{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T00:36:49Z","timestamp":1768091809118,"version":"3.49.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP Journal on Information Security"],"published-print":{"date-parts":[[2009]]},"DOI":"10.1155\/2009\/236139","type":"journal-article","created":{"date-parts":[[2009,11,19]],"date-time":"2009-11-19T20:45:16Z","timestamp":1258663516000},"page":"1-18","source":"Crossref","is-referenced-by-count":12,"title":["Video Data Hiding for Managing Privacy Information in Surveillance Systems"],"prefix":"10.1186","volume":"2009","author":[{"given":"Jithendra K.","family":"Paruchuri","sequence":"first","affiliation":[]},{"given":"Sen-ching S.","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"Michael W.","family":"Hail","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/75427"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"8","first-page":"50","volume":"3","year":"2005"},{"issue":"2","key":"14","first-page":"168","volume":"30","year":"2009"},{"key":"15","first-page":"1152","volume":"18","year":"2008"},{"key":"17","series-title":"Lecture Notes in Computer Science","volume":"4844","year":"2007"},{"key":"21","year":"2002"},{"issue":"12","key":"22","first-page":"1673","volume":"6","year":"1997"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"31","volume-title":"Protecting and managing privacy information in video surveillance systems","year":"2009"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/29.90373"},{"issue":"8","key":"36","first-page":"716","volume":"38","year":"1952"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.888343"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","deposited":{"date-parts":[[2011,3,2]],"date-time":"2011-03-02T04:15:16Z","timestamp":1299039316000},"score":1,"resource":{"primary":{"URL":"http:\/\/jis.eurasipjournals.com\/content\/2009\/1\/236139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":14,"alternative-id":["236139","236139"],"URL":"https:\/\/doi.org\/10.1155\/2009\/236139","relation":{},"ISSN":["1687-4161","1687-417X"],"issn-type":[{"value":"1687-4161","type":"print"},{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}