메뉴 건너뛰기




Volumn 4258 LNCS, Issue , 2006, Pages 172-189

Personal rights management - Taming camera-phones for individual privacy enforcement

Author keywords

Data identification techniques; Mobile camera phones; Model for privacy infrastructures; Privacy protection

Indexed keywords

CAMERA PHONE; DATA IDENTIFICATION; DIGITAL RIGHTS MANAGEMENT; DISTRIBUTED CONTENT; DISTRIBUTION CHANNEL; INDIVIDUAL PRIVACY; MOBILE CAMERA PHONES; NEW TECHNOLOGIES; ONLINE COMMUNITIES; ORDINARY PEOPLE; PERCEPTUAL HASHING; PRIVACY PROTECTION; PRIVATE SPACES; RIGHTS MANAGEMENT; WEB PAGE; WEB-BASED PHOTO ALBUMS;

EID: 77049108941     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11957454_10     Document Type: Conference Paper
Times cited : (1)

References (37)
  • 3
    • 77049085891 scopus 로고    scopus 로고
    • Directive 95/46/ec of the european parliament and the council of 24 october 1995. Official Journal L 281, 23/11/1995, page 0031 0050, 1995.
    • Directive 95/46/ec of the european parliament and the council of 24 october 1995. Official Journal L 281, 23/11/1995, page 0031 0050, 1995.
  • 5
    • 77049094134 scopus 로고    scopus 로고
    • L. Agi and L. Cong. An empirical study of secure mpeg video transmissions. In In Proc. of the Internet society symposium on network and distributed system security, San Diego, CA, February 1996.
    • L. Agi and L. Cong. An empirical study of secure mpeg video transmissions. In In Proc. of the Internet society symposium on network and distributed system security, San Diego, CA, February 1996.
  • 6
    • 77049089902 scopus 로고    scopus 로고
    • Open Mobile Alliance. OMA digital rights management version 1.0. OMA
    • Open Mobile Alliance. OMA digital rights management version 1.0. OMA. http://www.openmobilealliance.org/documents.html.
  • 7
    • 77049104836 scopus 로고    scopus 로고
    • NetworkWorld.com, Feb
    • John Blau. Cracks appear in Bluetooth security. NetworkWorld.com, Feb. 2004. http://www.networkworld.com/news/2004/0211cracksappear.html.
    • (2004) Cracks appear in Bluetooth security
    • Blau, J.1
  • 8
    • 77049120107 scopus 로고    scopus 로고
    • Robust signal representation for image identification and hashing
    • P. Cardin. Robust signal representation for image identification and hashing. Student Literature survey, 2005.
    • (2005) Student Literature survey
    • Cardin, P.1
  • 10
    • 35248889054 scopus 로고    scopus 로고
    • Privacy and security ecs privacy directive: Protecting personal data and ensuring its free movement
    • L. Deitz. Privacy and security ecs privacy directive: protecting personal data and ensuring its free movement. Computers and Security Journal, pages 25-46.
    • Computers and Security Journal , pp. 25-46
    • Deitz, L.1
  • 14
    • 0032634857 scopus 로고    scopus 로고
    • F. Hartung and M. Kutter. Multimedia watermarking techniques. In special issue on protecting of multimedia contents, 87, pages 1079-1107. Proceedings of the IEEE, July 1999.
    • F. Hartung and M. Kutter. Multimedia watermarking techniques. In special issue on protecting of multimedia contents, volume 87, pages 1079-1107. Proceedings of the IEEE, July 1999.
  • 15
    • 0034316289 scopus 로고    scopus 로고
    • Digital rights management and watermarking for multimedia content for m-commerce
    • Nov
    • F. Hartung and F. Ramme. Digital rights management and watermarking for multimedia content for m-commerce. In IEEE communications magazine, volume 38, pages 78-84, Nov. 2000.
    • (2000) IEEE communications magazine , vol.38 , pp. 78-84
    • Hartung, F.1    Ramme, F.2
  • 16
    • 0344271942 scopus 로고    scopus 로고
    • Dither-based secure image hashing using distributed coding
    • M. Johnson and K. Ramchandran. Dither-based secure image hashing using distributed coding. In ICIP (2), pages 751-754, 2003.
    • (2003) ICIP , vol.2 , pp. 751-754
    • Johnson, M.1    Ramchandran, K.2
  • 19
  • 20
    • 33845230194 scopus 로고    scopus 로고
    • Survey on the technological aspects of digital rights management
    • W. Ku and C. Chi. Survey on the technological aspects of digital rights management. In ISC, pages 391-403, 2004.
    • (2004) ISC , pp. 391-403
    • Ku, W.1    Chi, C.2
  • 21
    • 8844263220 scopus 로고    scopus 로고
    • Benchmarking of image watermarking algorithms for digital rights management
    • Benoit M. Macq, Jana Dittmann, and Edward J. Delp. Benchmarking of image watermarking algorithms for digital rights management. Proceedings of the IEEE, 92(6):971-984, 2004.
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6 , pp. 971-984
    • Macq, B.M.1    Dittmann, J.2    Delp, E.J.3
  • 22
    • 77049103998 scopus 로고    scopus 로고
    • DigiMarc corporation
    • MarcSpider. Digimarc image tracking service. DigiMarc corporation, 2001. http://www.digimarc.com/products/imagebridge/MarcSpider/default.asp.
    • (2001) Digimarc image tracking service
    • MarcSpider1
  • 23
    • 77049087244 scopus 로고    scopus 로고
    • Elizabeth P. McCarthy, Felix Balado, Guenole C. M. Silverstre, and Neil J. Hurley. A framework for soft hashing and its application to robust image hashing. In IS&T/SPIE, editor, In Proc. of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, 5681, pages 5681-06, San Jose, CA, USA, January 2005.
    • Elizabeth P. McCarthy, Felix Balado, Guenole C. M. Silverstre, and Neil J. Hurley. A framework for soft hashing and its application to robust image hashing. In IS&T/SPIE, editor, In Proc. of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 5681-06, San Jose, CA, USA, January 2005.
  • 25
    • 33750549577 scopus 로고    scopus 로고
    • A performance evaluation of local descriptors
    • Krystian Mikolajczyk and Cordelia Schmid. A performance evaluation of local descriptors. Submitted to PAMI, 2004.
    • (2004) Submitted to PAMI
    • Mikolajczyk, K.1    Schmid, C.2
  • 26
    • 20444464472 scopus 로고    scopus 로고
    • Robust perceptual image hashing using feature points
    • Singapore, Oct, Singapore
    • V. Monga and B. L. Evans. Robust perceptual image hashing using feature points. In Proc. IEEE Int. Conf. on Image Processing, Singapore, Oct. 2004. Singapore.
    • (2004) Proc. IEEE Int. Conf. on Image Processing
    • Monga, V.1    Evans, B.L.2
  • 27
    • 33747375321 scopus 로고    scopus 로고
    • Image authentication under geometric attacks via structure matching
    • London, UK, July, Amsterdam, The Netherlands
    • V. Monga, D. Vats, and B. L. Evans. Image authentication under geometric attacks via structure matching. In Proc. IEEE Int. Conf. on Multimedia & Expo, London, UK, July 2005. Amsterdam, The Netherlands.
    • (2005) Proc. IEEE Int. Conf. on Multimedia & Expo
    • Monga, V.1    Vats, D.2    Evans, B.L.3
  • 29
    • 0034780126 scopus 로고    scopus 로고
    • F.A. Petitcolas, M. Steinebach, F. Raynal, J. Dittmann, C. Fontaine, and N. Fates. Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In SPIE International Symposium on Electronic Imaging 2001, 4314 of Proceedings of the SPIE, pages 575-584. SPIE, 2001. Security and Watermarking of Multimedia Contents III.
    • F.A. Petitcolas, M. Steinebach, F. Raynal, J. Dittmann, C. Fontaine, and N. Fates. Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In SPIE International Symposium on Electronic Imaging 2001, volume 4314 of Proceedings of the SPIE, pages 575-584. SPIE, 2001. Security and Watermarking of Multimedia Contents III.
  • 37
    • 85032751604 scopus 로고    scopus 로고
    • Collision resistant fingerprinting for multimedia
    • IEEE, March
    • M. Wu, W. Trappe, Z. Wang, and K. J. R. Liu. Collision resistant fingerprinting for multimedia. In Signal Processing magazine, volume 21, pages 15-27. IEEE, March 2004.
    • (2004) Signal Processing magazine , vol.21 , pp. 15-27
    • Wu, M.1    Trappe, W.2    Wang, Z.3    Liu, K.J.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.