A new encryption scheme for surveillance videos
暂无分享,去创建一个
Dongdai Lin | Xiaochun Cao | Xiaojie Guo | Ling Du | Meili Ma | Xiaochun Cao | Xiaojie Guo | D. Lin | Ling Du | Xiaochun Cao | Meili Ma
[1] Dacheng Tao,et al. GoDec: Randomized Lowrank & Sparse Matrix Decomposition in Noisy Case , 2011, ICML.
[2] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[3] Xiaochun Cao,et al. Motion matters: a novel framework for compressing surveillance videos , 2013, ACM Multimedia.
[4] Yi Ma,et al. Robust principal component analysis? , 2009, JACM.
[5] Henry Ker-Chang Chang,et al. A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..
[6] Wenjun Zeng,et al. A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..
[7] Heejo Lee,et al. SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[8] Steve McLaughlin,et al. Comparative study of textural analysis techniques to characterise tissue from intravascular ultrasound , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[9] Josef Scharinger. Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.
[10] Lintian Qiao,et al. A New Algorithm for MPEG Video Encryption , 2007 .
[11] Yi Ma,et al. The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices , 2010, Journal of structural biology.
[12] Anuja Kumar Acharya,et al. Image encryption using a new chaos based encryption algorithm , 2011, ICCCS '11.
[13] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[14] Yuliang Zheng,et al. Communication protection in IP-based video surveillance systems , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[15] Zhengjun Liu,et al. Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.
[16] Takeo Kanade,et al. Introduction to the Special Section on Video Surveillance , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[17] Wu-chi Feng,et al. Lightweight security mechanisms for wireless video transmission , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[18] Dominique Barchiesi,et al. A new image encryption scheme based on a chaotic function , 2012, Signal Process. Image Commun..
[19] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[20] Bernhard Rinner,et al. Distributed embedded smart cameras for surveillance applications , 2006, Computer.
[21] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[22] G. Sapiro,et al. A collaborative framework for 3D alignment and classification of heterogeneous subvolumes in cryo-electron tomography. , 2013, Journal of structural biology.
[23] Peter A. Flach,et al. Proceedings of the 28th International Conference on Machine Learning , 2011 .
[24] R. Cucchiara. Multimedia surveillance systems , 2005, VSSN@MM.
[25] Bharat K. Bhargava,et al. MPEG Video Encryption Algorithms , 2004, Multimedia Tools and Applications.
[26] Chin-Chen Chang,et al. A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..
[27] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[28] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[29] Stefanos D. Kollias,et al. Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant S-boxes , 2005, IEEE International Conference on Image Processing 2005.
[30] Xinhua Zhuang,et al. Network friendly media security: rationales, solutions, and open issues , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[31] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[32] Klara Nahrstedt,et al. Comparison of MPEG encryption algorithms , 1998, Comput. Graph..
[33] Xue Li,et al. Motion vector encryption in multimedia streaming , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..
[34] Gérard G. Medioni,et al. Detecting and tracking moving objects for video surveillance , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).
[35] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[36] Lily Lee,et al. Monitoring Activities from Multiple Video Streams: Establishing a Common Coordinate Frame , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[37] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .