메뉴 건너뛰기




Volumn 18, Issue 8, 2008, Pages 1152-1162

Privacy Protected Surveillance Using Secure Visual Object Coding

Author keywords

Encryption; partitioning in hierarchical trees (SPIHT); privacy protection; security; set; shape adaptive coding; shape and texture coding; surveillance; visual object coding; wavelet based coding

Indexed keywords


EID: 85008039445     PISSN: 10518215     EISSN: 15582205     Source Type: Journal    
DOI: 10.1109/TCSVT.2008.927110     Document Type: Article
Times cited : (53)

References (24)
  • 1
    • 33751510198 scopus 로고    scopus 로고
    • SPIHT-based coding of the shape and texture of arbitrarily shaped visual objects
    • Oct
    • K. Martin, R. Lukac, and K. N. Plataniotis, “SPIHT-based coding of the shape and texture of arbitrarily shaped visual objects,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1196–1208, Oct. 2006
    • (2006) IEEE Trans. Circuits Syst. Video Technol , vol.16 , Issue.10 , pp. 1196-1208
    • Martin, K.1    Lukac, R.2    Plataniotis, K.N.3
  • 2
    • 0034251450 scopus 로고    scopus 로고
    • Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding
    • Aug
    • S. Li and W. Li, “Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding,” IEEE Trans. Circuits Syst. Video Technol., vol. 10, no. 4, pp. 725–743, Aug. 2000
    • (2000) IEEE Trans. Circuits Syst. Video Technol , vol.10 , Issue.4 , pp. 725-743
    • Li, S.1    Li, W.2
  • 3
    • 0030173121 scopus 로고    scopus 로고
    • A new fast and efficient image codec based on set partitioning in hierarchical trees
    • Jun
    • A. Said and W. A. Pearlman, “A new fast and efficient image codec based on set partitioning in hierarchical trees,” IEEE Trans. Circuits Syst. Video Technol., vol. 6, no. 3, pp. 243–250, Jun. 1996
    • (1996) IEEE Trans. Circuits Syst. Video Technol , vol.6 , Issue.3 , pp. 243-250
    • Said, A.1    Pearlman, W.A.2
  • 4
    • 85045783142 scopus 로고    scopus 로고
    • Fundamentals of multimedia encryption techniques
    • Boca Raton, FL: CRC, ch. 3
    • B. Furht, D. Socek, and A. M. Eskicioglu, “Fundamentals of multimedia encryption techniques,” in Multimedia Security Handbook. Boca Raton, FL: CRC, 2004, ch. 3
    • (2004) Multimedia Security Handbook
    • Furht, B.1    Socek, D.2    Eskicioglu, A.M.3
  • 5
    • 33846789227 scopus 로고    scopus 로고
    • Privacy protection by concealing person in circumstantial video image
    • S. Tansuriyavong and S. Hanaki, “Privacy protection by concealing person in circumstantial video image,” in Proc. Workshop on Perceptive User Interfaces, 2001, vol. 4, pp. 1–4
    • (2001) Proc. Workshop on Perceptive User Interfaces , vol.4 , pp. 1-4
    • Tansuriyavong, S.1    Hanaki, S.2
  • 6
    • 33846785339 scopus 로고    scopus 로고
    • Tools for protecting the privacy of specific individuals in video
    • D. Chen, Y. Chang, R. Yan, and J. Yang, “Tools for protecting the privacy of specific individuals in video,” EURASIP J. Adv. Signal Process., vol. 2007, pp. 1–9, 2007
    • (2007) EURASIP J. Adv. Signal Process , vol.2007 , pp. 1-9
    • Chen, D.1    Chang, Y.2    Yan, R.3    Yang, J.4
  • 7
    • 14644429006 scopus 로고    scopus 로고
    • Preserving privacy by de-identifying face images
    • Feb
    • E. M. Newton, L. Sweeney, and B. Malin, “Preserving privacy by de-identifying face images,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 2, pp. 232–243, Feb. 2005
    • (2005) IEEE Trans. Knowl. Data Eng , vol.17 , Issue.2 , pp. 232-243
    • Newton, E.M.1    Sweeney, L.2    Malin, B.3
  • 9
    • 38749126213 scopus 로고    scopus 로고
    • A full-body layered deformable model for automatic model-based gait recognition
    • article ID 261317
    • H. Lu, K. N. Plataniotis, and A. N. Venetsanopoulos, “A full-body layered deformable model for automatic model-based gait recognition,” EURASIP J. Adv. Signal Process., vol. 2008, 2008, article ID 261317
    • EURASIP J. Adv. Signal Process , vol.2008 , Issue.2008
    • Lu, H.1    Plataniotis, K.N.2    Venetsanopoulos, A.N.3
  • 12
    • 33749251117 scopus 로고    scopus 로고
    • Hiding privacy information in video surveillance system
    • W. Zhang, S. S. Cheung, and M. Chen, “Hiding privacy information in video surveillance system,” in Proc. IEEE Int. Conf. Image Process., 2005, vol. 3, pp. 868–871
    • (2005) Proc. IEEE Int. Conf. Image Process , vol.3 , pp. 868-871
    • Zhang, W.1    Cheung, S.S.2    Chen, M.3
  • 14
    • 85008043646 scopus 로고    scopus 로고
    • ISO/IEC 15444-3:2007 Information Technology—JPEG 2000 Image Coding System: Motion JPEG 2000
    • ISO/IEC 15444-3:2007 Information Technology—JPEG 2000 Image Coding System: Motion JPEG 2000, JTC 1/SC 29/WG 1, ISO/IEC Std., 2007
    • (2007)
  • 15
    • 0036612847 scopus 로고    scopus 로고
    • A format-compliant configurable encryption framework for access control of video
    • Jun
    • J. Wen, M. Severa, W. Zeng, M. H. Luttrell, and W. Jin, “A format-compliant configurable encryption framework for access control of video,” IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, pp. 545–557, Jun. 2002
    • (2002) IEEE Trans. Circuits Syst. Video Technol , vol.12 , Issue.6 , pp. 545-557
    • Wen, J.1    Severa, M.2    Zeng, W.3    Luttrell, M.H.4    Jin, W.5
  • 16
    • 11244264715 scopus 로고    scopus 로고
    • An AV object oriented encryption algorithm for MPEG-4 streams
    • Jun
    • P. C. Wang and T.-W. Hou, “An AV object oriented encryption algorithm for MPEG-4 streams,” in Proc. Int. Conf. on Multimedia and Expo, Jun. 2004, pp. 971–974
    • (2004) Proc. Int. Conf. on Multimedia and Expo , pp. 971-974
    • Wang, P.C.1    Hou, T.-W.2
  • 17
    • 0035447361 scopus 로고    scopus 로고
    • 3-D wavelet coding of video with arbitrary regions of support
    • Sep
    • G. Minami, Z. Xiong, A. Wang, and S. Mehrotra, “3-D wavelet coding of video with arbitrary regions of support,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 9, pp. 1063–1068, Sep. 2001
    • (2001) IEEE Trans. Circuits Syst. Video Technol , vol.11 , Issue.9 , pp. 1063-1068
    • Minami, G.1    Xiong, Z.2    Wang, A.3    Mehrotra, S.4
  • 18
    • 17444411549 scopus 로고    scopus 로고
    • Efficient encryption of wavelet-based coded color images
    • K. Martin, R. Lukac, and K. N. Plataniotis, “Efficient encryption of wavelet-based coded color images,” Pattern Recognition, vol. 38, no. 7, pp. 1111-1115,2005
    • (2005) Pattern Recognition , vol.38 , Issue.7 , pp. 1111-1115
    • Martin, K.1    Lukac, R.2    Plataniotis, K.N.3
  • 19
    • 85008040713 scopus 로고    scopus 로고
    • Information Technology—Coding of Audio-Visual Objects—MPEG-4 Part 11: Scene Description and Application Engine (14496–11)
    • ISO/IEC JTC1/SC29 WG11 International Standard
    • Information Technology—Coding of Audio-Visual Objects—MPEG-4 Part 11: Scene Description and Application Engine (14496–11), ISO/IEC JTC1/SC29 WG11 International Standard, 2005
    • (2005)
  • 20
    • 0037305040 scopus 로고    scopus 로고
    • Embedded color image coding using SPIHT with partially linked spatial orientation trees
    • Feb
    • A. A. Kassim and W. S. Lee, “Embedded color image coding using SPIHT with partially linked spatial orientation trees,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 2, pp. 203–206, Feb. 2003
    • (2003) IEEE Trans. Circuits Syst. Video Technol , vol.13 , Issue.2 , pp. 203-206
    • Kassim, A.A.1    Lee, W.S.2
  • 21
    • 0034249821 scopus 로고    scopus 로고
    • Partial encryption of compressed images and videos
    • Aug
    • H. Cheng and X. Li, “Partial encryption of compressed images and videos,” IEEE Trans. Signal Process., vol. 48, no. 8, pp. 2439–2451, Aug. 2000
    • (2000) IEEE Trans. Signal Process , vol.48 , Issue.8 , pp. 2439-2451
    • Cheng, H.1    Li, X.2
  • 24
    • 84875973205 scopus 로고    scopus 로고
    • Ecrypt Stream Cipher Project: HC-128 European Network of Excellence for Cryptology
    • [Online]. Available:
    • Ecrypt Stream Cipher Project: HC-128 European Network of Excellence for Cryptology [Online]. Available: http://www.ecrypt.eu.org/stream/hcp3.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.