Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective
暂无分享,去创建一个
Martin Fleury | Yuansong Qiao | Brian Lee | Mamoona N. Asghar | Nadia Kanwal | Marco Herbst | M. Fleury | Yuansong Qiao | Brian A. Lee | M. Asghar | N. Kanwal | Marco Herbst
[1] Damian George,et al. GDPR bypass by design? Transient processing of data under the GDPR , 2019 .
[2] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[3] A. Cavallaro. Privacy in Video Surveillance , 2007 .
[4] R. Buyya,et al. Object Oriented Programming with Java : Essentials and Applications , 2009 .
[5] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[6] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[7] Alexandros André Chaaraoui,et al. Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..
[8] Sophie Stalla-Bourdillon,et al. Anonymous Data v. Personal Data — A False Debate: An EU Perspective on Anonymization, Pseudonymization and Personal Data , 2017 .
[9] Christian Damsgaard Jensen,et al. Video Surveillance: Privacy Issues and Legal Compliance , 2015 .
[10] Ali Farhadi,et al. You Only Look Once: Unified, Real-Time Object Detection , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Mingda Liu,et al. VideoChain: Trusted Video Surveillance Based on Blockchain for Campus , 2018, ICCCS.
[12] M. Nixon,et al. People Detection and Recognition using Gait for Automated Visual Surveillance , 2006 .
[13] Anna Romanou,et al. The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..
[14] Robert P. Loce,et al. Video redaction: a survey and comparison of enabling technologies , 2017, J. Electronic Imaging.
[15] Martin Fleury,et al. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes , 2017, J. Vis. Commun. Image Represent..
[16] Jouni Markkula,et al. EU General Data Protection Regulation: Changes and implications for personal data collecting companies , 2017, Comput. Law Secur. Rev..
[17] Frederic Dufaux,et al. Video scrambling for privacy protection in video surveillance: recent results and validation framework , 2011, Defense + Commercial Sensing.
[18] Jiwen Lu,et al. Deep Video Hashing , 2017, IEEE Transactions on Multimedia.
[19] Touradj Ebrahimi,et al. A Reliable and Reversible Image Privacy Protection Based on False Colors , 2018, IEEE Transactions on Multimedia.
[20] Fuqiang Zhou,et al. FSSD: Feature Fusion Single Shot Multibox Detector , 2017, ArXiv.
[21] IV CyrilHöschl,et al. Recognition of Images Degraded by Gaussian Blur , 2015, CAIP.
[22] Marc Alexa,et al. Pixelated image abstraction with integrated user constraints , 2013, Comput. Graph..
[23] Andrei Popov,et al. Prohibiting RC4 Cipher Suites , 2015, RFC.
[24] Gregory Epiphaniou,et al. Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger , 2019, Blockchain and Clinical Trial.
[25] Pawan Sinha,et al. Recognizing Facial Slivers , 2018, Journal of Cognitive Neuroscience.
[26] Noboru Babaguchi,et al. PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction , 2008, MMM.
[27] Paolo Tasca,et al. Blockchain Technologies: The Foreseeable Impact on Society and Industry , 2017, Computer.
[28] Andreas Uhl,et al. Identifying deficits of visual security metrics for images , 2016, Signal Process. Image Commun..
[29] Mohammed Ghanbari,et al. Confidentiality of a selectively encrypted H.264 coded video bit-stream , 2014, J. Vis. Commun. Image Represent..
[30] Pawan Sinha,et al. Face Recognition by Humans: Nineteen Results All Computer Vision Researchers Should Know About , 2006, Proceedings of the IEEE.
[31] Bernhard Rinner,et al. Adaptive cartooning for privacy protection in camera networks , 2014, 2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[32] Keiichi Iwamura,et al. Mosaic-based privacy-protection with reversible watermarking , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).
[33] Steven M. Bellovin,et al. Guidelines for Cryptographic Key Management , 2005, RFC.
[34] Harald Vranken,et al. Sustainability of bitcoin and blockchains , 2017 .
[35] Gora Chand Nandi,et al. Human Gait State Prediction Using Cellular Automata and Classification Using ELM , 2018, Advances in Intelligent Systems and Computing.
[36] Sharath Pankanti,et al. Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.
[37] Liesbet van Zoonen,et al. Privacy concerns in smart cities , 2016, Gov. Inf. Q..
[38] Martin Fleury,et al. Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics , 2019, Sensors.
[39] Mark Elliot,et al. Are 'pseudonymised' data always personal data? Implications of the GDPR for administrative data research in the UK , 2018, Comput. Law Secur. Rev..
[40] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.