Sheng Hsu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/34.868677"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.11.023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1039"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.916989"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.rti.2004.12.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.924285"},{"key":"ref16","first-page":"263","article-title":"Multivalued background\/foreground separation for moving object detection","volume":"lncs 5571","author":"massalena","year":"2009","journal-title":"Fuzzy Logic and Applications"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-00784-6","author":"kohonen","year":"1988","journal-title":"Self-Organization and Associative Memory"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70843"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.68"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2001.948679"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.10.007"},{"key":"ref6","first-page":"1","article-title":"Robust region-based background subtraction and shadow removing using color and gradient information","author":"izadi","year":"2008","journal-title":"Proc Int Conf Pattern Recognit"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1233909"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959698"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2007.902842"},{"key":"ref2","first-page":"1","article-title":"A statistical approach for real-time robust background subtraction and shadow detection","volume":"99","author":"horprasert","year":"1999","journal-title":"Proc IEEE Int Conf Comput Vis"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1999.784637"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.791228"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1979.1094560"},{"key":"ref22","year":"0","journal-title":"Statistical Modeling of Complex Background for Foreground Object Detection"},{"key":"ref21","year":"0","journal-title":"Test Images for Wallflower Paper"},{"key":"ref24","year":"0","journal-title":"Autonomous Agents for On-Scene Networked Incident Management"},{"key":"ref23","author":"davis","year":"1991","journal-title":"Handbook of Genetic Algorithms"},{"key":"ref26","year":"0","journal-title":"PETS2001 Datasets"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2035843"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/76\/5783011\/05739511.pdf?arnumber=5739511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:17Z","timestamp":1633909937000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5739511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":26,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2011.2133270","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6]]}}}