-
1
-
-
21844455241
-
Blinkering surveillance: Enabling video privacy through computer vision
-
A.W. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, and A. Ekin, "Blinkering Surveillance: Enabling Video Privacy through Computer Vision," IBM Technical Report RC22886, 2003.
-
(2003)
IBM Technical Report RC22886
-
-
Senior, A.W.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
-
2
-
-
14944378854
-
The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks
-
New York, NY
-
D. A. Fidaleo, H.-A. Nguyen, M. Trivedi, "The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks," Proc. of the ACM 2nd Int. Workshop on Video Surveillance & Sensor Networks, New York, NY, 2004.
-
(2004)
Proc. of the ACM 2nd Int. Workshop on Video Surveillance & Sensor Networks
-
-
Fidaleo, D.A.1
Nguyen, H.-A.2
Trivedi, M.3
-
3
-
-
70350395089
-
Dynamic privacy assessment in a smart house environment using multimodal sensing
-
Nov.
-
S. Moncrieff, S. Venkatesh, and G. West, "Dynamic privacy assessment in a smart house environment using multimodal sensing," ACM Trans. Multimedia Comput. Commun. Appl. vol. 5, no. 2, Nov. 2008, pp. 1-29.
-
(2008)
ACM Trans. Multimedia Comput. Commun. Appl.
, vol.5
, Issue.2
, pp. 1-29
-
-
Moncrieff, S.1
Venkatesh, S.2
West, G.3
-
4
-
-
14644411969
-
Preserving privacy by de-identifying facial images
-
E. Newton, L. Sweeney, and B. Malin, "Preserving Privacy by De-identifying Facial Images," Carnegie Mellon University, Technical Report CMU-CS-03-119, 2003.
-
(2003)
Carnegie Mellon University, Technical Report CMU-CS-03-119
-
-
Newton, E.1
Sweeney, L.2
Malin, B.3
-
6
-
-
33747339893
-
Robust human face hiding ensuring privacy
-
Montreux, Switzerland, April
-
I. Martinez Ponte, X. Desurmont, J. Meessen, and J.-F. Delaigle, "Robust Human Face Hiding Ensuring Privacy," in Proc. of International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, April 2005.
-
(2005)
Proc. of International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS)
-
-
Ponte, I.M.1
Desurmont, X.2
Meessen, J.3
Delaigle, J.-F.4
-
7
-
-
0031365052
-
Data hiding for video-in-video
-
Oct.
-
Mitchell D. Swanson, Bin Zhu, Ahmed H. Tewfik, "Data Hiding for Video-in-Video," Proceedings of International Conference on Image Processing, vol. 2, Oct. 1997, pp. 676-679.
-
(1997)
Proceedings of International Conference on Image Processing
, vol.2
, pp. 676-679
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
-
8
-
-
33749251117
-
Hiding privacy information in video surveillance system
-
Genova, Italy, September
-
W. Zhang, S.-C. S. Cheung, and M. Chen, "Hiding privacy information in video surveillance system," in Proceedings of International Conference on Image Processing (ICIP 05), vol. 3, pp. 868871, Genova, Italy, September 2005.
-
(2005)
Proceedings of International Conference on Image Processing (ICIP 05)
, vol.3
, pp. 868871
-
-
Zhang, W.1
Cheung, S.-C.S.2
Chen, M.3
-
9
-
-
50549104583
-
Scrambling for privacy protection in video surveillance systems
-
August
-
Frdric Dufaux,Touradj Ebrahimi, "Scrambling for Privacy Protection in Video Surveillance Systems," IEEE Transactions on Circuits And Systems For Video Technology, vol. 18, no. 8, August 2008.
-
(2008)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.18
, Issue.8
-
-
Dufaux, F.1
Ebrahimi, T.2
-
11
-
-
28944435491
-
Data-hiding codes
-
Dec.
-
P. Moulin and R. Koetter, "Data-Hiding Codes," Proceedings Of The IEEE, vol. 93, no. 12, Dec. 2005, pp. 2083-2126.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.12
, pp. 2083-2126
-
-
Moulin, P.1
Koetter, R.2
-
12
-
-
0010996470
-
Practical procedures to improve face recognition based on eigenfaces and principal component analysis
-
P. Quintiliano, R. Guadagnin and A. Santa-Rosa, "Practical Procedures to Improve Face Recognition Based on Eigenfaces and Principal Component Analysis," Pattern Recognition and Image Analysis, vol. 11, no. 2, 2001, pp. 372-375.
-
(2001)
Pattern Recognition and Image Analysis
, vol.11
, Issue.2
, pp. 372-375
-
-
Quintiliano, P.1
Guadagnin, R.2
Santa-Rosa, A.3
-
13
-
-
0000632463
-
Practical image encryption scheme by real-valued data
-
H. G. Yang and E.S Kim, "Practical Image Encryption Scheme by Real-Valued Data," Optical Engineering, vol. 35, no. 9, pp. 2506-2512, 1996.
-
(1996)
Optical Engineering
, vol.35
, Issue.9
, pp. 2506-2512
-
-
Yang, H.G.1
Kim, E.S.2
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R.Rivest, A. Shamir, and L. Adlemen, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adlemen, L.3
-
16
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
Gonzalo Alvarez and Shujun Li, "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006.
-
(2006)
International Journal of Bifurcation and Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
17
-
-
84974731225
-
Pseudo random bit generator based on chaotic systems and its applications in stream cipher cryptography
-
progress in cryptology-INDO crypt 2001, springer-verlag, (Berlin)
-
L. Shujun, M.x Uanqin, and C. R, Uanlong, Cample, "Pseudo random bit generator based on chaotic systems and its applications in stream cipher cryptography," in progress in cryptology-INDO crypt 2001, lecture notes in computer science 2247, PP. 316-329, springer-verlag, (Berlin), 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2247
, pp. 316-329
-
-
Shujun, L.1
Uanqin, M.X.2
Uanlong, C.R.3
Cample4
-
18
-
-
78349236398
-
-
available at
-
Ignacio Gallo, "Chaos in the Logistic Function," available at http://web.mac.com/stefanoluzzatto/ResearchActivites/ProjectSupervisionfiles/ 2002Gallo.pdf
-
Chaos in the Logistic Function
-
-
Gallo, I.1
|