-
1
-
-
84967194080
-
Editorial: The growth of CCTV: A global perspective on the international diffusion of video surveillance in publicly accessible space
-
V. Norris, M. McCahill, and D. Wood, "Editorial: The growth of CCTV: A global perspective on the international diffusion of video surveillance in publicly accessible space," Surveillance and Society, vol. 2(2/3), pp. 110-135, 2004.
-
(2004)
Surveillance and Society
, vol.2
, Issue.2-3
, pp. 110-135
-
-
Norris, V.1
McCahill, M.2
Wood, D.3
-
2
-
-
77957796807
-
Privacy and surveillance in the age of terror
-
Simon Chesterman, "Privacy and surveillance in the age of terror," Survival, vol. 52, no. 5, pp. 31-46, 2010.
-
(2010)
Survival
, vol.52
, Issue.5
, pp. 31-46
-
-
Chesterman, S.1
-
3
-
-
20844455524
-
Enabling video privacy through computer vision
-
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Ying-Li Tian, A. Ekin, J. Connell, Chiao-Fe Shu, and Max Lu, "Enabling video privacy through computer vision," Security Privacy, IEEE, vol. 3, no. 3, pp. 50-57, 2005.
-
(2005)
Security Privacy, IEEE
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.5
Ekin, A.6
Connell, J.7
Shu, C.8
Lu, M.9
-
4
-
-
84861687858
-
User-centric privacy awareness in video surveillance
-
Thomas Winkler and Bernhard Rinner, "User-centric privacy awareness in video surveillance," Multimedia Systems, vol. 18, no. 2, pp. 99-121, 2012.
-
(2012)
Multimedia Systems
, vol.18
, Issue.2
, pp. 99-121
-
-
Winkler, T.1
Rinner, B.2
-
6
-
-
84861711606
-
Chaoscryptography based privacy preservation technique for video surveillance
-
Sk. Md. Mizanur Rahman, M. Anwar Hossain, Hussein Mouftah, Abdulmotaleb El Saddik, and Eiji Okamoto, "Chaoscryptography based privacy preservation technique for video surveillance," Multimedia Systems, vol. 18, no. 2, pp. 145-155, 2012.
-
(2012)
Multimedia Systems
, vol.18
, Issue.2
, pp. 145-155
-
-
Mizanur Rahman, Md.1
Anwar Hossain, M.2
Mouftah, H.3
El Saddik, A.4
Okamoto, E.5
-
7
-
-
77951678423
-
Compression independent reversible encryption for privacy in video surveillance
-
Jan.
-
Paula Carrillo, Hari Kalva, and Spyros Magliveras, "Compression independent reversible encryption for privacy in video surveillance," EURASIP J. Inf. Secur., vol. 2009, pp. 5:1-5:13, Jan. 2009.
-
(2009)
EURASIP J. Inf. Secur.
, vol.2009
, pp. 51-513
-
-
Carrillo, P.1
Kalva, H.2
Magliveras, S.3
-
8
-
-
14944375141
-
Video surveillance using JPEG 2000
-
Frederic Dufaux and Touradj Ebrahimi, "Video surveillance using JPEG 2000," in Proceedings of the SPIE, 2004, vol. 5588, pp. 268-275.
-
(2004)
Proceedings of the SPIE
, vol.5588
, pp. 268-275
-
-
Dufaux, F.1
Ebrahimi, T.2
-
9
-
-
51349146808
-
Robust human face hiding ensuring privacy
-
Isabel Martnez-ponte, Xavier Desurmont, Jerome Meessen, and Jean franois Delaigle, "Robust human face hiding ensuring privacy," in in Proc. of International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS, 2005.
-
(2005)
Proc. of International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS)
-
-
Martnez-Ponte, I.1
Desurmont, X.2
Meessen, J.3
Franois Delaigle, J.4
-
10
-
-
50549104583
-
Scrambling for privacy protection in video surveillance systems
-
F. Dufaux and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 18, no. 8, pp. 1168-1174, 2008.
-
(2008)
Circuits and Systems for Video Technology, IEEE Transactions on
, vol.18
, Issue.8
, pp. 1168-1174
-
-
Dufaux, F.1
Ebrahimi, T.2
-
11
-
-
85084161747
-
Getting the face behind the squares: Reconstructing pixelized video streams
-
USENIX Association
-
Ludovico Cavedon, Luca Foschini, and Giovanni Vigna, "Getting the face behind the squares: reconstructing pixelized video streams," in Proceedings of the 5th USENIX conference on Offensive technologies, Berkeley, CA, USA, 2011, WOOT'11, pp. 5-5, USENIX Association.
-
Proceedings of the 5th USENIX Conference on Offensive Technologies, Berkeley, CA, USA, 2011, WOOT'11
, pp. 5-5
-
-
Cavedon, L.1
Foschini, L.2
Vigna, G.3
-
13
-
-
14644429006
-
Preserving privacy by de-identifying face images
-
E. M. Newton, L. Sweeney, and B. Malin, "Preserving privacy by de-identifying face images," Knowledge and Data Engineering, IEEE Transactions on, vol. 17, no. 2, pp. 232-243, 2005.
-
(2005)
Knowledge and Data Engineering, IEEE Transactions on
, vol.17
, Issue.2
, pp. 232-243
-
-
Newton, E.M.1
Sweeney, L.2
Malin, B.3
-
14
-
-
0037485213
-
Differential vector quantization of achromatic imagery
-
R L Baker and R M Gray, "Differential vector quantization of achromatic imagery," in Proc. Intl Picture Coding Symp, 1983, pp. 10510-6.
-
(1983)
Proc. Intl Picture Coding Symp
, pp. 10510-10516
-
-
Baker, R.L.1
Gray, R.M.2
-
15
-
-
0022249893
-
Compression of color digital images using vector quantization in product codes
-
S. E. Budge and R. Baker, "Compression of color digital images using vector quantization in product codes," in Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '85., 1985, vol. 10, pp. 129-132.
-
(1985)
Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '85
, vol.10
, pp. 129-132
-
-
Budge, S.E.1
Baker, R.2
-
16
-
-
0026630755
-
Image coding based on a fractal theory of iterated contractive image transformations
-
A. E. Jacquin, "Image coding based on a fractal theory of iterated contractive image transformations," Image Processing, IEEE Transactions on, vol. 1, no. 1, pp. 18-30, 1992.
-
(1992)
Image Processing, IEEE Transactions on
, vol.1
, Issue.1
, pp. 18-30
-
-
Jacquin, A.E.1
-
17
-
-
0030409661
-
Multi-resolution access control algorithm based on fractal coding
-
S. Roche, J.-L. Dugelay, and R. Molva, "Multi-resolution access control algorithm based on fractal coding," in Image Processing, 1996. Proceedings., International Conference on, 1996, vol. 3, pp. 235-238 vol. 3.
-
(1996)
Image Processing, 1996. Proceedings., International Conference on
, vol.3
, pp. 235-238
-
-
Roche, S.1
Dugelay, J.-L.2
Molva, R.3
-
19
-
-
0028734063
-
Parameterisation of a stochastic model for human face identification
-
F. S. Samaria and A. C. Harter, "Parameterisation of a stochastic model for human face identification," in Applications of Computer Vision, 1994., Proceedings of the Second IEEE Workshop on, 1994, pp. 138-142.
-
(1994)
Applications of Computer Vision, 1994., Proceedings of the Second IEEE Workshop on
, pp. 138-142
-
-
Samaria, F.S.1
Harter, A.C.2
-
20
-
-
80055108095
-
Synthetic and privacy-preserving visualization of video sensor network outputs
-
C. Velardo, C. Araimo, and J.-L. Dugelay, "Synthetic and privacy-preserving visualization of video sensor network outputs," in Distributed Smart Cameras (ICDSC), 2011 Fifth ACM/IEEE International Conference on, 2011, pp. 1-5.
-
(2011)
Distributed Smart Cameras (ICDSC), 2011 Fifth ACM/IEEE International Conference on
, pp. 1-5
-
-
Velardo, C.1
Araimo, C.2
Dugelay, J.-L.3
-
21
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Zhou Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," Image Processing, IEEE Transactions on, vol. 13, no. 4, pp. 600-612, 2004.
-
(2004)
Image Processing, IEEE Transactions on
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
22
-
-
77955300710
-
The complete gabor-fisher classifier for robust face recognition
-
V. Struc and N. Pavesíc, "The complete gabor-fisher classifier for robust face recognition," EURASIP Advances in Signal Processing, vol. 2010, pp. 26, 2010.
-
(2010)
EURASIP Advances in Signal Processing
, vol.2010
, pp. 26
-
-
Struc, V.1
Pavesíc, N.2
-
23
-
-
84924767376
-
Mediaeval 2013 visual privacy task: Warping-based privacy protection tool
-
MediaEval, Martha A. Larson, Xavier Anguera, Timo Reuter, Gareth J. F. Jones, Bogdan Ionescu, Markus Schedl, Tomas Piatrik, Claudia Hauff, and Mohammad Soleymani, Eds
-
Pavel Korshunov and Touradj Ebrahimi, "Mediaeval 2013 visual privacy task: Warping-based privacy protection tool.," in MediaEval, Martha A. Larson, Xavier Anguera, Timo Reuter, Gareth J. F. Jones, Bogdan Ionescu, Markus Schedl, Tomas Piatrik, Claudia Hauff, and Mohammad Soleymani, Eds. 2013, vol. 1043 of CEUR Workshop Proceedings, CEUR-WS. org.
-
(2013)
Of CEUR Workshop Proceedings
, vol.1043
-
-
Korshunov, P.1
Ebrahimi, T.2
|