{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:27Z","timestamp":1750307247676,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T00:00:00Z","timestamp":1338854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,5]]},"DOI":"10.1145\/2324796.2324813","type":"proceedings-article","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T11:53:15Z","timestamp":1341316395000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Security-oriented picture-in-picture visual modifications"],"prefix":"10.1145","author":[{"given":"Thanh-Toan","family":"Do","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Rennes 1, Rennes, France"}]},{"given":"Ewa","family":"Kijak","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Rennes 1, Rennes, France"}]},{"given":"Laurent","family":"Amsaleg","sequence":"additional","affiliation":[{"name":"CNRS, IRISA, Rennes, France"}]},{"given":"Teddy","family":"Furon","sequence":"additional","affiliation":[{"name":"INRIA Rennes Bretagne--Atlantique, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2012,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Generalizing the Hough transform to detect arbitrary shapes. Pattern Recognition, 13(2)","author":"Ballard D.","year":"1981","unstructured":"D. Ballard . Generalizing the Hough transform to detect arbitrary shapes. Pattern Recognition, 13(2) , 1981 . D. Ballard. Generalizing the Hough transform to detect arbitrary shapes. Pattern Recognition, 13(2), 1981."},{"key":"e_1_3_2_1_2_1","volume-title":"TRECVID Workshop, NIST","author":"Barrios J. M.","year":"2010","unstructured":"J. M. Barrios and B. Bustos . Content-based video copy detection: Prisma . In TRECVID Workshop, NIST , 2010 . J. M. Barrios and B. Bustos. Content-based video copy detection: Prisma. In TRECVID Workshop, NIST, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"TRECVID Workshop, NIST","author":"Chen J.","year":"2008","unstructured":"J. Chen and J. Jiang . University of Bradford, content based copy detection task . In TRECVID Workshop, NIST , 2008 . J. Chen and J. Jiang. University of Bradford, content based copy detection task. In TRECVID Workshop, NIST, 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288254"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2010.5661993"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1877972.1877977"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874185"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"e_1_3_2_1_9_1","volume-title":"TRECVID Workshop, NIST","author":"Gengembre N.","year":"2008","unstructured":"N. Gengembre and S.-A. Berrani . The Orange Labs real time video copy detection system . In TRECVID Workshop, NIST , 2008 . N. Gengembre and S.-A. Berrani. The Orange Labs real time video copy detection system. In TRECVID Workshop, NIST, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.146"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631376"},{"key":"e_1_3_2_1_12_1","volume-title":"TRECVID Workshop, NIST","author":"J\u00e9gou H.","year":"2010","unstructured":"H. J\u00e9gou , M. Douze , G. Gravier , C. Schmid , and P. Gros . INRIA LEAR-TEXMEX: Video copy detection task . In TRECVID Workshop, NIST , 2010 . H. J\u00e9gou, M. Douze, G. Gravier, C. Schmid, and P. Gros. INRIA LEAR-TEXMEX: Video copy detection task. In TRECVID Workshop, NIST, 2010."},{"key":"e_1_3_2_1_13_1","author":"J\u00e9gou H.","year":"2011","unstructured":"H. J\u00e9gou , F. Perronnin , M. Douze , J. S\u00e1nchez , P. P\u00e9rez , and C. Schmid . Aggregating local image descriptors into compact codes. IEEE Transactions on PAMI , 2011 . H. J\u00e9gou, F. Perronnin, M. Douze, J. S\u00e1nchez, P. P\u00e9rez, and C. Schmid. Aggregating local image descriptors into compact codes. IEEE Transactions on PAMI, 2011.","journal-title":"Aggregating local image descriptors into compact codes. IEEE Transactions on PAMI"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.130"},{"key":"e_1_3_2_1_15_1","volume-title":"Thu-img. In TRECVID Workshop, NIST","author":"Liang Y.","year":"2009","unstructured":"Y. Liang , B. Cao , J. Li , C. Zhu , Y. Zhang , C. Tan , G. Chen , C. Sun , J. Yuan , M. Xu , and B. Zhang . Thu-img. In TRECVID Workshop, NIST , 2009 . Y. Liang, B. Cao, J. Li, C. Zhu, Y. Zhang, C. Tan, G. Chen, C. Sun, J. Yuan, M. Xu, and B. Zhang. Thu-img. In TRECVID Workshop, NIST, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743384.1743409"},{"key":"e_1_3_2_1_17_1","volume-title":"TRECVID Workshop, NIST","author":"Liu Z.","year":"2009","unstructured":"Z. Liu , T. Liu , and B. Shahraray . AT&T Research, content-based copy detection . In TRECVID Workshop, NIST , 2009 . Z. Liu, T. Liu, and B. Shahraray. AT&T Research, content-based copy detection. In TRECVID Workshop, NIST, 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_19_1","volume-title":"TRECVID Workshop, NIST","author":"Orhan O.","year":"2008","unstructured":"O. Orhan , J. Hochreiter , J. Poock , Q. Chen , A. Chabra , and M. Shah . University of central florida, content based copy detection and surveillance event detection . In TRECVID Workshop, NIST , 2008 . O. Orhan, J. Hochreiter, J. Poock, Q. Chen, A. Chabra, and M. Shah. University of central florida, content based copy detection and surveillance event detection. In TRECVID Workshop, NIST, 2008."},{"key":"e_1_3_2_1_20_1","volume-title":"TRECVID Workshop, NIST","author":"Over P.","year":"2011","unstructured":"P. Over , G. Awad , M. Michel , J. Fiscus , W. Kraaij , and A. F. Smeaton . An overview of the goals, tasks, data, evaluation mechanisms and metrics . In TRECVID Workshop, NIST , 2011 . P. Over, G. Awad, M. Michel, J. Fiscus, W. Kraaij, and A. F. Smeaton. An overview of the goals, tasks, data, evaluation mechanisms and metrics. In TRECVID Workshop, NIST, 2011."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383172"},{"key":"e_1_3_2_1_22_1","volume-title":"Thu-img. In TRECVID Workshop, NIST","author":"Sun C.","year":"2010","unstructured":"C. Sun , J. Li , B. Zhang , and Q. Zhang . Thu-img. In TRECVID Workshop, NIST , 2010 . C. Sun, J. Li, B. Zhang, and Q. Zhang. Thu-img. In TRECVID Workshop, NIST, 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874249"},{"key":"e_1_3_2_1_24_1","volume-title":"TRECVID Workshop, NIST","author":"Ngo C.","year":"2010","unstructured":"C. wah Ngo , S. ai Zhu , H. khoon Tan , W. lei Zhao , and X. yong Wei . VIREO : Semantic indexing, known-item search, and content-based copy detection . In TRECVID Workshop, NIST , 2010 . C. wah Ngo, S. ai Zhu, H. khoon Tan, W. lei Zhao, and X. yong Wei. VIREO: Semantic indexing, known-item search, and content-based copy detection. In TRECVID Workshop, NIST, 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"TRECVID Workshop, NIST","author":"D.","year":"2011","unstructured":"D. B. Wan-Lei Zhao and T. M. Breuel. Semantic indexing & content-based copy detection tasks . In TRECVID Workshop, NIST , 2011 . D. B. Wan-Lei Zhao and T. M. Breuel. Semantic indexing & content-based copy detection tasks. In TRECVID Workshop, NIST, 2011."}],"event":{"name":"ICMR '12: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Hong Kong China","acronym":"ICMR '12"},"container-title":["Proceedings of the 2nd ACM International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2324796.2324813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2324796.2324813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:09Z","timestamp":1750243929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2324796.2324813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,5]]},"references-count":25,"alternative-id":["10.1145\/2324796.2324813","10.1145\/2324796"],"URL":"https:\/\/doi.org\/10.1145\/2324796.2324813","relation":{},"subject":[],"published":{"date-parts":[[2012,6,5]]},"assertion":[{"value":"2012-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}