메뉴 건너뛰기




Volumn , Issue , 2010, Pages 72-77

A real-time privacy-sensitive data hiding approach based on chaos cryptography

Author keywords

Chaos cryptography; Privacy and security; Video surveillance system

Indexed keywords

AUTHORIZED USERS; BASED-ON CHAOS; CAMERA FOOTAGES; CHAOS CRYPTOGRAPHY; COMPUTATIONALLY EFFICIENT; DATA HIDING; MULTIPLE LEVELS; MULTIPLE SENSORS; PHYSICAL PARAMETERS; PRIVACY AND SECURITY; REAL TIME VIDEOS; REGIONS OF INTEREST; SENSITIVE DATAS; SENSITIVE INFORMATIONS; SURVEILLANCE SYSTEMS; SURVEILLANCE TASK; VIDEO SURVEILLANCE SYSTEMS;

EID: 78349274893     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICME.2010.5583558     Document Type: Conference Paper
Times cited : (18)

References (18)
  • 2
    • 14944378854 scopus 로고    scopus 로고
    • The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks
    • New York, NY
    • D. A. Fidaleo, H.-A. Nguyen, M. Trivedi, "The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks," Proc. of the ACM 2nd Int. Workshop on Video Surveillance & Sensor Networks, New York, NY, 2004.
    • (2004) Proc. of the ACM 2nd Int. Workshop on Video Surveillance & Sensor Networks
    • Fidaleo, D.A.1    Nguyen, H.-A.2    Trivedi, M.3
  • 3
    • 70350395089 scopus 로고    scopus 로고
    • Dynamic privacy assessment in a smart house environment using multimodal sensing
    • Nov.
    • S. Moncrieff, S. Venkatesh, and G. West, "Dynamic privacy assessment in a smart house environment using multimodal sensing," ACM Trans. Multimedia Comput. Commun. Appl. vol. 5, no. 2, Nov. 2008, pp. 1-29.
    • (2008) ACM Trans. Multimedia Comput. Commun. Appl. , vol.5 , Issue.2 , pp. 1-29
    • Moncrieff, S.1    Venkatesh, S.2    West, G.3
  • 11
    • 28944435491 scopus 로고    scopus 로고
    • Data-hiding codes
    • Dec.
    • P. Moulin and R. Koetter, "Data-Hiding Codes," Proceedings Of The IEEE, vol. 93, no. 12, Dec. 2005, pp. 2083-2126.
    • (2005) Proceedings of the IEEE , vol.93 , Issue.12 , pp. 2083-2126
    • Moulin, P.1    Koetter, R.2
  • 12
    • 0010996470 scopus 로고    scopus 로고
    • Practical procedures to improve face recognition based on eigenfaces and principal component analysis
    • P. Quintiliano, R. Guadagnin and A. Santa-Rosa, "Practical Procedures to Improve Face Recognition Based on Eigenfaces and Principal Component Analysis," Pattern Recognition and Image Analysis, vol. 11, no. 2, 2001, pp. 372-375.
    • (2001) Pattern Recognition and Image Analysis , vol.11 , Issue.2 , pp. 372-375
    • Quintiliano, P.1    Guadagnin, R.2    Santa-Rosa, A.3
  • 13
    • 0000632463 scopus 로고    scopus 로고
    • Practical image encryption scheme by real-valued data
    • H. G. Yang and E.S Kim, "Practical Image Encryption Scheme by Real-Valued Data," Optical Engineering, vol. 35, no. 9, pp. 2506-2512, 1996.
    • (1996) Optical Engineering , vol.35 , Issue.9 , pp. 2506-2512
    • Yang, H.G.1    Kim, E.S.2
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R.Rivest, A. Shamir, and L. Adlemen, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adlemen, L.3
  • 16
    • 33750542126 scopus 로고    scopus 로고
    • Some basic cryptographic requirements for chaos-based cryptosystems
    • Gonzalo Alvarez and Shujun Li, "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006.
    • (2006) International Journal of Bifurcation and Chaos , vol.16 , Issue.8 , pp. 2129-2151
    • Alvarez, G.1    Li, S.2
  • 17
    • 84974731225 scopus 로고    scopus 로고
    • Pseudo random bit generator based on chaotic systems and its applications in stream cipher cryptography
    • progress in cryptology-INDO crypt 2001, springer-verlag, (Berlin)
    • L. Shujun, M.x Uanqin, and C. R, Uanlong, Cample, "Pseudo random bit generator based on chaotic systems and its applications in stream cipher cryptography," in progress in cryptology-INDO crypt 2001, lecture notes in computer science 2247, PP. 316-329, springer-verlag, (Berlin), 2001.
    • (2001) Lecture Notes in Computer Science , vol.2247 , pp. 316-329
    • Shujun, L.1    Uanqin, M.X.2    Uanlong, C.R.3    Cample4
  • 18
    • 78349236398 scopus 로고    scopus 로고
    • available at
    • Ignacio Gallo, "Chaos in the Logistic Function," available at http://web.mac.com/stefanoluzzatto/ResearchActivites/ProjectSupervisionfiles/ 2002Gallo.pdf
    • Chaos in the Logistic Function
    • Gallo, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.