{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:30:53Z","timestamp":1762252253388,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T00:00:00Z","timestamp":1441584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF China Distinguished Young Scholars Program","award":["61125202"],"award-info":[{"award-number":["61125202"]}]},{"name":"NSF China CERG","award":["61361166009"],"award-info":[{"award-number":["61361166009"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,7]]},"DOI":"10.1145\/2789168.2790106","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T20:08:52Z","timestamp":1440706132000},"page":"372-385","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Kaleido"],"prefix":"10.1145","author":[{"given":"Lan","family":"Zhang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Cheng","family":"Bo","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Jiahui","family":"Hou","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Xiang-Yang","family":"Li","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Kebin","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cmos image sensors continue march to dominance over ccds. https:\/\/technology.ihs.com\/389476\/cmos-image-sensors-continue-march-to-dominance-over-ccds.  Cmos image sensors continue march to dominance over ccds. https:\/\/technology.ihs.com\/389476\/cmos-image-sensors-continue-march-to-dominance-over-ccds."},{"key":"e_1_3_2_1_2_1","unstructured":"Google street view. http:\/\/www.google.com\/streetview.  Google street view. http:\/\/www.google.com\/streetview."},{"key":"e_1_3_2_1_3_1","unstructured":"Image sensors market analysis. http:\/\/www.grandviewresearch.com\/industry-analysis\/image-sensors-market.  Image sensors market analysis. http:\/\/www.grandviewresearch.com\/industry-analysis\/image-sensors-market."},{"key":"e_1_3_2_1_4_1","unstructured":"Pirateeye. http:\/\/www.pirateeye.com\/.  Pirateeye. http:\/\/www.pirateeye.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Preventing movie piracy. http:\/\/www.technologyreview.com\/news\/406063\/preventing-movie-piracy\/.  Preventing movie piracy. http:\/\/www.technologyreview.com\/news\/406063\/preventing-movie-piracy\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Putting a price tag on film piracy. http:\/\/blogs.wsj.com\/numbers\/putting-a-price-tag-on-film-piracy-1228\/.  Putting a price tag on film piracy. http:\/\/blogs.wsj.com\/numbers\/putting-a-price-tag-on-film-piracy-1228\/."},{"key":"e_1_3_2_1_7_1","volume-title":"New visual cryptography algorithm for colored image. arXiv preprint arXiv:1004.4445","author":"Abdulla S.","year":"2010","unstructured":"Abdulla , S. New visual cryptography algorithm for colored image. arXiv preprint arXiv:1004.4445 ( 2010 ). Abdulla, S. New visual cryptography algorithm for colored image. arXiv preprint arXiv:1004.4445 (2010)."},{"key":"e_1_3_2_1_8_1","volume-title":"Spatial and temporal selectivity of the human motion detection system. Vision research 25, 8","author":"Anderson S. J.","year":"1985","unstructured":"Anderson , S. J. , and Burr , D. C . Spatial and temporal selectivity of the human motion detection system. Vision research 25, 8 ( 1985 ), 1147--1154. Anderson, S. J., and Burr, D. C. Spatial and temporal selectivity of the human motion detection system. Vision research 25, 8 (1985), 1147--1154."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592585"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668339"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2005.1577245"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.38"},{"key":"e_1_3_2_1_14_1","volume-title":"A systematic scheme for measuring the performance of the display-camera channel. arXiv preprint arXiv:1501.02528","author":"Chen C.","year":"2015","unstructured":"Chen , C. , and Mow , W. H . A systematic scheme for measuring the performance of the display-camera channel. arXiv preprint arXiv:1501.02528 ( 2015 ). Chen, C., and Mow, W. H. A systematic scheme for measuring the performance of the display-camera channel. arXiv preprint arXiv:1501.02528 (2015)."},{"key":"e_1_3_2_1_15_1","volume-title":"Cisco visual networking index: Forecast and methodology","author":"Cisco I.","year":"2013","unstructured":"Cisco , I. Cisco visual networking index: Forecast and methodology , 2013 --2018. CISCO White paper (2014), 2013--2018. Cisco, I. Cisco visual networking index: Forecast and methodology, 2013--2018. CISCO White paper (2014), 2013--2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560429"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928225"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583552"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099711"},{"key":"e_1_3_2_1_20_1","volume-title":"Fitting physical screen parameters to the human eye. Vision and visual dysfunction: The man-machine interface","author":"Farrell F.","year":"1991","unstructured":"Farrell , F. Fitting physical screen parameters to the human eye. Vision and visual dysfunction: The man-machine interface . Boca Raton, FL : CRC ( 1991 ). Farrell, F. Fitting physical screen parameters to the human eye. Vision and visual dysfunction: The man-machine interface. Boca Raton, FL: CRC (1991)."},{"key":"e_1_3_2_1_21_1","volume-title":"Dynamic psychophysics and the phi phenomenon","author":"Gilbert G. M.","year":"1939","unstructured":"Gilbert , G. M. Dynamic psychophysics and the phi phenomenon . Archives of Psychology (Columbia University) ( 1939 ). Gilbert, G. M. Dynamic psychophysics and the phi phenomenon. Archives of Psychology (Columbia University) (1939)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307645"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00258-3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2006.876601"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500437"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639132"},{"key":"e_1_3_2_1_28_1","volume-title":"Human visual cortex responds to invisible chromatic flicker. Nature neuroscience 10, 5","author":"Jiang Y.","year":"2007","unstructured":"Jiang , Y. , Zhou , K. , and He , S . Human visual cortex responds to invisible chromatic flicker. Nature neuroscience 10, 5 ( 2007 ), 657--662. Jiang, Y., Zhou, K., and He, S. Human visual cortex responds to invisible chromatic flicker. Nature neuroscience 10, 5 (2007), 657--662."},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"Disco: Displays that communicate","volume":"99","author":"Jo K.","year":"2013","unstructured":"Jo , K. , Gupta , M. , Nayar , S. , Liu , D. , Gu , J. , Hitomi , Y. , Mitsunaga , T. , Yin , Q. , Iso , D. , Smith , B. , Disco: Displays that communicate . IEEE Transactions on Pattern Analysis and Machine Intelligence 99 ( 2013 ), 1 . Jo, K., Gupta, M., Nayar, S., Liu, D., Gu, J., Hitomi, Y., Mitsunaga, T., Yin, Q., Iso, D., Smith, B., et al. Disco: Displays that communicate. IEEE Transactions on Pattern Analysis and Machine Intelligence 99 (2013), 1.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281195"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742651"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2721896.2721910"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742667"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2746308"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/col.1049"},{"key":"e_1_3_2_1_36_1","volume-title":"Abnormalities of chromatic and luminance critical flicker frequency in multiple sclerosis. Investigative ophthalmology & visual science 23, 2","author":"Mason R. J.","year":"1982","unstructured":"Mason , R. J. , Snelgar , R. S. , Foster , D. H. , Heron , J. R. , and Jones , R. E . Abnormalities of chromatic and luminance critical flicker frequency in multiple sclerosis. Investigative ophthalmology & visual science 23, 2 ( 1982 ), 246--252. Mason, R. J., Snelgar, R. S., Foster, D. H., Heron, J. R., and Jones, R. E. Abnormalities of chromatic and luminance critical flicker frequency in multiple sclerosis. Investigative ophthalmology & visual science 23, 2 (1982), 246--252."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053419"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/647214.720380"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851258"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.908587"},{"key":"e_1_3_2_1_42_1","first-page":"2004","article-title":"Frequently asked questions about color","author":"Poynton C","year":"1997","unstructured":"Poynton , C . Frequently asked questions about color . Retrieved June 19 ( 1997 ), 2004 . Poynton, C. Frequently asked questions about color. Retrieved June 19 (1997), 2004.","journal-title":"Retrieved"},{"key":"e_1_3_2_1_43_1","first-page":"515","volume-title":"Proceedings of Symposium on Networked Systems Design and Implementation","author":"Ra M.-R.","year":"2013","unstructured":"Ra , M.-R. , Govindan , R. , and Ortega , A . P3: Toward privacy-preserving photo sharing . In Proceedings of Symposium on Networked Systems Design and Implementation ( 2013 ), pp. 515 -- 528 . Ra, M.-R., Govindan, R., and Ortega, A. P3: Toward privacy-preserving photo sharing. In Proceedings of Symposium on Networked Systems Design and Implementation (2013), pp. 515--528."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2602339.2602367"},{"key":"e_1_3_2_1_45_1","volume-title":"Efficient colour visual encryption or 'shared colors of benetton'. rump session of EUROCRYPT 96","author":"Rijmen V.","year":"1996","unstructured":"Rijmen , V. , and Preneel , B . Efficient colour visual encryption or 'shared colors of benetton'. rump session of EUROCRYPT 96 ( 1996 ). Rijmen, V., and Preneel, B. Efficient colour visual encryption or 'shared colors of benetton'. rump session of EUROCRYPT 96 (1996)."},{"key":"e_1_3_2_1_46_1","first-page":"229","volume-title":"Information, Security and Cryptology","author":"Sadeghi A.-R.","year":"2010","unstructured":"Sadeghi , A.-R. , Schneider , T. , and Wehrenberg , I . Efficient privacy-preserving face recognition . In Information, Security and Cryptology . Springer , 2010 , pp. 229 -- 244 . Sadeghi, A.-R., Schneider, T., and Wehrenberg, I. Efficient privacy-preserving face recognition. In Information, Security and Cryptology. Springer, 2010, pp. 229--244."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.65"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464440"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551201_5"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.7.000743"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742652"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673867"},{"key":"e_1_3_2_1_53_1","unstructured":"Wang Y. Survey of objective video quality measurements.  Wang Y. Survey of objective video quality measurements."},{"key":"e_1_3_2_1_54_1","volume-title":"Video quality assessment based on structural distortion measurement. Signal processing: Image communication 19, 2","author":"Wang Z.","year":"2004","unstructured":"Wang , Z. , Lu , L. , and Bovik , A. C . Video quality assessment based on structural distortion measurement. Signal processing: Image communication 19, 2 ( 2004 ), 121--132. Wang, Z., Lu, L., and Bovik, A. C. Video quality assessment based on structural distortion measurement. Signal processing: Image communication 19, 2 (2004), 121--132."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560423"},{"key":"e_1_3_2_1_56_1","first-page":"455","volume-title":"International Conference on Image Processing","volume":"1","author":"Wong P. W.","year":"1998","unstructured":"Wong , P. W. A public key watermark for image verification and authentication . In International Conference on Image Processing ( 1998 ), vol. 1 , IEEE, pp. 455 -- 459 . Wong, P. W. A public key watermark for image verification and authentication. In International Conference on Image Processing (1998), vol. 1, IEEE, pp. 455--459."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2012.6402539"},{"key":"e_1_3_2_1_58_1","volume-title":"Optimal radiometric calibration for camera-display communication. arXiv preprint arXiv:1501.01744","author":"Yuan W.","year":"2015","unstructured":"Yuan , W. , Wengrowski , E. , Dana , K. J. , Ashok , A. , Gruteser , M. , and Mandayam , N . Optimal radiometric calibration for camera-display communication. arXiv preprint arXiv:1501.01744 ( 2015 ). Yuan, W., Wengrowski, E., Dana, K. J., Ashok, A., Gruteser, M., and Mandayam, N. Optimal radiometric calibration for camera-display communication. arXiv preprint arXiv:1501.01744 (2015)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2015.104"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.39"},{"key":"e_1_3_2_1_61_1","article-title":"Message in a sealed bottle: Privacy preserving friending in mobile social networks. In","author":"Zhang L.","year":"2014","unstructured":"Zhang , L. , Li , X.-Y. , Liu , K. , Jung , T. , and Liu , Y . Message in a sealed bottle: Privacy preserving friending in mobile social networks. In IEEE Transactions on Mobile Computing ( 2014 ), IEEE. Zhang, L., Li, X.-Y., Liu, K., Jung, T., and Liu, Y. Message in a sealed bottle: Privacy preserving friending in mobile social networks. In IEEE Transactions on Mobile Computing (2014), IEEE.","journal-title":"IEEE Transactions on Mobile Computing ("},{"key":"e_1_3_2_1_62_1","volume-title":"Enable portrait privacy protection in photo capturing and sharing. arXiv preprint arXiv:1410.6582","author":"Zhang L.","year":"2014","unstructured":"Zhang , L. , Liu , K. , Li , X.-Y. , Feng , P. , Liu , C. , and Liu , Y . Enable portrait privacy protection in photo capturing and sharing. arXiv preprint arXiv:1410.6582 ( 2014 ). Zhang, L., Liu, K., Li, X.-Y., Feng, P., Liu, C., and Liu, Y. Enable portrait privacy protection in photo capturing and sharing. arXiv preprint arXiv:1410.6582 (2014)."},{"key":"e_1_3_2_1_63_1","volume-title":"Mar. 14","author":"Zhao J.","year":"2014","unstructured":"Zhao , J. , and Mercier , G . Transactional video marking system , Mar. 14 2014 . US Patent App . 14\/214,366. Zhao, J., and Mercier, G. Transactional video marking system, Mar. 14 2014. US Patent App. 14\/214,366."}],"event":{"name":"MobiCom'15: The 21th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Paris France","acronym":"MobiCom'15"},"container-title":["Proceedings of the 21st Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2789168.2790106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2789168.2790106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:42:51Z","timestamp":1750225371000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2789168.2790106"}},"subtitle":["You Can Watch It But Cannot Record It"],"short-title":[],"issued":{"date-parts":[[2015,9,7]]},"references-count":63,"alternative-id":["10.1145\/2789168.2790106","10.1145\/2789168"],"URL":"https:\/\/doi.org\/10.1145\/2789168.2790106","relation":{},"subject":[],"published":{"date-parts":[[2015,9,7]]},"assertion":[{"value":"2015-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}