{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:04:58Z","timestamp":1774627498879,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.1145\/3448017.3457385","type":"proceedings-article","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T13:46:26Z","timestamp":1621950386000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of iris obfuscation: Generalising eye information processes for privacy studies in eye tracking."],"prefix":"10.1145","author":[{"given":"Anton M\u00f8lbjerg","family":"Eskildsen","sequence":"first","affiliation":[{"name":"Eye Information Laboratory IT University of Copenhagen, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dan","family":"Witzner Hansen","sequence":"additional","affiliation":[{"name":"Eye Information Laboratory IT University of Copenhagen, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. CASIA-Iris-Interval V4. http:\/\/biometrics.idealtest.org\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.38"},{"key":"e_1_3_2_1_3_1","unstructured":"Council of European Union. 2016. Council regulation (EU) no 2016\/679."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2013.168"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903540"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2500196"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"e_1_3_2_1_8_1","volume-title":"Computer Analysis of Images and Patterns","author":"Fuhl Wolfgang","unstructured":"Wolfgang \u201dFuhl, Thomas K\u00fcbler, Katrin Sippel, Wolfgang Rosenstiel, and Enkelejda\u201d Kasneci. 2015. ExCuSe: Robust Pupil Detection in Real-World Scenarios. In Computer Analysis of Images and Patterns, George Azzopardi and Nicolai Petkov (Eds.). Springer International Publishing, Cham, 39\u201351."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857491.2857505"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2009.4938649"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532769"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.30"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2004.07.013"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.101"},{"key":"e_1_3_2_1_15_1","volume-title":"Eye-tracking dysfunctions in schizophrenic patients and their relatives. Archives of general psychiatry 31, 2","author":"Holzman S","year":"1974","unstructured":"Philip\u00a0S Holzman, Leonard\u00a0R Proctor, Deborah\u00a0L Levy, Nicholas\u00a0J Yasillo, Herbert\u00a0Y Meltzer, and Stephen\u00a0W Hurt. 1974. Eye-tracking dysfunctions in schizophrenic patients and their relatives. Archives of general psychiatry 31, 2 (1974), 143\u2013151."},{"key":"e_1_3_2_1_16_1","volume-title":"Eye movements during everyday behavior predict personality traits. Frontiers in human neuroscience 12","author":"Hoppe Sabrina","year":"2018","unstructured":"Sabrina Hoppe, Tobias Loetscher, Stephanie\u00a0A Morey, and Andreas Bulling. 2018. Eye movements during everyday behavior predict personality traits. Frontiers in human neuroscience 12 (2018), 105."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319816"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379157.3390512"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.1977.01770170088008"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319823"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1201775.882269"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.02.002"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204578"},{"key":"e_1_3_2_1_24_1","volume-title":"A mathematical theory of communication. The Bell system technical journal 27, 3","author":"Shannon E","year":"1948","unstructured":"Claude\u00a0E Shannon. 1948. A mathematical theory of communication. The Bell system technical journal 27, 3 (1948), 379\u2013423."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996276"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1998.710815"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/ICA-180584"},{"key":"e_1_3_2_1_30_1","volume-title":"18th International Conference on Pattern Recognition (ICPR\u201906)","author":"Yao Peng","year":"2006","unstructured":"Peng Yao, Jun Li, Xueyi Ye, Zhenquan Zhuang, and Bin Li. 2006. Iris recognition algorithm using modified log-gabor filters. In 18th International Conference on Pattern Recognition (ICPR\u201906), Vol.\u00a04. IEEE, 461\u2013464."}],"event":{"name":"ETRA '21: 2021 Symposium on Eye Tracking Research and Applications","location":"Virtual Event Germany","acronym":"ETRA '21","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["ACM Symposium on Eye Tracking Research and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448017.3457385","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448017.3457385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:05Z","timestamp":1750195505000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448017.3457385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":30,"alternative-id":["10.1145\/3448017.3457385","10.1145\/3448017"],"URL":"https:\/\/doi.org\/10.1145\/3448017.3457385","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]},"assertion":[{"value":"2021-05-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}