-
1
-
-
20844455524
-
Blinkering surveillance: Enabling video privacy through computer vision
-
A. Senior, S. Pankanti, A. Hampapur, Y.-L. Tian L. Brown, and A. Ekin, "Blinkering surveillance: Enabling video privacy through computer vision," Security and Privacy, vol. 3, pp. 50-57, 2005.
-
(2005)
Security and Privacy
, vol.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Tian, Y.-L.4
Brown, L.5
Ekin, A.6
-
2
-
-
51349121612
-
Respectful cameras: Detecting visual markers in real-time to address privacy concerns
-
J. Schiff, M. Meingast, D. Mulligan, S. Sastry, and K. Goldberg, "Respectful cameras: Detecting visual markers in real-time to address privacy concerns," in International Conference on Intelligent Robots and Systems (IROS), 2007.
-
(2007)
International Conference on Intelligent Robots and Systems (IROS)
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.3
Sastry, S.4
Goldberg, K.5
-
4
-
-
34548525381
-
A middleware architecture for privacy protection
-
November
-
G. V. Lioudakis et al., "A middleware architecture for privacy protection," Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 51, no. 16, pp. 4679-4696, November 2007.
-
(2007)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.51
, Issue.16
, pp. 4679-4696
-
-
Lioudakis, G.V.1
-
5
-
-
14944378854
-
The networked sensor tapestry (nest): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks
-
New York, NY, USA, ACM Press
-
D.-A. Fidaleo, H.-A. Nguyen, and M. Trivedi, "The networked sensor tapestry (nest): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks," in VSSN '04: Proceedings of the ACM 2nd international workshop on Video surveillance & sensor networks, New York, NY, USA, 2004, pp. 46-53, ACM Press.
-
(2004)
VSSN '04: Proceedings of the ACM 2nd international workshop on Video surveillance & sensor networks
, pp. 46-53
-
-
Fidaleo, D.-A.1
Nguyen, H.-A.2
Trivedi, M.3
-
7
-
-
33947164049
-
-
T. E. Boult, Pico: Privacy through invertible cryptographic obscuration, in Proc. Computer Vision for Interactive and Intelligent En-vironents: The Dr. Bradley D. Carter Workshop Series. University of Kentucky, 2005.
-
T. E. Boult, "Pico: Privacy through invertible cryptographic obscuration," in Proc. Computer Vision for Interactive and Intelligent En-vironents: The Dr. Bradley D. Carter Workshop Series. University of Kentucky, 2005.
-
-
-
-
9
-
-
69949161806
-
Protecting and managing privacy information in video surveillance systems
-
Andrew Senior, Ed. Springer
-
M. V Venkatesh, S.-C. Cheung, J. K. Paruchuri, J. Zhao, and T. Nguyen, "Protecting and managing privacy information in video surveillance systems.," in Protecting Privacy in Video Surveillance, Andrew Senior, Ed. Springer, 2008.
-
(2008)
Protecting Privacy in Video Surveillance
-
-
Venkatesh, M.V.1
Cheung, S.-C.2
Paruchuri, J.K.3
Zhao, J.4
Nguyen, T.5
-
10
-
-
33744454443
-
A reversible data hiding scheme with modified side match vector quantization
-
C. C. Chang, W. L. Tai, and M. H. Lin, "A reversible data hiding scheme with modified side match vector quantization," in Proceedings of the International Conference on Advanced Information Networking and Applications, 2005, vol. 1, pp. 947-952.
-
(2005)
Proceedings of the International Conference on Advanced Information Networking and Applications
, vol.1
, pp. 947-952
-
-
Chang, C.C.1
Tai, W.L.2
Lin, M.H.3
|