{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:31:35Z","timestamp":1729657895572,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/greencom-cpscom.2010.74","type":"proceedings-article","created":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T06:26:37Z","timestamp":1299565597000},"page":"691-698","source":"Crossref","is-referenced-by-count":3,"title":["The Multi-Modal Human Identification Based on Smartcard in Video Surveillance System"],"prefix":"10.1109","author":[{"given":"Hae-Min","family":"Moon","sequence":"first","affiliation":[]},{"given":"Chulho","family":"Won","sequence":"additional","affiliation":[]},{"given":"Sung Bum","family":"Pan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2008.116"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2007.381763"},{"key":"ref12","first-page":"1","article-title":"A new approach to obtain height measurements from video","volume":"3576","author":"criminisi","year":"1998","journal-title":"SPIE"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45783-6_28","article-title":"Single-view metrology: algorithms and application","author":"criminisi","year":"2002","journal-title":"Pattern Recognition 24th DAGM-Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-050753-8.50061-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BF00130487"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2002.1234821"},{"key":"ref4","article-title":"Robust human face hiding ensuring privacy","author":"martinez","year":"2005","journal-title":"Eight International Workshop on Image Analysis for Multimedia Interactive Services"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.323270"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2007.4399122"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1117\/12.664945"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EM-COM.2009.5402973"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560021"},{"journal-title":"Privacy and Freedom","year":"1967","author":"westin","key":"ref2"},{"key":"ref1","article-title":"Privacy invasions in ubiquitous computing","author":"langheinrich","year":"2002","journal-title":"Workshop on Socially-Informed Design of Privacy-Enhancing Solutions in Ubiquitous Computing"},{"key":"ref9","first-page":"1","article-title":"Interactive video surveillance by using environmental and mobile cameras","author":"kitahara","year":"2008","journal-title":"IEEE Automation Congress"}],"event":{"name":"Int'l Conference on Cyber, Physical and Social Computing (CPSCom)","start":{"date-parts":[[2010,12,18]]},"location":"Hangzhou, China","end":{"date-parts":[[2010,12,20]]}},"container-title":["2010 IEEE\/ACM Int'l Conference on Green Computing and Communications &amp; Int'l Conference on Cyber, Physical and Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5724111\/5724803\/05724905.pdf?arnumber=5724905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T01:51:56Z","timestamp":1592358716000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5724905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/greencom-cpscom.2010.74","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}