-
3
-
-
0035690734
-
Navier-stokes, fluid dynamics, and image and video inpainting
-
Hawaii
-
M. Bertalmio, A. L. Bertozzi, and G. Sapiro. Navier-stokes, fluid dynamics, and image and video inpainting. In Proceedings of International Conference on Computer Vision and Pattern Recognition, volume I, pages 355-362, Hawaii, 2001.
-
(2001)
Proceedings of International Conference on Computer Vision and Pattern Recognition
, vol.1
, pp. 355-362
-
-
Bertalmio, M.1
Bertozzi, A.L.2
Sapiro, G.3
-
4
-
-
0034446966
-
Image inpainting
-
New Orleans, USA, July
-
M. Bertalmio, G. Sapiro, V. Caselles, and C. Ballester. Image inpainting. In Proceedings of ACM Conference on Computer Graphics (SIGGRAPH), pages 417-424, New Orleans, USA, July 2000.
-
(2000)
Proceedings of ACM Conference on Computer Graphics (SIGGRAPH)
, pp. 417-424
-
-
Bertalmio, M.1
Sapiro, G.2
Caselles, V.3
Ballester, C.4
-
6
-
-
33744454443
-
A reversible data hiding scheme with modified side match vector quantization
-
C. C. Chang, W. L. Tai, and M. H. Lin. A reversible data hiding scheme with modified side match vector quantization. In Proceedings of the International Conference on Advanced Information Networking and Applications, volume 1, pages 947-952, 2005.
-
(2005)
Proceedings of the International Conference on Advanced Information Networking and Applications
, vol.1
, pp. 947-952
-
-
Chang, C.C.1
Tai, W.L.2
Lin, M.H.3
-
8
-
-
33846785339
-
Tools for protecting the privacy of specific individuals in video
-
Article ID 75427, doi:10.1155/2007/75427
-
D. Chen, Y. Chang, R. Yan, and J. Yang. Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Advances in Signal Processing, 2007, Article ID 75427, 9 pages, 2007. doi:10.1155/2007/75427.
-
(2007)
EURASIP Journal on Advances in Signal Processing, 2007
, pp. 9
-
-
Chen, D.1
Chang, Y.2
Yan, R.3
Yang, J.4
-
9
-
-
78649807632
-
Efficient object-based video inpainting
-
S.-C. Cheung, J. Zhao, and M. V. Venkatesh. Efficient object-based video inpainting. In Proceedings of IEEE International Conference on Image Processing, ICIP 2006, pages 705-708, 2006.
-
(2006)
Proceedings of IEEE International Conference on Image Processing, ICIP 2006
, pp. 705-708
-
-
Cheung, S.-C.1
Zhao, J.2
Venkatesh, M.V.3
-
11
-
-
84892258091
-
-
L. Cranor, M. Langheinrich, M. Marchiori, M. P. Marshall, and J. Reagle. The platform for privacy preferences 1.0 (p3p1.0) specification. Technical report, World Wide Web Consortium (W3C), http://www.w3.org/TR/P3P/, 2002.
-
(2002)
The Platform for Privacy Preferences 1.0 (p3p1.0) Specification. Technical Report, World Wide Web Consortium (W3C)
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Marshall, M.P.4
Reagle, J.5
-
12
-
-
4344675264
-
Region filling and object removal by exemplar-based inpainting
-
September
-
A. Criminisi, P. Perez, and K. Toyama. Region filling and object removal by exemplar-based inpainting. IEEE Transactions on Image Processing, 13(9):1200-1212, September 2004.
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.9
, pp. 1200-1212
-
-
Criminisi, A.1
Perez, P.2
Toyama, K.3
-
16
-
-
84892241935
-
-
Public Opinion on Privacy, May 2006
-
Electronic Privacy Information Center, http://www.epic.org/privacy/ survey. Public Opinion on Privacy, May 2006.
-
-
-
-
17
-
-
14944378854
-
The networked sensor tapestry (NEST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks
-
New York, USA, ACM Press
-
D.-A. Fidaleo, H.-A. Nguyen, and M. Trivedi. The networked sensor tapestry (NEST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In VSSN '04: Proceedings of the ACM 2nd international workshop on Video surveillance & sensor networks, pages 46-53, New York, USA, ACM Press, 2004.
-
(2004)
VSSN '04: Proceedings of the ACM 2nd International Workshop on Video Surveillance & Sensor Networks
, pp. 46-53
-
-
Fidaleo, D.-A.1
Nguyen, H.-A.2
Trivedi, M.3
-
20
-
-
84892276405
-
Video repairing under variable illumination using cyclic motions
-
July
-
J. Jia, Y. W. Tai, T. P. Wu, and C. K. Tang. Video repairing under variable illumination using cyclic motions. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 1:364-371, July 2006.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI)
, vol.1
, pp. 364-371
-
-
Jia, J.1
Tai, Y.W.2
Wu, T.P.3
Tang, C.K.4
-
21
-
-
24944434255
-
Video completion using tracking and fragment merging
-
Y. T. Jia, S. M. Hu, and R. R. Martin. Video completion using tracking and fragment merging. In Proceedings of Pacific Graphics, volume 21, pages 601-610, 2005.
-
(2005)
Proceedings of Pacific Graphics
, vol.21
, pp. 601-610
-
-
Jia, Y.T.1
Hu, S.M.2
Martin, R.R.3
-
22
-
-
0003470642
-
Security architecture for the internet protocol
-
December
-
S. Kent and K. Seo. Security architecture for the internet protocol. Technical report, IETF RFC 4301, December 2005.
-
(2005)
Technical Report, IETF RFC 4301
-
-
Kent, S.1
Seo, K.2
-
24
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of Cryptology, 15(3):177-206, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
25
-
-
34548525381
-
A middleware architecture for privacy protection
-
November
-
G. V. Lioudakis, E. A. Koutsoloukas, N. L. Dellas, N. Tselikas, S. Kapellaki, G. N. Prezerakos, D. I. Kaklamani, and I. S. Venieris. A middleware architecture for privacy protection. Computer Networks: The International Journal of Computer and Telecommunications Networking, 51(16):4679-4696, November 2007.
-
(2007)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.51
, Issue.16
, pp. 4679-4696
-
-
Lioudakis, G.V.1
Koutsoloukas, E.A.2
Dellas, N.L.3
Tselikas, N.4
Kapellaki, S.5
Prezerakos, G.N.6
Kaklamani, D.I.7
Venieris, I.S.8
-
28
-
-
14644429006
-
Preserving privacy by de-identifying face images
-
February
-
E. N. Newton, L. Sweeney, and B. Main. Preserving privacy by de-identifying face images. IEEE transactions on Knowledge and Data Engineering, 17(2):232-243, February 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.2
, pp. 232-243
-
-
Newton, E.N.1
Sweeney, L.2
Main, B.3
-
30
-
-
33847757538
-
Video inpainting under constrained camera motion
-
February
-
K. A. Patwardhan, G. Sapiro, and M. Bertalmio. Video inpainting under constrained camera motion. IEEE Transactions on Image Processing, 16(2):545-553, February 2007.
-
(2007)
IEEE Transactions on Image Processing
, vol.16
, Issue.2
, pp. 545-553
-
-
Patwardhan, K.A.1
Sapiro, G.2
Bertalmio, M.3
-
31
-
-
37149000901
-
-
Technical Report NISTRI 7408, National Institute of Standards and Technology, Marge
-
P. J. Phillips, W. T. Scruggs, A. J. O Toole, P. J. Flynn, K. W. Bowyer, C. L. Schott, and M. Sharpe. FRVT 2006 and ICE 2006 large-scale results. Technical Report NISTRI 7408, National Institute of Standards and Technology, Marge, 2007.
-
(2007)
FRVT 2006 and ICE 2006 Large-scale Results
-
-
Phillips, P.J.1
Scruggs, W.T.2
Toole, A.J.O.3
Flynn, P.J.4
Bowyer, K.W.5
Schott, C.L.6
Sharpe, M.7
-
36
-
-
51349121612
-
Respectful cameras: Detecting visual markers in real-time to address privacy concerns
-
J. Schiff, M. Meingast, D. Mulligan, S. Sastry, and K. Goldberg. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In International Conference on Intelligent Robots and Systems (IROS), 2007.
-
(2007)
International Conference on Intelligent Robots and Systems (IROS)
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.3
Sastry, S.4
Goldberg, K.5
-
37
-
-
20844455524
-
Blinkering surveillance: Enabling video privacy through computer vision
-
A. Senior, S. Pankanti, A. Hampapur, Y.-L. Tian, L. Brown, and A. Ekin. Blinkering surveillance: Enabling video privacy through computer vision. Security and Privacy, 3:50-57, 2005.
-
(2005)
Security and Privacy
, vol.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Tian, Y.-L.4
Brown, L.5
Ekin, A.6
-
39
-
-
33845596142
-
Video completion by motion field transfer
-
June
-
T. Shiratori, Y. Matsushita, S. B. Kang, and X. Tang. Video completion by motion field transfer. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), volume 1, pages 411-418, June 2006.
-
(2006)
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
, vol.1
, pp. 411-418
-
-
Shiratori, T.1
Matsushita, Y.2
Kang, S.B.3
Tang, X.4
-
44
-
-
72349095600
-
-
Matsushita Electric Industrial Co. Ltd., European Patent, ep 1 081 955 a2 edition, April
-
J. Wada, K. Kaiyama, K. Ikoma, and H. Kogane. Monitor Camera System and Method of Displaying Picture from Monitor Camera Thereof. Matsushita Electric Industrial Co. Ltd., European Patent, ep 1 081 955 a2 edition, April 2001.
-
(2001)
Monitor Camera System and Method of Displaying Picture from Monitor Camera Thereof
-
-
Wada, J.1
Kaiyama, K.2
Ikoma, K.3
Kogane, H.4
-
45
-
-
33847381028
-
Space-time completion of video
-
Y. Wexler, E. Shechtman, and M. Irani. Space-time completion of video. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(3):463-476, 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.3
, pp. 463-476
-
-
Wexler, Y.1
Shechtman, E.2
Irani, M.3
-
46
-
-
13444271747
-
Privacy protecting data collection in media spaces
-
October
-
J. Wickramasuri, M. Datt, S. Mehrotra, and N. Venkatasubramanian. Privacy protecting data collection in media spaces. ACM Multimedia, pages 48-55, October 2004.
-
(2004)
ACM Multimedia
, pp. 48-55
-
-
Wickramasuri, J.1
Datt, M.2
Mehrotra, S.3
Venkatasubramanian, N.4
-
48
-
-
33749251117
-
Hiding privacy information in video surveillance system
-
Genova, Italy, September
-
W. Zhang, S.-C. Cheung, and M. Chen. Hiding privacy information in video surveillance system. In Proceedings of the 12th IEEE International Conference on Image Processing, Genova, Italy, September 2005.
-
(2005)
Proceedings of the 12th IEEE International Conference on Image Processing
-
-
Zhang, W.1
Cheung, S.-C.2
Chen, M.3
-
49
-
-
35348892631
-
Motion layer based object removal in videos
-
Y. Zhang, J. Xiao, and M. Shah. Motion layer based object removal in videos. In Proceedings of the Seventh IEEE Workshops on Application of Computer Vision, volume 1, pages 516-521, 2005.
-
(2005)
Proceedings of the Seventh IEEE Workshops on Application of Computer Vision
, vol.1
, pp. 516-521
-
-
Zhang, Y.1
Xiao, J.2
Shah, M.3
|