-
2
-
-
17444411549
-
Efficient encryption of wavelet-based coded color images
-
Jul.
-
K. Martin, R. Lukac, and K.N. Plataniotis, "Efficient Encryption ofWavelet-Based Coded Color Images," Pattern Recognition, vol. 38, no. 7, pp. 1111-1115, Jul. 2005.
-
(2005)
Pattern Recognition
, vol.38
, Issue.7
, pp. 1111-1115
-
-
Martin, K.1
Lukac, R.2
Plataniotis, K.N.3
-
3
-
-
78649828352
-
Selective encryption of human skin in JPEG images
-
Atlanta, USA, Oct.
-
J.-M. Rodrigues, W. Puech, and A.G. Bors, "Selective Encryption of Human Skin in JPEG Images," in IEEE Int. Conf. on Image Processing, Atlanta, USA, Oct. 2006, pp. 1981-1984.
-
(2006)
IEEE Int. Conf. on Image Processing
, pp. 1981-1984
-
-
Rodrigues, J.-M.1
Puech, W.2
Bors, A.G.3
-
4
-
-
0038273965
-
Efficient frequency domain selective scrambling of digital video
-
W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling of Digital Video," IEEE Trans. on Multimedia, vol. 5, pp. 118-129, 2003.
-
(2003)
IEEE Trans. on Multimedia
, vol.5
, pp. 118-129
-
-
Zeng, W.1
Lei, S.2
-
5
-
-
50549104583
-
Scrambling for privacy protection in video surveillance systems
-
aug.
-
F. Dufaux and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems," IEEE Trans. on Circuits and Systems for Video Technology, vol. 18, no. 8, pp. 1168 -1174, aug. 2008.
-
(2008)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.18
, Issue.8
, pp. 1168-1174
-
-
Dufaux, F.1
Ebrahimi, T.2
-
6
-
-
34250017964
-
Commutative encryption and watermarking in video compression
-
June
-
S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative Encryption and Watermarking in Video Compression," IEEE Trans. on Circuits and Systems for Video Technology, vol. 17, no. 6, pp. 774-778, June 2007.
-
(2007)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
7
-
-
79955602395
-
Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for i and P frames
-
Z. Shahid, M. Chaumont, and W. Puech, "Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P frames," IEEE Trans. on Circuits and Systems for Video Technology, vol. 21, no. 5, pp. 565-576, 2011.
-
(2011)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.21
, Issue.5
, pp. 565-576
-
-
Shahid, Z.1
Chaumont, M.2
Puech, W.3
-
8
-
-
80051662638
-
Perceptual video encryption using multiple 8×8 transforms in H.264 and MPEG-4
-
May
-
S.K. Au Yeung, S. Zhu, and B. Zeng, "Perceptual Video Encryption using multiple 8×8 transforms in H.264 and MPEG-4," IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 2436-2439, May 2011.
-
(2011)
IEEE Int. Conf. on Acoustics, Speech and Signal Processing
, pp. 2436-2439
-
-
Au Yeung, S.K.1
Zhu, S.2
Zeng, B.3
-
9
-
-
33749628528
-
Measuring the strength of partial encryption scheme
-
A. Said, "Measuring the Strength of Partial Encryption Scheme," in IEEE Int. Conf. on Image Processing, 2005, vol. 2, pp. 1126-1129.
-
(2005)
IEEE Int. Conf. on Image Processing
, vol.2
, pp. 1126-1129
-
-
Said, A.1
-
11
-
-
84874745569
-
Privacy protection and face recognition
-
StanZ. Li and Anil K. Jain, Eds., Springer London
-
A. W. Senior and S. Pankanti, "Privacy protection and face recognition," in Handbook of Face Recognition, StanZ. Li and Anil K. Jain, Eds., pp. 671-691. Springer London, 2011.
-
(2011)
Handbook of Face Recognition
, pp. 671-691
-
-
Senior, A.W.1
Pankanti, S.2
-
12
-
-
80051643915
-
Secure video processing: Problems and challenges
-
W. Lu, A. L. Varna, and M. Wu, "Secure video processing: Problems and challenges," in IEEE Int. Conf. on Acoustics, Speech and Signal Processing, 2011, pp. 5856-5859.
-
(2011)
IEEE Int. Conf. on Acoustics, Speech and Signal Processing
, pp. 5856-5859
-
-
Lu, W.1
Varna, A.L.2
Wu, M.3
-
13
-
-
84864063536
-
Efficient methods for privacy preserving face detection
-
B. Schölkopf, J. Platt, and T. Hoffman, Eds. MIT Press, Cambridge, MA
-
S. Avidan and M. Butman, "Efficient methods for privacy preserving face detection," in Advances in Neural Information Processing Systems, B. Schölkopf, J. Platt, and T. Hoffman, Eds., pp. 57-64. MIT Press, Cambridge, MA, 2007.
-
(2007)
Advances in Neural Information Processing Systems
, pp. 57-64
-
-
Avidan, S.1
Butman, M.2
-
14
-
-
69949163699
-
Privacy-preserving face recognition
-
Seattle, USA
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, R. L. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Privacy Enhancing Technologies Symposium, Seattle, USA, 2009, pp. 235-253.
-
(2009)
Privacy Enhancing Technologies Symposium
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, R.L.5
Toft, T.6
-
15
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
Berlin, Heidelberg, Springer-Verlag
-
A-R. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacy-preserving face recognition," in Int. Conf. on Information security and cryptology, Berlin, Heidelberg, 2010, pp. 229-244, Springer-Verlag.
-
(2010)
Int. Conf. on Information Security and Cryptology
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
16
-
-
77953179820
-
Efficient privacy preserving video surveillance
-
oct. 2 2009
-
M. Upmanyu, A.M. Namboodiri, K. Srinathan, and C.V. Jawahar, "Efficient privacy preserving video surveillance," in Computer Vision, IEEE International Conference on, 29 2009-oct. 2 2009, pp. 1639 -1646.
-
(2009)
Computer Vision, IEEE International Conference on
, vol.29
, pp. 1639-1646
-
-
Upmanyu, M.1
Namboodiri, A.M.2
Srinathan, K.3
Jawahar, C.V.4
-
17
-
-
78049407070
-
Privacy-preserving watch list screening in video surveillance system
-
Berlin, Heidelberg, PCM'10. Springer-Verlag
-
H. Sohn, K. N. Plataniotis, and Y. M. Ro, "Privacy-preserving watch list screening in video surveillance system," in Pacific Rim conference on Advances in multimedia information processing: Part I, Berlin, Heidelberg, 2010, PCM'10, pp. 622-632, Springer-Verlag.
-
(2010)
Pacific Rim Conference on Advances in Multimedia Information Processing: Part i
, pp. 622-632
-
-
Sohn, H.1
Plataniotis, K.N.2
Ro, Y.M.3
-
18
-
-
77955178939
-
Scifi - A system for secure face identification
-
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, "Scifi - a system for secure face identification," in Security and Privacy, IEEE Symposium on, may 2010, pp. 239 -254.
-
(2010)
Security and Privacy, IEEE Symposium On, May
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
19
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer-Verlag, LNCS
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Advances in Cryptology, EUROCRYPT. 1999, vol. 1592, pp. 233-238, Springer-Verlag, LNCS.
-
(1999)
Advances in Cryptology, EUROCRYPT.
, vol.1592
, pp. 233-238
-
-
Paillier, P.1
-
20
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
Cheju Island, Korea, Feb.
-
I. Damgård and M. Jurik, "A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System," in International Workshop on Practice and Theory in Public Key Cryptosystems, Cheju Island, Korea, Feb. 2001, pp. 119-136.
-
(2001)
International Workshop on Practice and Theory in Public Key Cryptosystems
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
21
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
Rome, Italy
-
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, et al., "Privacy-preserving fingercode authentication," in ACM workshop on Multimedia and Security, Rome, Italy, 2010, pp. 231-240.
-
(2010)
ACM Workshop on Multimedia and Security
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Di Raimondo, M.4
Donida Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Scotti, F.10
-
22
-
-
38149070898
-
An application of the goldwassermicali cryptosystem to biometric authentication
-
Queensland, Australia
-
J. Bringer, H. Chabanne, M. Izabachene, D. Pointcheval, Q. Tang, and S. Zimmer, "An application of the goldwassermicali cryptosystem to biometric authentication," in Australasian Conf. on Information Security and Privacy, Queensland, Australia, 2007, pp. 96-106.
-
(2007)
Australasian Conf. on Information Security and Privacy
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabachene, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
23
-
-
70349858081
-
Secure biometric authentication with improved accuracy
-
Wollongong, Australia
-
M. Barbosa, T. Brouard, S. Cauchie, and S. de Sousa, "Secure biometric authentication with improved accuracy," in Australasian Conf. on Information Security and Privacy, Wollongong, Australia, 2008, pp. 21-36.
-
(2008)
Australasian Conf. on Information Security and Privacy
, pp. 21-36
-
-
Barbosa, M.1
Brouard, T.2
Cauchie, S.3
De Sousa, S.4
-
24
-
-
84866779632
-
Secure and efficient protocols for iris and fingerprint identification
-
Leuven, Belgium, September
-
M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in European Symposium on Research in Computer Security, Leuven, Belgium, September 2011.
-
(2011)
European Symposium on Research in Computer Security
-
-
Blanton, M.1
Gasti, P.2
-
25
-
-
67651030465
-
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
-
June
-
C. Castelluccia, A. C-F. Chan, E. Mykletun, and G. Tsudik, "Efficient and provably secure aggregation of encrypted data in wireless sensor networks," ACM Trans. Sen. Netw., vol. 5, pp. 20:1-20:36, June 2009.
-
(2009)
ACM Trans. Sen. Netw.
, vol.5
, pp. 201-2036
-
-
Castelluccia, C.1
Chan, A.C.-F.2
Mykletun, E.3
Tsudik, G.4
-
26
-
-
80051602733
-
Efficiently computing private recommendations
-
Prag, Czech Republic, May/2011
-
Z. Erkin, M. Beye, T. Veugen, and R. L̃. Lagendijk, "Efficiently computing private recommendations," in IEEE Int. Conf. on Acoustic, Speech and Signal Processing, Prag, Czech Republic, May/2011 2011, pp. 5864-5867.
-
(2011)
IEEE Int. Conf. on Acoustic, Speech and Signal Processing
, pp. 5864-5867
-
-
Erkin, Z.1
Beye, M.2
Veugen, T.3
Lagendijk, R.L.4
-
27
-
-
79957487964
-
Privacy-preserving ECG classification with branching programs and neural networks
-
June
-
M. Barni, P. Failla, R. Lazzeretti, A-R. Sadeghi, and T. Schneider, "Privacy-preserving ECG classification with branching programs and neural networks," Information Forensics and Security, IEEE Trans. on, vol. 6, no. 2, pp. 452-468, June 2011.
-
(2011)
Information Forensics and Security, IEEE Trans. on
, vol.6
, Issue.2
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.-R.4
Schneider, T.5
-
28
-
-
36949019777
-
Oblivious neural network computing via homomorphic encryption
-
C. Orlandi, A. Piva, and M. Barni, "Oblivious neural network computing via homomorphic encryption," EURASIP Journal on Information Security, vol. 2007, pp. 1-11, 207.
-
EURASIP Journal on Information Security
, vol.2007
, Issue.207
, pp. 1-11
-
-
Orlandi, C.1
Piva, A.2
Barni, M.3
-
29
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
Springer-Verlag, LNCS
-
M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, "Secure evaluation of private linear branching programs with medical applications," in European Symposium on Research in Computer Security. 2009, vol. 5789, Springer-Verlag, LNCS.
-
(2009)
European Symposium on Research in Computer Security.
, vol.5789
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
|