Privacy preserving optics for miniature vision sensors
暂无分享,去创建一个
[1] Esther Rodriguez-Villegas,et al. Compressive sensing: From “Compressing while Sampling” to “Compressing and Securing while Sampling” , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[2] M. Mrityunjay,et al. The De-Identification Camera , 2011, 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics.
[3] Richard G. Baraniuk,et al. A new compressive imaging camera architecture using optical-domain compression , 2006, Electronic Imaging.
[4] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[5] Wayne H. Wolf,et al. Smart Cameras as Embedded Systems , 2002, Computer.
[6] Stan Sclaroff,et al. Automated camera layout to satisfy task-specific and floor plan-specific coverage requirements , 2006, Comput. Vis. Image Underst..
[7] LiFeng,et al. A Coprime Blur Scheme for Data Security in Video Surveillance , 2013 .
[8] W.B. Heinzelman,et al. On the coverage problem in video-based wireless sensor networks , 2005, 2nd International Conference on Broadband Networks, 2005..
[9] Naveen Verma,et al. Micropower wireless sensors , 2006 .
[10] HadidAbdenour,et al. Facial Deblur Inference Using Subspace Analysis for Recognition of Blurred Faces , 2011 .
[11] Shree K. Nayar,et al. Lensless Imaging with a Controllable Aperture , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[12] Sharmeen Browarek. High resolution, low cost, privacy preserving human motion tracking system via passive thermal sensing , 2010 .
[13] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[14] Touradj Ebrahimi,et al. Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[15] Changhuei Yang,et al. Physical key-protected one-time pad , 2013, Scientific Reports.
[16] A. Wilhelm,et al. Evaluation of a micro fuel cell as applied to a mobile robot , 2005, IEEE International Conference Mechatronics and Automation, 2005.
[17] Masashi Nishiyama,et al. Facial deblur inference to improve recognition of blurred faces , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[18] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[19] Markus Dürmuth,et al. Achieving Anonymity against Major Face Recognition Algorithms , 2013, Communications and Multimedia Security.
[20] R.S. Fearing,et al. Dynamometer Power Output Measurements of Miniature Piezoelectric Actuators , 2009, IEEE/ASME Transactions on Mechatronics.
[21] Frédo Durand,et al. Image and depth from a conventional camera with a coded aperture , 2007, SIGGRAPH 2007.
[22] Kenro Miyamoto,et al. Fish Eye Lens , 1964 .
[23] Giuseppe Valenzise,et al. Privacy-Enabled Object Tracking in Video Sequences Using Compressive Sensing , 2009, 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance.
[24] P. J. Narayanan,et al. Person De-Identification in Videos , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[25] J. Goodman. Introduction to Fourier optics , 1969 .
[26] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[27] Jian Sun,et al. Face Alignment by Explicit Shape Regression , 2012, International Journal of Computer Vision.
[28] Naveen Verma,et al. Design considerations for ultra-low energy wireless microsensor nodes , 2005, IEEE Transactions on Computers.
[29] Matthew O'Toole,et al. Primal-dual coding to probe light transport , 2012, ACM Trans. Graph..
[30] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[31] Shree K. Nayar,et al. Caustics of catadioptric cameras , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.
[32] Ramesh Raskar,et al. Coded exposure photography: motion deblurring using fluttered shutter , 2006, SIGGRAPH 2006.
[33] Shree K. Nayar,et al. Programmable Imaging: Towards a Flexible Camera , 2006, International Journal of Computer Vision.
[34] Lei Zhang,et al. Image Deblurring and Super-Resolution by Adaptive Sparse Domain Selection and Adaptive Regularization , 2010, IEEE Transactions on Image Processing.
[35] Alanson P. Sample,et al. Design of an RFID-Based Battery-Free Programmable Sensing Platform , 2008, IEEE Transactions on Instrumentation and Measurement.
[36] Paolo Fiorini,et al. Human++: autonomous wireless sensors for body area networks , 2005, Proceedings of the IEEE 2005 Custom Integrated Circuits Conference, 2005..
[37] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[38] Martin J. Wainwright,et al. Privacy Aware Learning , 2012, JACM.
[39] Shree K. Nayar,et al. Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.
[40] Hyeonjoon Moon,et al. The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[41] Takeo Kanade,et al. Computational sensor for visual tracking with attention , 1998, IEEE J. Solid State Circuits.
[42] M. Amaç Güvensan,et al. On coverage issues in directional sensor networks: A survey , 2011, Ad Hoc Networks.
[43] Harald Dyckhoff,et al. A typology of cutting and packing problems , 1990 .
[44] Feng Li,et al. A Coprime Blur Scheme for Data Security in Video Surveillance , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[45] Marc Levoy,et al. High performance imaging using large camera arrays , 2005, SIGGRAPH 2005.
[46] Yuning Jiang,et al. Learning Deep Face Representation , 2014, ArXiv.
[47] Carman Neustaedter,et al. Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.
[48] Paolo Toth,et al. Knapsack Problems: Algorithms and Computer Implementations , 1990 .
[49] Larry A. Wasserman,et al. Compressed and Privacy-Sensitive Sparse Regression , 2009, IEEE Transactions on Information Theory.
[50] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[51] Michael Elad,et al. Fast and robust multiframe super resolution , 2004, IEEE Transactions on Image Processing.
[52] Richard E. Korf,et al. Optimal rectangle packing , 2010, Ann. Oper. Res..
[53] Feng Li,et al. A theory of Coprime Blurred Pairs , 2011, 2011 International Conference on Computer Vision.
[54] Bernhard Rinner,et al. TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.
[55] Ting Sun,et al. Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..
[56] Ankur Chattopadhyay,et al. PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[57] Ralph Gross,et al. Semi-supervised learning of multi-factor models for face de-identification , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[58] Geoffrey L. Barrows,et al. Wide-angle micro sensors for vision on a tight budget , 2011, CVPR 2011.
[59] Tony Lindeberg,et al. Scale-Space Theory in Computer Vision , 1993, Lecture Notes in Computer Science.
[60] Thomas S. Huang,et al. Close the loop: Joint blind image restoration and recognition with sparse representation prior , 2011, 2011 International Conference on Computer Vision.
[61] R. Fergus,et al. Random Lens Imaging , 2006 .
[62] Richard G. Baraniuk,et al. An Architecture for Compressive Imaging , 2006, 2006 International Conference on Image Processing.
[63] Francis T. S. Yu,et al. Optical Pattern Recognition , 2008 .
[64] Shree K. Nayar,et al. Catadioptric Stereo Using Planar Mirrors , 2001, International Journal of Computer Vision.
[65] Hyunsung Park,et al. Toward Wide-Angle Microvision Sensors , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[66] Richard G. Baraniuk,et al. The smashed filter for compressive classification and target recognition , 2007, Electronic Imaging.
[67] Andrew Blake,et al. Motion Deblurring and Super-resolution from an Image Sequence , 1996, ECCV.
[68] Ren Ng. Fourier Slice Photography , 2005 .
[69] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[70] Edoardo M. Airoldi,et al. Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.
[71] Ming-Hsuan Yang,et al. Deblurring Face Images with Exemplars , 2014, ECCV.
[72] Grigorios Loukides,et al. Data utility and privacy protection trade-off in k-anonymisation , 2008, PAIS '08.
[73] Simon Haykin,et al. GradientBased Learning Applied to Document Recognition , 2001 .
[74] Seiichi Serikawa,et al. Development of privacy-preserving sensor for person detection , 2010 .
[75] MOHIT GUPTA,et al. Phasor Imaging , 2015, ACM Trans. Graph..
[76] Masashi Nishiyama,et al. Facial Deblur Inference Using Subspace Analysis for Recognition of Blurred Faces , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[77] Leonidas J. Guibas,et al. Optimal Placement and Selection of Camera Network Nodes for Target Localization , 2006, DCOSS.