-
2
-
-
0035159213
-
MPEG-7 camera
-
T. Ebrahimi, Y. Abdeljaoued, R. F. I. Ventura, and O. D. Escoda, "MPEG-7 camera, "in Proceedings of International Conference on Image Processing, vol. 3, 2001, pp. 600-603
-
(2001)
Proceedings of International Conference on Image Processing
, vol.3
, pp. 600-603
-
-
Ebrahimi, T.1
Abdeljaoued, Y.2
Ventura, R.F.I.3
Escoda, O.D.4
-
3
-
-
20844455524
-
Enabling video privacy through computer vision
-
May
-
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. Shu, and M. Lu, "Enabling video privacy through computer vision, "IEEE Security and Privacy, vol. 3, no. 3, pp. 50-57, May 2005
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.8
Lu, M.9
-
4
-
-
84861669897
-
A general framework for managing and processing live video data with privacy protection
-
A. J. Aved and K. A. Hua, "A general framework for managing and processing live video data with privacy protection, "Multimedia Syst. , vol. 18, no. 2, pp. 123-143, 2012
-
(2012)
Multimedia Syst
, vol.18
, Issue.2
, pp. 123-143
-
-
Aved, A.J.1
Hua, K.A.2
-
5
-
-
33749251117
-
Hiding privacy information in video surveillance system
-
Genoa, Italy, Sep
-
W. Zhang, S. Cheung, and M. Chen, "Hiding privacy information in video surveillance system, "in Proc. IEEE International Conference on Image Processing, Genoa, Italy, Sep 2005
-
(2005)
Proc IEEE International Conference on Image Processing
-
-
Zhang, W.1
Cheung, S.2
Chen, M.3
-
6
-
-
50549104583
-
Scrambling for privacy protection in video surveillance systems
-
Aug
-
F. Dufaux and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems, "IEEE Trans. on Circuits and Systems for Video Technology, vol. 18, no. 8, pp. 1168-1174, Aug 2008
-
(2008)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.18
, Issue.8
, pp. 1168-1174
-
-
Dufaux, F.1
Ebrahimi, T.2
-
7
-
-
13444271747
-
Privacy protecting data collection in media spaces
-
New York, NY, USA, Oct
-
J. Wickramasuriya, M. Datt, S. Mehrotra, and N. Venkatasubramanian, "Privacy protecting data collection in media spaces, "in Proceedings of the 12th annual ACM international conference on Multimedia, New York, NY, USA, Oct. 2004, pp. 48-55
-
(2004)
Proceedings of the 12th Annual ACM International Conference on Multimedia
, pp. 48-55
-
-
Wickramasuriya, J.1
Datt, M.2
Mehrotra, S.3
Venkatasubramanian, N.4
-
8
-
-
84888878275
-
Using warping for privacy protection in video surveillance
-
Santorini, Greece
-
P. Korshunov and T. Ebrahimi, "Using warping for privacy protection in video surveillance, "in 18th International Conference on Digital Signal Processing (DSP), Santorini, Greece, 2013, pp. 1-6
-
(2013)
18th International Conference on Digital Signal Processing (DSP)
, pp. 1-6
-
-
Korshunov, P.1
Ebrahimi, T.2
-
10
-
-
79955412469
-
Secure image encryption without size limitation using Arnold transform and random strategies
-
Z. Tang and X. Zhang, "Secure image encryption without size limitation using Arnold transform and random strategies. "Journal of Multimedia, vol. 6, no. 2, pp. 202-206, 2011
-
(2011)
Journal of Multimedia
, vol.6
, Issue.2
, pp. 202-206
-
-
Tang, Z.1
Zhang, X.2
-
11
-
-
84872938866
-
A novel digital image encryption method based on one-dimensional random scrambling
-
Q. Sun, P. Guan, Y. Qiu, and Y. Xue, "A novel digital image encryption method based on one-dimensional random scrambling. "in FSKD. IEEE, 2012, pp. 1669-1672
-
(2012)
FSKD. IEEE
, pp. 1669-1672
-
-
Sun, Q.1
Guan, P.2
Qiu, Y.3
Xue, Y.4
-
12
-
-
80051915132
-
A scrambling algorithm of image encryption based on Rubiks cube rotation and logistic sequence
-
May
-
L. Zhang, X. Tian, and S. Xia, "A scrambling algorithm of image encryption based on Rubiks cube rotation and logistic sequence, " in Multimedia and Signal Processing (CMSP), 2011 International Conference on, vol. 1, May 2011, pp. 312-315
-
(2011)
Multimedia and Signal Processing (CMSP) 2011 International Conference on
, vol.1
, pp. 312-315
-
-
Zhang, L.1
Tian, X.2
Xia, S.3
-
13
-
-
33750579796
-
Toward a Secure JPEG
-
F. Dufaux and T. Ebrahimi, "Toward a Secure JPEG, "in Proc. SPIE, vol. 6312, 2006, pp. 63 120K-63 120K-8
-
(2006)
Proc. SPIE
, vol.6312
, pp. 63120K-63120K8
-
-
Dufaux, F.1
Ebrahimi, T.2
-
14
-
-
84893175776
-
Hierarchical image-scrambling method with scramble-level controllability for privacy protection
-
Aug 2013
-
T. Honda, Y. Murakami, Y. Yanagihara, T. Kumaki, and T. Fujino, "Hierarchical image-scrambling method with scramble-level controllability for privacy protection, "in 2013 IEEE 56th International Midwest Symposium on Circuits and Systems, Aug 2013, pp. 1371-1374
-
(2013)
IEEE 56th International Midwest Symposium on Circuits and Systems
, pp. 1371-1374
-
-
Honda, T.1
Murakami, Y.2
Yanagihara, Y.3
Kumaki, T.4
Fujino, T.5
-
16
-
-
35348839742
-
Overexposed?: Privacy patterns and considerations in online and mobile photo sharing
-
M. B. Rosson and D. J. Gilmore, Eds ACM
-
S. Ahern, D. Eckles, N. Good, S. King, M. Naaman, and R. Nair, "Overexposed?: Privacy patterns and considerations in online and mobile photo sharing. "in CHI, M. B. Rosson and D. J. Gilmore, Eds. ACM, 2007, pp. 357-366
-
(2007)
CHI
, pp. 357-366
-
-
Ahern, S.1
Eckles, D.2
Good, N.3
King, S.4
Naaman, M.5
Nair, R.6
-
17
-
-
77953970691
-
Moving beyond untagging: Photo privacy in a tagged world
-
ser. CHI 10. New York, NY, USA: ACM
-
A. Besmer and H. Richter Lipford, "Moving beyond untagging: Photo privacy in a tagged world, "in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI 10. New York, NY, USA: ACM, 2010, pp. 1563-1572
-
(2010)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 1563-1572
-
-
Besmer, A.1
Richter Lipford, H.2
-
18
-
-
85091930363
-
Cybercasing the joint: On the privacy implications of geo-tagging
-
ser. HotSec10. Berkeley, CA, USA: USENIX Association
-
G. Friedland and R. Sommer, "Cybercasing the joint: On the privacy implications of geo-tagging, "in Proceedings of the 5th USENIX Conference on Hot Topics in Security, ser. HotSec10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-8
-
(2010)
Proceedings of the 5th USENIX Conference on Hot Topics in Security
, pp. 1-8
-
-
Friedland, G.1
Sommer, R.2
-
19
-
-
84860654785
-
Privacy attacks in social media using photo tagging networks: A case study with Facebook
-
ser. PSOSM 12. New York, NY, USA: ACM
-
J. P. Pesce, D. L. Casas, G. Rauber, and V. Almeida, "Privacy attacks in social media using photo tagging networks: A case study with Facebook, "in Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, ser. PSOSM 12. New York, NY, USA: ACM, 2012, pp. 4:1-4:8
-
(2012)
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
, vol.1-4
, Issue.8
, pp. 4
-
-
Pesce, J.P.1
Casas, D.L.2
Rauber, G.3
Almeida, V.4
-
20
-
-
84860735258
-
Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks
-
5th ACM Workshop on Social Network Systems, Bern, Switzerland, April 2012
-
L. A. Cutillo, R. Molva, and M. Ö nen, "Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks, " in SNS 2012, 5th ACM Workshop on Social Network Systems, Bern, Switzerland, April 2012
-
(2012)
SNS
-
-
Cutillo, L.A.1
Molva, R.2
Onen, M.3
-
21
-
-
85076695685
-
P3: Toward privacy-preserving photo sharing
-
Berkeley, CA: USENIX
-
M.-R. Ra, R. Govindan, and A. Ortega, "P3: Toward privacy-preserving photo sharing, "in Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation. Berkeley, CA: USENIX, 2013, pp. 515-528
-
(2013)
Presented As Part of the 10th USENIX Symposium on Networked Systems Design and Implementation
, pp. 515-528
-
-
Ra, M.-R.1
Govindan, R.2
Ortega, A.3
-
22
-
-
84862068410
-
Tag, you can see it: Using tags for access control in photo sharing
-
ser. CHI 12. New York, NY, USA: ACM
-
P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, "Tag, you can see it!: Using tags for access control in photo sharing, "in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI 12. New York, NY, USA: ACM, 2012, pp. 377-386
-
(2012)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 377-386
-
-
Klemperer, P.1
Liang, Y.2
Mazurek, M.3
Sleeper, M.4
Ur, B.5
Bauer, L.6
Cranor, L.F.7
Gupta, N.8
Reiter, M.9
-
23
-
-
84943228243
-
Toward strong, usable access control for shared distributed data
-
Santa Clara, CA: USENIX
-
M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer, G. R. Ganger, N. Gupta, and M. K. Reiter, "Toward strong, usable access control for shared distributed data, "in Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST 14). Santa Clara, CA: USENIX, 2014, pp. 89-103
-
(2014)
Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST 14)
, pp. 89-103
-
-
Mazurek, M.L.1
Liang, Y.2
Melicher, W.3
Sleeper, M.4
Bauer, L.5
Ganger, G.R.6
Gupta, N.7
Reiter, M.K.8
-
24
-
-
70450193588
-
Understanding images of groups of people
-
A. Gallagher and T. Chen, "Understanding images of groups of people, " in Proc. CVPR, 2009
-
(2009)
Proc. CVPR
-
-
Gallagher, A.1
Chen, T.2
-
25
-
-
84875671063
-
Protection of privacy in JPEG files using reversible information hiding
-
Nov
-
M. Niimi, F. Masutani, and H. Noda, "Protection of privacy in JPEG files using reversible information hiding, "in 2012 International Symposium on Intelligent Signal Processing and Communications Systems, Nov 2012, pp. 441-446
-
(2012)
2012 International Symposium on Intelligent Signal Processing and Communications Systems
, pp. 441-446
-
-
Niimi, M.1
Masutani, F.2
Noda, H.3
-
26
-
-
67649826545
-
Utilizing social networking platforms to support public key infrastructures
-
INSTICC
-
V. Gruhn, M. Hülder, and V. Wolff-Marting, "Utilizing social networking platforms to support public key infrastructures, "in Proceedings of the Second International Conference on Security and Cryptography (SECRYPT 2007). INSTICC, 2007, pp. 245-250
-
(2007)
Proceedings of the Second International Conference on Security and Cryptography (SECRYPT 2007)
, pp. 245-250
-
-
Gruhn, V.1
Hülder, M.2
Wolff-Marting, V.3
-
27
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
Aug
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: An online social network with user-defined privacy, "SIGCOMM Comput. Commun. Rev. , vol. 39, no. 4, pp. 135-146, Aug. 2009
-
(2009)
SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.4
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
28
-
-
84943265692
-
-
Nov. 2012, US Patent App 13/419 065. The Third International Workshop on Security and Privacy in Big Data (BigSecurity
-
V. Narayanan, G. Rose, and L. Dondeti, "Social network based PKI authentication, "Nov. 2012, US Patent App. 13/419, 065. [Online]. Available: http://www. google. com/patents/US20120278625 The Third International Workshop on Security and Privacy in Big Data (BigSecurity 2015) 190
-
(2015)
Social Network Based PKI Authentication
, pp. 190
-
-
Narayanan, V.1
Rose, G.2
Dondeti, L.3
|