{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:23:12Z","timestamp":1763202192990,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tencon.2018.8650339","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T21:10:38Z","timestamp":1552943438000},"page":"0076-0080","source":"Crossref","is-referenced-by-count":16,"title":["Image Privacy Protection Techniques: A Survey"],"prefix":"10.1109","author":[{"given":"Lusia","family":"Rakhmawati","sequence":"first","affiliation":[]},{"family":"Wirawan","sequence":"additional","affiliation":[]},{"family":"Suwadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/34.927467"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179382"},{"key":"ref30","first-page":"1","article-title":"Overview and evaluation of the JPEG XT HDR image compression standard","author":"artusi","year":"2015","journal-title":"J Real-Time Image Process"},{"key":"ref35","first-page":"9","author":"meng","year":"2014","journal-title":"Face de-identification with perfect privacy protection ibid"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859759"},{"key":"ref10","first-page":"227","article-title":"Integrating utility into face de- identification","volume":"3856","author":"gross","year":"2006","journal-title":"Workshop on Privacy Enhancing Technologies - PET 2005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3_8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6012206"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/289444.289450"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1117\/12.2027040","article-title":"Framework for objective evaluation of privacy filters","author":"korshunov","year":"2013","journal-title":"Proc of SPIE 8856 Applications of Digital Image Processing XXXVI"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583334"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1207-9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583552"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2728479"},{"article-title":"JPEG-HDR: A backwards-compatible, high dynamic range extension to JPEG","year":"0","author":"ward","key":"ref28"},{"key":"ref4","first-page":"1","article-title":"Securing embedded smart cameras with trusted computing. EURASIP Journal on Wireless Communications and Networking","author":"winkler","year":"2011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1012551.1012566"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.05.020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77409-9_14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1141911.1141946"},{"key":"ref5","first-page":"1","volume":"47","author":"winkler","year":"2014","journal-title":"Security and privacy protection in visual sensor networks A survey"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622791"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2013.6636641"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.01.041"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"journal-title":"Privacy and Human Rights An International Survey of Privacy Laws and Practice","year":"0","key":"ref1"},{"journal-title":"JPEG Still Image Data Compression Standard","year":"0","author":"pennebaker","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2005.50"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/30.125072"},{"key":"ref24","first-page":"2:1","article-title":"HDR false color maps","volume":"14","year":"2016","journal-title":"ACM Trans Appl Perception"},{"journal-title":"A proposed methodology for evaluating","year":"0","author":"aky\u00a8 uz","key":"ref23"},{"key":"ref26","first-page":"307","article-title":"Using a residual image to extend the color gamut and dynamic range of an sRGB image","author":"spaulding","year":"2003","journal-title":"Proc IS and TS PICS Conf"},{"key":"ref25","first-page":"93 941l","article-title":"Using false colors to protect visual privacy of sensitive content","author":"\u00b8i","year":"2015","journal-title":"Proc IS&T\/SPIE Electronic Imaging 97"}],"event":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","start":{"date-parts":[[2018,10,28]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2018,10,31]]}},"container-title":["TENCON 2018 - 2018 IEEE Region 10 Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8643125\/8650051\/08650339.pdf?arnumber=8650339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T04:53:18Z","timestamp":1598244798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8650339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/tencon.2018.8650339","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}