-
1
-
-
71549130796
-
Security and privacy protection for automated video surveillance
-
Baaziz, N., Lolo, N., Padilla, O., Petngang, F.: Security and privacy protection for automated video surveillance. In: Proceedings of the International Symposium on Signal Processing and Information Technology, pp. 17-22 (2007)
-
(2007)
Proceedings of the International Symposium on Signal Processing and Information Technology
, pp. 17-22
-
-
Baaziz, N.1
Lolo, N.2
Padilla, O.3
Petngang, F.4
-
2
-
-
56649088077
-
A demonstrative ad hoc attestation system
-
Bangerter, E., Djackov, M., Sadeghi, A.R.: A demonstrative ad hoc attestation system. In: Proceedings of the International Conference on Information Security, pp. 17-30 (2008)
-
(2008)
Proceedings of the International Conference on Information Security
, pp. 17-30
-
-
Bangerter, E.1
Djackov, M.2
Sadeghi, A.R.3
-
7
-
-
85032751373
-
Privacy in video surveillance
-
Cavallaro, A.: Privacy in video surveillance. IEEE Signal Process Mag 24(2), 168-169 (2007)
-
(2007)
IEEE Signal Process Mag
, vol.24
, Issue.2
, pp. 168-169
-
-
Cavallaro, A.1
-
9
-
-
69949184910
-
Managing privacy data in pervasive camera networks
-
Cheung, S.C.S., Paruchuri, J.K., Nguyen, T.P.: Managing privacy data in pervasive camera networks. In: Proceedings of the International Conference on Image Processing, p. 4 (2008)
-
(2008)
Proceedings of the International Conference on Image Processing
, pp. 4
-
-
Cheung, S.C.S.1
Paruchuri, J.K.2
Nguyen, T.P.3
-
10
-
-
78649807632
-
Efficient object-based video inpainting
-
Cheung, S.C.S., Zhao, J., Venkatesh, M.V.: Efficient object-based video inpainting. In: Proceedings of the International Conference on Image Processing, pp. 705-708 (2006)
-
(2006)
Proceedings of the International Conference on Image Processing
, pp. 705-708
-
-
Cheung, S.C.S.1
Zhao, J.2
Venkatesh, M.V.3
-
11
-
-
38549153976
-
PriSurv: Privacy protected video surveillance system using adaptive visual abstraction
-
Chinomi, K., Nitta, N., Ito, Y., Babaguchi, N.: PriSurv: Privacy protected video surveillance system using adaptive visual abstraction. In: Proceedings of the International Multimedia Modeling Conference, p. 144 (2008)
-
(2008)
Proceedings of the International Multimedia Modeling Conference
, pp. 144
-
-
Chinomi, K.1
Nitta, N.2
Ito, Y.3
Babaguchi, N.4
-
14
-
-
14944378854
-
The Networked Sensor Tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks
-
VSSN'04 - Proceedings of the ACM Second International Workshop on Video Surveillance and Sensor Networks
-
Fidaleo, D.A., Nguyen, H.A., Trivedi, M.: The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In: Proceedings of the International Workshop on Video Surveillance and Sensor Networks, pp. 46-53 (2004) (Pubitemid 40372011)
-
(2004)
VSSN'04 - Proceedings of the ACM Second International Workshop on Video Sureveillance and Sensor Networks
, pp. 46-53
-
-
Fidaleo, D.A.1
Nguyen, H.-A.2
Trivedi, M.3
-
16
-
-
55649119763
-
Smart camera based monitoring system and its application to assisted living
-
Fleck, S., Strasser, W.: Smart camera based monitoring system and its application to assisted living. Proc IEEE 96(10), 1698-1714 (2008)
-
(2008)
Proc IEEE
, vol.96
, Issue.10
, pp. 1698-1714
-
-
Fleck, S.1
Strasser, W.2
-
17
-
-
57349173947
-
Trustworthy and personalized computing on public kiosks
-
Garriss, S., Cáceres, R., Berger, S., Sailer, R., van Doorn, L., Zhang, X.: Trustworthy and personalized computing on public kiosks. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services, pp. 199-210 (2008)
-
(2008)
Proceedings of the International Conference on Mobile Systems, Applications, and Services
, pp. 199-210
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
19
-
-
77954523418
-
The privacy badge: A privacy-awareness user interface for small devices
-
Gisch, M., Luca, A.D., Blanchebarbe, M.: The privacy badge: a privacy-awareness user interface for small devices. In: Proceedings of the International Conference on Mobile Technology, Applications, and Systems and the International Symposium on Computer Human Interaction in Mobile Technology, pp. 583-586 (2007)
-
(2007)
Proceedings of the International Conference on Mobile Technology, Applications, and Systems and the International Symposium on Computer Human Interaction in Mobile Technology
, pp. 583-586
-
-
Gisch, M.1
Luca, A.D.2
Blanchebarbe, M.3
-
20
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: human-verifiable authentication based on audio. In: Proceedings of the International Conference on Distributed Computing Systems, p. 10 (2006)
-
(2006)
Proceedings of the International Conference on Distributed Computing Systems
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
23
-
-
78349249352
-
Anonymous subject identification in privacy-aware video surveillance
-
Luo, Y., Ye, S., Samson Cheung, S.c.: Anonymous subject identification in privacy-aware video surveillance. In: Proceedings of the International Conference on Multimedia and Expo, pp. 83-88 (2010)
-
(2010)
Proceedings of the International Conference on Multimedia and Expo
, pp. 83-88
-
-
Luo, Y.1
Ye, S.2
Samson Cheung, S.C.3
-
24
-
-
84861691664
-
-
Mapcams.org: Mapcams.org Website Accessed: September
-
Mapcams.org: Mapcams.org Website. http://www.mapcams.org/. Accessed: September 2010
-
(2010)
-
-
-
26
-
-
61849133288
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. Int. J. Secur. Netw. 4(1/2), 43-56 (2009)
-
(2009)
Int. J. Secur. Netw.
, vol.4
, Issue.1-2
, pp. 43-56
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
27
-
-
70349693912
-
Bokode: Imperceptible visual tags for camera based interaction from a distance
-
Mohan, A., Woo, G., Hiura, S., Smithwick, Q., Raskar, R.: Bokode: imperceptible visual tags for camera based interaction from a distance. In: Proceedings of the International Conference on Computer Graphics and Interactive Techniques, pp. 1-8 (2009)
-
(2009)
Proceedings of the International Conference on Computer Graphics and Interactive Techniques
, pp. 1-8
-
-
Mohan, A.1
Woo, G.2
Hiura, S.3
Smithwick, Q.4
Raskar, R.5
-
28
-
-
70349449310
-
Dynamic privacy in public surveillance
-
Moncrieff, S., Venkatesh, S., West, G.: Dynamic privacy in public surveillance. IEEE Comput 42(9), 22-28 (2009)
-
(2009)
IEEE Comput
, vol.42
, Issue.9
, pp. 22-28
-
-
Moncrieff, S.1
Venkatesh, S.2
West, G.3
-
29
-
-
84961682927
-
-
OpenStreetMap.org Video Surveillance Camera Overlay Accessed: April 2011
-
OpenStreetMap.org: OpenStreetMap.org Video Surveillance Camera Overlay. http://osm.vdska.de. Accessed: April 2011
-
OpenStreetMap.org
-
-
-
30
-
-
84861678221
-
-
OWNI: Accessed: April 2011
-
OWNI: CCTV Camera Positions in Paris. http://app.owni.fr/camera-paris/ (2011). Accessed: April 2011
-
(2011)
CCTV Camera Positions in Paris
-
-
-
32
-
-
70350639602
-
A PrivacyCA for anonymity and trust
-
Pirker, M., Tögl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Proceedings of the International Conference on Trusted Computing, pp. 101-119 (2009)
-
(2009)
Proceedings of the International Conference on Trusted Computing
, pp. 101-119
-
-
Pirker, M.1
Tögl, R.2
Hein, D.3
Danner, P.4
-
33
-
-
84861699087
-
-
Prefecture de Police: Accessed: April 2011
-
Prefecture de Police: Plan de Vidéoprotection pour Paris. http://www.prefecturedepolice.interieur.gouv.fr/Prevention/Videoprotection/ Plan-de-videoprotection-pour-Paris (2010). Accessed: April 2011
-
(2010)
Plan de Vidéoprotection pour Paris
-
-
-
34
-
-
78349274893
-
A real-time privacy-sensitive data hiding approach based on chaos cryptography
-
Rahman, S.M.M., Hossain, M.A., Mouftah, H., Saddik, A.E., Okamoto, E.: A real-time privacy-sensitive data hiding approach based on chaos cryptography. In: Proceedings of the International Conference on Multimedia and Expo, pp. 72-77 (2010)
-
(2010)
Proceedings of the International Conference on Multimedia and Expo
, pp. 72-77
-
-
Rahman, S.M.M.1
Hossain, M.A.2
Mouftah, H.3
Saddik, A.E.4
Okamoto, E.5
-
35
-
-
78349240352
-
Privacy modeling for video data publication
-
Saini, M., Atrey, P.K., Mehrotra, S., Emmanuel, S., Kankanhalli, M.: Privacy modeling for video data publication. In: Proceedings of the International Conference on Multimedia and Expo, pp. 60-65 (2010)
-
(2010)
Proceedings of the International Conference on Multimedia and Expo
, pp. 60-65
-
-
Saini, M.1
Atrey, P.K.2
Mehrotra, S.3
Emmanuel, S.4
Kankanhalli, M.5
-
36
-
-
51349121612
-
Respectful cameras: Selecting visual markers in real-time to address privacy concerns
-
Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.Y.: Respectful cameras: selecting visual markers in real-time to address privacy concerns. In: Proceedings of the International Conference on Intelligent Robots and Systems, pp. 971-978 (2007)
-
(2007)
Proceedings of the International Conference on Intelligent Robots and Systems
, pp. 971-978
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.K.3
Sastry, S.4
Goldberg, K.Y.5
-
37
-
-
72149100713
-
A pervasive smart camera network architecture applied for multi-camera object classification
-
Schriebl, W., Winkler, T., Starzacher, A., Rinner, B.: A pervasive smart camera network architecture applied for multi-camera object classification. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 8 (2009)
-
(2009)
Proceedings of the International Conference on Distributed Smart Cameras
, pp. 8
-
-
Schriebl, W.1
Winkler, T.2
Starzacher, A.3
Rinner, B.4
-
38
-
-
77954719036
-
Towards a trusted mobile desktop
-
Selhorst, M., Stüble, C., Feldmann, F., Gnaida, U.: Towards a trusted mobile desktop. In: Proceedings of the International Conference on Trusted Computing, pp. 78-94 (2010)
-
(2010)
Proceedings of the International Conference on Trusted Computing
, pp. 78-94
-
-
Selhorst, M.1
Stüble, C.2
Feldmann, F.3
Gnaida, U.4
-
39
-
-
20844455524
-
Enabling video privacy through computer vision
-
DOI 10.1109/MSP.2005.65
-
Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. Mag. 3(3), 50-57 (2005) (Pubitemid 40860473)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.F.8
Lu, M.9
-
40
-
-
78649596958
-
Privacy in video surveilled areas
-
Spindler, T., Wartmann, C., Hovestadt, L., Roth, D., van Gool, L., Steffen, A.: Privacy in Video Surveilled Areas. In: Proceedings of the International Conference on Privacy, Security and Trust, p. 10 (2006)
-
(2006)
Proceedings of the International Conference on Privacy, Security and Trust
, pp. 10
-
-
Spindler, T.1
Wartmann, C.2
Hovestadt, L.3
Roth, D.4
Van Gool, L.5
Steffen, A.6
-
44
-
-
85027907030
-
An approach to introducing locality in remote attestation using near field communications
-
Tögl, R., Hutter, M.: An approach to introducing locality in remote attestation using near field communications. J Supercom-put 55, 1-21 (2010)
-
(2010)
J Supercom-put
, vol.55
, pp. 1-21
-
-
Tögl, R.1
Hutter, M.2
-
45
-
-
74249097543
-
Videosurveillance and privacy: Covering the two sides of the mirror with DRM
-
Troncoso-Pastoriza, J.R., Pérez-Freire, L., Pérez- gonzález, F.: Videosurveillance and privacy: covering the two sides of the mirror with DRM. In: Proceedings of the Workshop on Digital Rights Management, pp. 83-94 (2009)
-
(2009)
Proceedings of the Workshop on Digital Rights Management
, pp. 83-94
-
-
Troncoso-Pastoriza, J.R.1
Pérez-Freire, L.2
Pérez- González, F.3
-
46
-
-
84861691660
-
-
Trusted Computing Group: TCG Website Accessed: November
-
Trusted Computing Group: TCG Website. https://www.trusted computinggroup.org. Accessed: November 2010
-
(2010)
-
-
-
48
-
-
77957806075
-
-
Trusted Computing Group, Level 2, Revision 103
-
Trusted Computing Group: TPM Main Specification Version 1.2, Level 2, Revision 103 (2007)
-
(2007)
TPM Main Specification Version 1.2
-
-
-
49
-
-
13444271747
-
Privacy protecting data collection in media spaces
-
ACM Multimedia 2004 - proceedings of the 12th ACM International Conference on Multimedia
-
Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the International Conference on Multimedia, pp. 48-55 (2004) (Pubitemid 40211717)
-
(2004)
ACM Multimedia 2004 - proceedings of the 12th ACM International Conference on Multimedia
, pp. 48-55
-
-
Wickramasuriya, J.1
Datt, M.2
Mehrotra, S.3
Venkatasubramanian, N.4
-
52
-
-
77958608473
-
User-based attestation for trustworthy visual sensor networks
-
Winkler, T., Rinner, B.: User-based attestation for trustworthy visual sensor networks. In: Proceedings of the Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, p. 8 (2010)
-
(2010)
Proceedings of the Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 8
-
-
Winkler, T.1
Rinner, B.2
-
53
-
-
78249272970
-
Securing embedded smart cameras with trusted computing
-
Special Issue on Security and Resilience for Smart Devices and Applications
-
Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. 2011, 20 (2011) (Special Issue on Security and Resilience for Smart Devices and Applications)
-
(2011)
EURASIP J. Wirel. Commun. Netw. 2011
, vol.20
-
-
Winkler, T.1
Rinner, B.2
-
54
-
-
78649585059
-
A new concept of security camera monitoring with privacy protection by masking moving objects
-
Yabuta, K., Kitazawa, H., Tanaka, T.: A new concept of security camera monitoring with privacy protection by masking moving objects. In: Proceedings of the Pacific-Rim Conference on Multimedia, p. 12 (2005)
-
(2005)
Proceedings of the Pacific-Rim Conference on Multimedia
, pp. 12
-
-
Yabuta, K.1
Kitazawa, H.2
Tanaka, T.3
-
55
-
-
74849096440
-
Anonymous biometric access control
-
Special Issue on Enhancing Privacy Protection in Multimedia Systems
-
Ye, S., Luo, Y., Zhao, J., Cheung, S.C.S.: Anonymous biometric access control. EURASIP J. Inf. Secur. 2009, 18 (2009). (Special Issue on Enhancing Privacy Protection in Multimedia Systems)
-
(2009)
EURASIP J. Inf. Secur. 2009
, vol.18
-
-
Ye, S.1
Luo, Y.2
Zhao, J.3
Cheung, S.C.S.4
-
56
-
-
84861678220
-
-
ZXing Community: Zebra Crossing (ZXing) Multi-format 1D/2D Barcode Image Processing Library. web Accessed: November 2010
-
ZXing Community: Zebra Crossing (ZXing) Multi-format 1D/2D Barcode Image Processing Library. web: http://code.google.com/p/zxing. Accessed: November 2010
-
-
-
|