{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:34:17Z","timestamp":1729665257719,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1109\/avss.2009.48","type":"proceedings-article","created":{"date-parts":[[2009,10,7]],"date-time":"2009-10-07T12:01:37Z","timestamp":1254916897000},"page":"424-429","source":"Crossref","is-referenced-by-count":30,"title":["Privacy Protection in Video Surveillance Systems Using Scalable Video Coding"],"prefix":"10.1109","author":[{"given":"Hosik","family":"Sohn","sequence":"first","affiliation":[]},{"given":"Esla T.","family":"AnzaKu","sequence":"additional","affiliation":[]},{"given":"Wesley","family":"De Neve","sequence":"additional","affiliation":[]},{"given":"Yong Man","family":"Ro","sequence":"additional","affiliation":[]},{"given":"Konstantinos N.","family":"Plataniotis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Datasets","year":"0","key":"15"},{"journal-title":"Open computer vision library","year":"0","key":"16"},{"key":"13","first-page":"71","article-title":"scalable security and conditional access control for multiple regions of interest in scalable video coding, the 7th international workshop on digital watermarking","volume":"5041","author":"kim","year":"2008","journal-title":"LNCS"},{"year":"2007","key":"14","article-title":"joint scalable video model jsvm - 11"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45243-0_39","article-title":"empirical analysis of detection cascades of boosted classifiers for rapid object detection","author":"lienhart","year":"2003","journal-title":"Proc German Symp Pattern Recognition (DAGM)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712098"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.927110"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928225"},{"journal-title":"What's Wrong With Public Video Surveillance","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2005.05.008"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"5","article-title":"robust human face hiding ensuring privacy","author":"martinez-ponte","year":"2005","journal-title":"Proc Int Workshop Image Anal Multimedia Interactive Services (WIAMIS)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"year":"2006","key":"9","article-title":"wg11 and itu-t sg16 q.6, jvt-u173, \"proposal for a simple profile for scalable video coding"},{"year":"0","key":"8"}],"event":{"name":"2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","start":{"date-parts":[[2009,9,2]]},"location":"Genova, Italy","end":{"date-parts":[[2009,9,4]]}},"container-title":["2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5279443\/5279444\/05279668.pdf?arnumber=5279668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:00:30Z","timestamp":1558562430000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5279668\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/avss.2009.48","relation":{},"subject":[],"published":{"date-parts":[[2009,9]]}}}