An efficient privacy protection scheme for data security in video surveillance
暂无分享,去创建一个
Xinpeng Zhang | Huazhu Fu | Wei Zhang | Wenqi Ren | Ling Du | Xinpeng Zhang | H. Fu | Wenqi Ren | Wei Zhang | Ling Du
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Bernhard Rinner,et al. Privacy protection vs. utility in visual data , 2016, Multimedia Tools and Applications.
[3] King Ngi Ngan,et al. FaceSeg: Automatic Face Segmentation for Real-Time Video , 2009, IEEE Transactions on Multimedia.
[4] Fei Peng,et al. An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.
[5] Xiaowei Zhou,et al. Moving Object Detection by Detecting Contiguous Outliers in the Low-Rank Representation , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[7] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[8] David Suter,et al. A Novel Robust Statistical Method for Background Initialization and Visual Surveillance , 2006, ACCV.
[9] Jean-Luc Dugelay,et al. Privacy protecting, intelligibility preserving video surveillance , 2016, 2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[10] Jitendra Malik,et al. Object Segmentation by Long Term Analysis of Point Trajectories , 2010, ECCV.
[11] Jianping Fan,et al. iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , 2017, IEEE Transactions on Information Forensics and Security.
[12] Nuno Vasconcelos,et al. Layered Dynamic Textures , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] K. Plataniotis,et al. Privacy Protected Surveillance Using Secure Visual Object Coding , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[14] Feng Li,et al. A Coprime Blur Scheme for Data Security in Video Surveillance , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Maurício Pamplona Segundo,et al. Automatic Face Segmentation and Facial Landmark Detection in Range Images , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[16] Bernhard Rinner,et al. User-centric privacy awareness in video surveillance , 2011, Multimedia Systems.
[17] Touradj Ebrahimi,et al. Using warping for privacy protection in video surveillance , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[18] Mourad Ouaret,et al. Privacy enabling technology for video surveillance , 2006, SPIE Defense + Commercial Sensing.
[19] Sebastian Nowozin,et al. Discriminative Non-blind Deblurring , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[20] David A. McAllester,et al. Object Detection with Discriminatively Trained Part Based Models , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] K. Srinathan,et al. Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[22] Changda Wang,et al. A Lightweight Encryption Method for Privacy Protection in Surveillance Videos , 2018, IEEE Access.
[23] D. Marpe,et al. Video coding with H.264/AVC: tools, performance, and complexity , 2004, IEEE Circuits and Systems Magazine.
[24] Yuhang Li,et al. Privacy preserving for human object in video surveillance via visual cryptography , 2014, Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).
[25] Rob Fergus,et al. Blind deconvolution using a normalized sparsity measure , 2011, CVPR 2011.
[26] Peter Schartner,et al. Video Surveillance: A Distributed Approach to Protect Privacy , 2005, Communications and Multimedia Security.
[27] Tomi Räty,et al. Survey on Contemporary Remote Surveillance Systems for Public Safety , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[28] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[29] Rong Yan,et al. Tools for Protecting the Privacy of Specific Individuals in Video , 2007, EURASIP J. Adv. Signal Process..
[30] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[31] Qi Tian,et al. Statistical modeling of complex backgrounds for foreground object detection , 2004, IEEE Transactions on Image Processing.
[32] Hai Jin,et al. Fully Reversible Privacy Region Protection for Cloud Video Surveillance , 2017, IEEE Transactions on Cloud Computing.
[33] Jian-Feng Cai,et al. Framelet-Based Blind Motion Deblurring From a Single Image , 2012, IEEE Transactions on Image Processing.
[34] Bernhard Rinner,et al. Multi-Level Cartooning for Context-Aware Privacy Protection in Visual Sensor Networks , 2014, MediaEval.
[35] Minghua Chen,et al. Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.
[36] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[37] Hao Chen,et al. Camera-Recognizable and Human-Invisible Labelling for Privacy Protection , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).
[38] Junliang Chen,et al. Personal Privacy Protection Framework Based on Hidden Technology for Smartphones , 2017, IEEE Access.
[39] Bernhard Rinner,et al. TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.
[40] Xiao Zeng,et al. Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.
[41] Mark S. Nixon,et al. Soft biometrics for subject identification using clothing attributes , 2014, IEEE International Joint Conference on Biometrics.
[42] Hai Jin,et al. Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos , 2016, IEEE Transactions on Emerging Topics in Computing.
[43] Raphael Sznitman,et al. Active Testing for Face Detection and Localization , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[44] Liang-Tien Chia,et al. Stratification-Based Keyframe Cliques for Effective and Efficient Video Representation , 2011, IEEE Transactions on Multimedia.
[45] B. Prabhakaran,et al. Blind robust watermarking of 3d motion data , 2010, TOMCCAP.
[46] Arif Ghafoor,et al. A Framework for Composition and Enforcement of Privacy-Aware and Context-Driven Authorization Mechanism for Multimedia Big Data , 2015, IEEE Transactions on Multimedia.
[47] Sylvain Paris,et al. Handling Noise in Single Image Deblurring Using Directional Filters , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[48] P. J. Narayanan,et al. Person De-Identification in Videos , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[49] Mubarak Shah,et al. View-Invariant Representation and Recognition of Actions , 2002, International Journal of Computer Vision.
[50] Robert T. Collins,et al. Silhouette-based human identification from body shape and gait , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.