-
1
-
-
33751510198
-
SPIHT-based coding of the shape and texture of arbitrarily shaped visual objects
-
Oct
-
K. Martin, R. Lukac, and K. N. Plataniotis, “SPIHT-based coding of the shape and texture of arbitrarily shaped visual objects,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1196–1208, Oct. 2006
-
(2006)
IEEE Trans. Circuits Syst. Video Technol
, vol.16
, Issue.10
, pp. 1196-1208
-
-
Martin, K.1
Lukac, R.2
Plataniotis, K.N.3
-
2
-
-
0034251450
-
Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding
-
Aug
-
S. Li and W. Li, “Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding,” IEEE Trans. Circuits Syst. Video Technol., vol. 10, no. 4, pp. 725–743, Aug. 2000
-
(2000)
IEEE Trans. Circuits Syst. Video Technol
, vol.10
, Issue.4
, pp. 725-743
-
-
Li, S.1
Li, W.2
-
3
-
-
0030173121
-
A new fast and efficient image codec based on set partitioning in hierarchical trees
-
Jun
-
A. Said and W. A. Pearlman, “A new fast and efficient image codec based on set partitioning in hierarchical trees,” IEEE Trans. Circuits Syst. Video Technol., vol. 6, no. 3, pp. 243–250, Jun. 1996
-
(1996)
IEEE Trans. Circuits Syst. Video Technol
, vol.6
, Issue.3
, pp. 243-250
-
-
Said, A.1
Pearlman, W.A.2
-
4
-
-
85045783142
-
Fundamentals of multimedia encryption techniques
-
Boca Raton, FL: CRC, ch. 3
-
B. Furht, D. Socek, and A. M. Eskicioglu, “Fundamentals of multimedia encryption techniques,” in Multimedia Security Handbook. Boca Raton, FL: CRC, 2004, ch. 3
-
(2004)
Multimedia Security Handbook
-
-
Furht, B.1
Socek, D.2
Eskicioglu, A.M.3
-
6
-
-
33846785339
-
Tools for protecting the privacy of specific individuals in video
-
D. Chen, Y. Chang, R. Yan, and J. Yang, “Tools for protecting the privacy of specific individuals in video,” EURASIP J. Adv. Signal Process., vol. 2007, pp. 1–9, 2007
-
(2007)
EURASIP J. Adv. Signal Process
, vol.2007
, pp. 1-9
-
-
Chen, D.1
Chang, Y.2
Yan, R.3
Yang, J.4
-
7
-
-
14644429006
-
Preserving privacy by de-identifying face images
-
Feb
-
E. M. Newton, L. Sweeney, and B. Malin, “Preserving privacy by de-identifying face images,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 2, pp. 232–243, Feb. 2005
-
(2005)
IEEE Trans. Knowl. Data Eng
, vol.17
, Issue.2
, pp. 232-243
-
-
Newton, E.M.1
Sweeney, L.2
Malin, B.3
-
8
-
-
51349121612
-
Respectful cameras: Detecting visual markers in real-time to address privacy concerns
-
Nov
-
J. Schiff, M. Meingast, D. K. Mulligan, S. Sastry, and K. Goldberg, “Respectful cameras: Detecting visual markers in real-time to address privacy concerns,” in Proc. Int. Conf. on Intell. Robots Syst., Nov. 2007, pp. 971–978
-
(2007)
Proc. Int. Conf. on Intell. Robots Syst
, pp. 971-978
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.K.3
Sastry, S.4
Goldberg, K.5
-
9
-
-
38749126213
-
A full-body layered deformable model for automatic model-based gait recognition
-
article ID 261317
-
H. Lu, K. N. Plataniotis, and A. N. Venetsanopoulos, “A full-body layered deformable model for automatic model-based gait recognition,” EURASIP J. Adv. Signal Process., vol. 2008, 2008, article ID 261317
-
EURASIP J. Adv. Signal Process
, vol.2008
, Issue.2008
-
-
Lu, H.1
Plataniotis, K.N.2
Venetsanopoulos, A.N.3
-
10
-
-
51349146808
-
Robust human face hiding ensuring privacy
-
I. Martinez-Ponte, X. Desurmont, J. Meesen, and J.-F. Delaigle, “Robust human face hiding ensuring privacy,” in Proc. Int. Workshop on Image Analysis for Multimedia Interactive Services, 2005
-
(2005)
Proc. Int. Workshop on Image Analysis for Multimedia Interactive Services
-
-
Martinez-Ponte, I.1
Desurmont, X.2
Meesen, J.3
Delaigle, J.-F.4
-
11
-
-
20844455524
-
Enabling video privacy through computer vision
-
May Jun
-
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. F. Shu, and M. Lu, “Enabling video privacy through computer vision,” IEEE Security Privacy, vol. 3, no. 3, pp. 50–57, May-Jun. 2005
-
(2005)
IEEE Security Privacy
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.F.8
Lu, M.9
-
12
-
-
33749251117
-
Hiding privacy information in video surveillance system
-
W. Zhang, S. S. Cheung, and M. Chen, “Hiding privacy information in video surveillance system,” in Proc. IEEE Int. Conf. Image Process., 2005, vol. 3, pp. 868–871
-
(2005)
Proc. IEEE Int. Conf. Image Process
, vol.3
, pp. 868-871
-
-
Zhang, W.1
Cheung, S.S.2
Chen, M.3
-
13
-
-
33747369216
-
Privacy enabling technology for video surveillance
-
S. S. Agaian and S. A. Jassim, Eds., Proc. SPIE
-
F. Dufaux, M. Ouaret, Y. Abdeljaoued, A. Navarro, F. Vergnenegre, and T. Ebrahimi, “Privacy enabling technology for video surveillance,” in Image Processing for Military and Security Applications, S. S. Agaian and S. A. Jassim, Eds., 2006, vol. 6250, Proc. SPIE, pp. 1–12
-
(2006)
Image Processing for Military and Security Applications
, vol.6250
, pp. 1-12
-
-
Dufaux, F.1
Ouaret, M.2
Abdeljaoued, Y.3
Navarro, A.4
Vergnenegre, F.5
Ebrahimi, T.6
-
14
-
-
85008043646
-
ISO/IEC 15444-3:2007 Information Technology—JPEG 2000 Image Coding System: Motion JPEG 2000
-
ISO/IEC 15444-3:2007 Information Technology—JPEG 2000 Image Coding System: Motion JPEG 2000, JTC 1/SC 29/WG 1, ISO/IEC Std., 2007
-
(2007)
-
-
-
15
-
-
0036612847
-
A format-compliant configurable encryption framework for access control of video
-
Jun
-
J. Wen, M. Severa, W. Zeng, M. H. Luttrell, and W. Jin, “A format-compliant configurable encryption framework for access control of video,” IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, pp. 545–557, Jun. 2002
-
(2002)
IEEE Trans. Circuits Syst. Video Technol
, vol.12
, Issue.6
, pp. 545-557
-
-
Wen, J.1
Severa, M.2
Zeng, W.3
Luttrell, M.H.4
Jin, W.5
-
16
-
-
11244264715
-
An AV object oriented encryption algorithm for MPEG-4 streams
-
Jun
-
P. C. Wang and T.-W. Hou, “An AV object oriented encryption algorithm for MPEG-4 streams,” in Proc. Int. Conf. on Multimedia and Expo, Jun. 2004, pp. 971–974
-
(2004)
Proc. Int. Conf. on Multimedia and Expo
, pp. 971-974
-
-
Wang, P.C.1
Hou, T.-W.2
-
17
-
-
0035447361
-
3-D wavelet coding of video with arbitrary regions of support
-
Sep
-
G. Minami, Z. Xiong, A. Wang, and S. Mehrotra, “3-D wavelet coding of video with arbitrary regions of support,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 9, pp. 1063–1068, Sep. 2001
-
(2001)
IEEE Trans. Circuits Syst. Video Technol
, vol.11
, Issue.9
, pp. 1063-1068
-
-
Minami, G.1
Xiong, Z.2
Wang, A.3
Mehrotra, S.4
-
18
-
-
17444411549
-
Efficient encryption of wavelet-based coded color images
-
K. Martin, R. Lukac, and K. N. Plataniotis, “Efficient encryption of wavelet-based coded color images,” Pattern Recognition, vol. 38, no. 7, pp. 1111-1115,2005
-
(2005)
Pattern Recognition
, vol.38
, Issue.7
, pp. 1111-1115
-
-
Martin, K.1
Lukac, R.2
Plataniotis, K.N.3
-
19
-
-
85008040713
-
Information Technology—Coding of Audio-Visual Objects—MPEG-4 Part 11: Scene Description and Application Engine (14496–11)
-
ISO/IEC JTC1/SC29 WG11 International Standard
-
Information Technology—Coding of Audio-Visual Objects—MPEG-4 Part 11: Scene Description and Application Engine (14496–11), ISO/IEC JTC1/SC29 WG11 International Standard, 2005
-
(2005)
-
-
-
20
-
-
0037305040
-
Embedded color image coding using SPIHT with partially linked spatial orientation trees
-
Feb
-
A. A. Kassim and W. S. Lee, “Embedded color image coding using SPIHT with partially linked spatial orientation trees,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 2, pp. 203–206, Feb. 2003
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, Issue.2
, pp. 203-206
-
-
Kassim, A.A.1
Lee, W.S.2
-
21
-
-
0034249821
-
Partial encryption of compressed images and videos
-
Aug
-
H. Cheng and X. Li, “Partial encryption of compressed images and videos,” IEEE Trans. Signal Process., vol. 48, no. 8, pp. 2439–2451, Aug. 2000
-
(2000)
IEEE Trans. Signal Process
, vol.48
, Issue.8
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.2
-
22
-
-
0026852080
-
Image coding using wavelet transform
-
Apr
-
M. Antonini, M. Barlaud, P. Mathieu, and I. Daubechies, “Image coding using wavelet transform,” IEEE Trans. Image Process., vol. 1, pp. 205–220, Apr. 1992
-
(1992)
IEEE Trans. Image Process
, vol.1
, pp. 205-220
-
-
Antonini, M.1
Barlaud, M.2
Mathieu, P.3
Daubechies, I.4
-
23
-
-
0346560983
-
Wavelet transforms that map integers to integers
-
R. Calderbank, I. Daubechies, W. Sweldens, and B.-L. Yeo, “Wavelet transforms that map integers to integers,” Appl. Comput. Harmon. Anal., vol. 5, no. 3, pp. 322–369, 1998
-
(1998)
Appl. Comput. Harmon. Anal
, vol.5
, Issue.3
, pp. 322-369
-
-
Calderbank, R.1
Daubechies, I.2
Sweldens, W.3
Yeo, B.-L.4
-
24
-
-
84875973205
-
Ecrypt Stream Cipher Project: HC-128 European Network of Excellence for Cryptology
-
[Online]. Available:
-
Ecrypt Stream Cipher Project: HC-128 European Network of Excellence for Cryptology [Online]. Available: http://www.ecrypt.eu.org/stream/hcp3.html
-
-
-
|