메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2629-2632

Emerging cryptographic challenges in image and video processing

Author keywords

[No Author keywords available]

Indexed keywords

CONTENT ACCESS CONTROLS; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC TECHNIQUES; IDENTITY VERIFICATION; IMAGE AND VIDEO PROCESSING; PRIVACY PROTECTION; SECURE BIOMETRICS;

EID: 84875864074     PISSN: 15224880     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIP.2012.6467438     Document Type: Conference Paper
Times cited : (12)

References (29)
  • 2
    • 17444411549 scopus 로고    scopus 로고
    • Efficient encryption of wavelet-based coded color images
    • Jul.
    • K. Martin, R. Lukac, and K.N. Plataniotis, "Efficient Encryption ofWavelet-Based Coded Color Images," Pattern Recognition, vol. 38, no. 7, pp. 1111-1115, Jul. 2005.
    • (2005) Pattern Recognition , vol.38 , Issue.7 , pp. 1111-1115
    • Martin, K.1    Lukac, R.2    Plataniotis, K.N.3
  • 3
  • 4
    • 0038273965 scopus 로고    scopus 로고
    • Efficient frequency domain selective scrambling of digital video
    • W. Zeng and S. Lei, "Efficient Frequency Domain Selective Scrambling of Digital Video," IEEE Trans. on Multimedia, vol. 5, pp. 118-129, 2003.
    • (2003) IEEE Trans. on Multimedia , vol.5 , pp. 118-129
    • Zeng, W.1    Lei, S.2
  • 5
    • 50549104583 scopus 로고    scopus 로고
    • Scrambling for privacy protection in video surveillance systems
    • aug.
    • F. Dufaux and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems," IEEE Trans. on Circuits and Systems for Video Technology, vol. 18, no. 8, pp. 1168 -1174, aug. 2008.
    • (2008) IEEE Trans. on Circuits and Systems for Video Technology , vol.18 , Issue.8 , pp. 1168-1174
    • Dufaux, F.1    Ebrahimi, T.2
  • 7
    • 79955602395 scopus 로고    scopus 로고
    • Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for i and P frames
    • Z. Shahid, M. Chaumont, and W. Puech, "Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P frames," IEEE Trans. on Circuits and Systems for Video Technology, vol. 21, no. 5, pp. 565-576, 2011.
    • (2011) IEEE Trans. on Circuits and Systems for Video Technology , vol.21 , Issue.5 , pp. 565-576
    • Shahid, Z.1    Chaumont, M.2    Puech, W.3
  • 9
    • 33749628528 scopus 로고    scopus 로고
    • Measuring the strength of partial encryption scheme
    • A. Said, "Measuring the Strength of Partial Encryption Scheme," in IEEE Int. Conf. on Image Processing, 2005, vol. 2, pp. 1126-1129.
    • (2005) IEEE Int. Conf. on Image Processing , vol.2 , pp. 1126-1129
    • Said, A.1
  • 11
    • 84874745569 scopus 로고    scopus 로고
    • Privacy protection and face recognition
    • StanZ. Li and Anil K. Jain, Eds., Springer London
    • A. W. Senior and S. Pankanti, "Privacy protection and face recognition," in Handbook of Face Recognition, StanZ. Li and Anil K. Jain, Eds., pp. 671-691. Springer London, 2011.
    • (2011) Handbook of Face Recognition , pp. 671-691
    • Senior, A.W.1    Pankanti, S.2
  • 13
    • 84864063536 scopus 로고    scopus 로고
    • Efficient methods for privacy preserving face detection
    • B. Schölkopf, J. Platt, and T. Hoffman, Eds. MIT Press, Cambridge, MA
    • S. Avidan and M. Butman, "Efficient methods for privacy preserving face detection," in Advances in Neural Information Processing Systems, B. Schölkopf, J. Platt, and T. Hoffman, Eds., pp. 57-64. MIT Press, Cambridge, MA, 2007.
    • (2007) Advances in Neural Information Processing Systems , pp. 57-64
    • Avidan, S.1    Butman, M.2
  • 19
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer-Verlag, LNCS
    • P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Advances in Cryptology, EUROCRYPT. 1999, vol. 1592, pp. 233-238, Springer-Verlag, LNCS.
    • (1999) Advances in Cryptology, EUROCRYPT. , vol.1592 , pp. 233-238
    • Paillier, P.1
  • 20
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • Cheju Island, Korea, Feb.
    • I. Damgård and M. Jurik, "A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System," in International Workshop on Practice and Theory in Public Key Cryptosystems, Cheju Island, Korea, Feb. 2001, pp. 119-136.
    • (2001) International Workshop on Practice and Theory in Public Key Cryptosystems , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 24
    • 84866779632 scopus 로고    scopus 로고
    • Secure and efficient protocols for iris and fingerprint identification
    • Leuven, Belgium, September
    • M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in European Symposium on Research in Computer Security, Leuven, Belgium, September 2011.
    • (2011) European Symposium on Research in Computer Security
    • Blanton, M.1    Gasti, P.2
  • 25
    • 67651030465 scopus 로고    scopus 로고
    • Efficient and provably secure aggregation of encrypted data in wireless sensor networks
    • June
    • C. Castelluccia, A. C-F. Chan, E. Mykletun, and G. Tsudik, "Efficient and provably secure aggregation of encrypted data in wireless sensor networks," ACM Trans. Sen. Netw., vol. 5, pp. 20:1-20:36, June 2009.
    • (2009) ACM Trans. Sen. Netw. , vol.5 , pp. 201-2036
    • Castelluccia, C.1    Chan, A.C.-F.2    Mykletun, E.3    Tsudik, G.4
  • 28
    • 36949019777 scopus 로고    scopus 로고
    • Oblivious neural network computing via homomorphic encryption
    • C. Orlandi, A. Piva, and M. Barni, "Oblivious neural network computing via homomorphic encryption," EURASIP Journal on Information Security, vol. 2007, pp. 1-11, 207.
    • EURASIP Journal on Information Security , vol.2007 , Issue.207 , pp. 1-11
    • Orlandi, C.1    Piva, A.2    Barni, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.