Visual privacy protection methods: A survey
暂无分享,去创建一个
Alexandros André Chaaraoui | Francisco Flórez-Revuelta | José Ramón Padilla-López | Francisco Flórez-Revuelta | A. Chaaraoui
[1] Juan Carlos Augusto,et al. Ambient Intelligence and Smart Environments: A State of the Art , 2010, Handbook of Ambient Intelligence and Smart Environments.
[2] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[3] Henry A. Kautz,et al. Privacy-Preserving Recognition of Activities in Daily Living from Multi-view Silhouettes and RFID-based Training , 2008, AAAI Fall Symposium: AI in Eldercare: New Solutions to Old Problems.
[4] John Stasko,et al. The Awareness-Privacy Tradeoff in Video Supported Informal Awareness: A Study of Image-Filtering Based Techniques , 1998 .
[5] Yingli Tian,et al. Privacy Preserving Automatic Fall Detection for Elderly Using RGBD Cameras , 2012, ICCHP.
[6] Mourad Ouaret,et al. Privacy enabling technology for video surveillance , 2006, SPIE Defense + Commercial Sensing.
[7] Jean-Michel Morel,et al. Level lines based disocclusion , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[8] Rong Yan,et al. Protecting Personal Identification in Video , 2009, Protecting Privacy in Video Surveillance.
[9] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[10] Chin-Hsing Chen,et al. A vision-based regression model to evaluate Parkinsonian gait from monocular image sequences , 2012, Expert Syst. Appl..
[11] Z. Zivkovic. Improved adaptive Gaussian mixture model for background subtraction , 2004, ICPR 2004.
[12] Jessica K. Hodgins,et al. Perception of Human Motion With Different Geometric Models , 1998, IEEE Trans. Vis. Comput. Graph..
[13] Lintian Qiao,et al. A New Algorithm for MPEG Video Encryption , 2007 .
[14] Iskender Agi,et al. An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[15] Madhusudana V. S. Shashanka,et al. A Privacy Preserving Framework for Gaussian Mixture Models , 2010, 2010 IEEE International Conference on Data Mining Workshops.
[16] Norihiro Hagita,et al. Stealth vision for protecting privacy , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[17] Jovan Popovic,et al. Automatic rigging and animation of 3D characters , 2007, ACM Trans. Graph..
[18] Sharath Pankanti,et al. Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.
[19] Toshihisa Tanaka,et al. A new concept of real-time security camera monitoring with privacy protection by masking moving objects , 2006, Electronic Imaging.
[20] Yin Chen,et al. Fast capture of personalized avatar using two Kinects , 2014 .
[21] Jian Zhao,et al. Protecting and Managing Privacy Information in Video Surveillance Systems , 2009, Protecting Privacy in Video Surveillance.
[22] Mohan S. Kankanhalli,et al. W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video , 2012, Multimedia Tools and Applications.
[23] N. Bourbakis,et al. Data-image-video encryption , 2004, IEEE Potentials.
[24] Hitoshi Kiya,et al. One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images , 2009, EURASIP J. Inf. Secur..
[25] Guillermo Sapiro,et al. Image inpainting , 2000, SIGGRAPH.
[26] Yasuyuki Matsushita,et al. Video Completion by Motion Field Transfer , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[27] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[28] Touradj Ebrahimi,et al. PEViD: privacy evaluation video dataset , 2013, Optics & Photonics - Optical Engineering + Applications.
[29] Tomoji Toriyama,et al. Factors on the sense of privacy in video surveillance , 2006, CARPE '06.
[30] Bernhard Rinner,et al. Security and Privacy Protection in Visual Sensor Networks , 2014, ACM Comput. Surv..
[31] D. L. Donoho,et al. Compressed sensing , 2006, IEEE Trans. Inf. Theory.
[32] Habibollah Haron,et al. Computer Generated Caricature: A Survey , 2010, 2010 International Conference on Cyberworlds.
[33] Timothy F. Cootes,et al. Active Appearance Models , 1998, ECCV.
[34] Chris J. Mitchell,et al. Improving the Security of CardSpace , 2009, EURASIP J. Inf. Secur..
[35] Noboru Babaguchi,et al. Privacy Preserving: Hiding a Face in a Face , 2007, ACCV.
[36] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[37] Edoardo M. Airoldi,et al. Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.
[38] Eli Shechtman,et al. Space-Time Completion of Video , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[39] Shanshan Li,et al. Image scrambling based on chaotic sequences and Veginère cipher , 2013, Multimedia Tools and Applications.
[40] Kah Phooi Seng,et al. Privacy preserving stereoscopic vision with One-Bit transform , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[41] Liu Xiangdong,et al. Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation , 2008 .
[42] Yongdong Zhang,et al. Compressive sensing based video scrambling for privacy protection , 2011, 2011 Visual Communications and Image Processing (VCIP).
[43] Yong Rui,et al. Light Weight Background Blurring for Video Conferencing Applications , 2006, 2006 International Conference on Image Processing.
[44] Honghai Liu,et al. GMM-QNT hybrid framework for vision-based human motion analysis , 2009, 2009 IEEE International Conference on Fuzzy Systems.
[45] Michael J. Lyons,et al. Avatar creation using automatic face processing , 1998, MULTIMEDIA '98.
[46] Wei Su,et al. Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[47] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[48] Sen-Ching S. Cheung,et al. Joint optimization of data hiding and video compression , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[49] Wesley De Neve,et al. Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[50] Fabien Cardinaux,et al. Video based technology for ambient assisted living: A review of the literature , 2011, J. Ambient Intell. Smart Environ..
[51] Håkan Johansson,et al. An Approach for Synthesis of Modulated-Channel FIR Filter Banks Utilizing the Frequency-Response Masking Technique , 2006, EURASIP J. Adv. Signal Process..
[52] Tony F. Chan,et al. Total Variation Wavelet Inpainting , 2006, Journal of Mathematical Imaging and Vision.
[53] Craig A. Knoblock,et al. A Survey of Digital Map Processing Techniques , 2014, ACM Comput. Surv..
[54] Mubarak Shah,et al. Motion Layer Based Object Removal in Videos , 2005, 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1.
[55] Carman Neustaedter,et al. The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness , 2003, UbiComp.
[56] Andrew Zisserman,et al. Get Out of my Picture! Internet-based Inpainting , 2009, BMVC.
[57] Tracy Bradley Maples,et al. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[58] K. Srinathan,et al. Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[59] Andrew A. Adams,et al. The future of video analytics for surveillance and its ethical implications , 2015 .
[60] Mohsen Soryani,et al. Contour-Based Video Inpainting , 2011, 2011 7th Iranian Conference on Machine Vision and Image Processing.
[61] Alexei A. Efros,et al. Image quilting for texture synthesis and transfer , 2001, SIGGRAPH.
[62] Carman Neustaedter,et al. Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.
[63] Faisal Z. Qureshi,et al. Negotiating Privacy Preferences in Video Surveillance Systems , 2011, IEA/AIE.
[64] V. Kshirsagar,et al. Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.
[65] Bernhard Rinner,et al. Securing Embedded Smart Cameras with Trusted Computing , 2011, EURASIP J. Wirel. Commun. Netw..
[66] Sergio A. Velastin,et al. How close are we to solving the problem of automated visual surveillance? , 2008, Machine Vision and Applications.
[67] Andrew Hogue,et al. Automated avatar creation for 3D games , 2007, Future Play.
[68] K. J. Miller,et al. Smart-Home Technologies to Assist Older People to Live Well at Home , 2013 .
[69] Anil C. Kokaram,et al. Interpolation of missing data in image sequences , 1995, IEEE Trans. Image Process..
[70] Allen R. Hanson,et al. Distributed Smart Cameras for Aging in Place , 2006 .
[71] Yong Man Ro,et al. Privacy-Preserving Watch List Screening in Video Surveillance System , 2010, PCM.
[72] Sharath Pankanti,et al. Privacy Protection and Face Recognition , 2011, Handbook of Face Recognition.
[73] Alexandros André Chaaraoui,et al. A review on vision techniques applied to Human Behaviour Analysis for Ambient-Assisted Living , 2012, Expert Syst. Appl..
[74] Noboru Babaguchi,et al. Recoverable Privacy Protection for Video Content Distribution , 2009, EURASIP J. Inf. Secur..
[75] Stuart S. Shapiro,et al. Privacy by design , 2010, Commun. ACM.
[76] Adão Silva,et al. Power allocation strategies for distributed precoded multicell based systems , 2011, EURASIP J. Wirel. Commun. Netw..
[77] Tal Malkin,et al. Oblivious Image Matching , 2009, Protecting Privacy in Video Surveillance.
[78] Shin-ichi Hanaki,et al. Privacy protection by concealing persons in circumstantial video image , 2001, PUI '01.
[79] Tobias Elbrandt,et al. Altcare: Safe living for elderly people , 2010, 2010 4th International Conference on Pervasive Computing Technologies for Healthcare.
[80] Sharath Pankanti,et al. Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .
[81] Anu Rachel Abraham,et al. A Survey on Video Inpainting , 2012 .
[82] Lei Tang,et al. Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.
[83] Minghua Chen,et al. Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.
[84] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[85] Yuan Lin,et al. Face Swapping under Large Pose Variations: A 3D Model Based Approach , 2012, 2012 IEEE International Conference on Multimedia and Expo.
[86] Roland Göcke,et al. Linear Facial Expression Transfer with Active Appearance Models , 2010, 2010 20th International Conference on Pattern Recognition.
[87] Ralph Gross,et al. Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[88] Khai N. Truong,et al. Selective Archiving: A Model for Privacy Sensitive Capture and Access Technologies , 2009, Protecting Privacy in Video Surveillance.
[89] Guillermo Sapiro,et al. Video Inpainting Under Constrained Camera Motion , 2007, IEEE Transactions on Image Processing.
[90] Ankur Chattopadhyay,et al. PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[91] K. Srinathan,et al. Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[92] Patrick Pérez,et al. Object removal by exemplar-based inpainting , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[93] Andrew Nealen,et al. RigMesh: automatic rigging for part-based shape modeling and deformation , 2012, ACM Trans. Graph..
[94] Alexandros André Chaaraoui,et al. An Efficient Approach for Multi-view Human Action Recognition Based on Bag-of-Key-Poses , 2012, HBU.
[95] T.E. Boult,et al. PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).
[96] Sarp Ertürk. Multiplication-Free One-Bit Transform for Low-Complexity Block-Based Motion Estimation , 2007, IEEE Signal Processing Letters.
[97] M. Bleyer,et al. Object Removal by Depth-guided Inpainting ∗ , 2011 .
[98] Touradj Ebrahimi,et al. H.264/AVC video scrambling for privacy protection , 2008, 2008 15th IEEE International Conference on Image Processing.
[99] Xosé Antón Vila-Sobrino,et al. Eigenspace-based fall detection and activity recognition from motion templates and machine learning , 2012, Expert Syst. Appl..
[100] Rong Yan,et al. Tools for Protecting the Privacy of Specific Individuals in Video , 2007, EURASIP J. Adv. Signal Process..
[101] Diane J. Cook,et al. Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .
[102] Shai Avidan,et al. Blind Vision , 2006, ECCV.
[103] Vicki Bruce,et al. Evaluating the effectiveness of pixelation and blurring on masking the identity of familiar faces , 2001 .
[104] Hari Kalva,et al. Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..
[105] Marjorie Skubic,et al. Older adults' privacy considerations for vision based recognition methods of eldercare applications. , 2009, Technology and health care : official journal of the European Society for Engineering and Medicine.
[106] Frederic Dufaux,et al. Video scrambling for privacy protection in video surveillance: recent results and validation framework , 2011, Defense + Commercial Sensing.
[107] Sung Yong Shin,et al. On pixel-based texture synthesis by non-parametric sampling , 2006, Comput. Graph..
[108] Jian Zhao,et al. Efficient Object-Based Video Inpainting , 2006, 2006 International Conference on Image Processing.
[109] G. Johansson. Visual perception of biological motion and a model for its analysis , 1973 .
[110] Sen-Ching S. Cheung,et al. Managing privacy data in pervasive camera networks , 2008, 2008 15th IEEE International Conference on Image Processing.
[111] Serge Gutwirth,et al. European Data Protection: In Good Health? , 2012, European Data Protection.
[112] Noboru Babaguchi,et al. Psychological Study for Designing Privacy Protected Video Surveillance System: PriSurv , 2009, Protecting Privacy in Video Surveillance.
[113] Bernhard Rinner,et al. TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.
[114] Oliver Grau,et al. How Not to Be Seen — Object Removal from Videos of Crowded Scenes , 2012, Comput. Graph. Forum.
[115] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[116] Mohsen Soryani,et al. Exemplar-based video inpainting with large patches , 2010, Journal of Zhejiang University SCIENCE C.
[117] Noboru Babaguchi,et al. PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction , 2008, MMM.
[118] Touradj Ebrahimi,et al. Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[119] Bryan S. Morse,et al. Isophote-based interpolation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[120] P. J. Narayanan,et al. Person De-Identification in Videos , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[121] Wolfgang Straßer,et al. Smart Camera Based Monitoring System and Its Application to Assisted Living , 2008, Proceedings of the IEEE.
[122] Shree K. Nayar,et al. Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.
[123] Ralph Gross,et al. Face De-identification , 2009, Protecting Privacy in Video Surveillance.
[124] Touradj Ebrahimi,et al. Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[125] Isabel Martinez-Ponte,et al. ROBUST HUMAN FACE HIDING ENSURING PRIVACY , 2004 .
[126] Andrea O'Brien,et al. Survey of Assistive Technology Devices and Applications for Aging in Place , 2009, 2009 Second International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services.
[127] K. Srinathan,et al. Fast and Secure Real-Time Video Encryption , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[128] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[129] Deirdre K. Mulligan,et al. Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[130] Sen-Ching S. Cheung,et al. Video Data Hiding for Managing Privacy Information in Surveillance Systems , 2009, EURASIP J. Inf. Secur..
[131] Touradj Ebrahimi,et al. A framework for the validation of privacy protection solutions in video surveillance , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[132] Patrick Pérez,et al. Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.
[133] Lisa M. Brown,et al. IBM smart surveillance system (S3): event based video surveillance system with an open and extensible framework , 2008, Machine Vision and Applications.
[134] F. Petngang,et al. Security and privacy protection for automated video surveillance , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.
[135] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[136] Faisal Z. Qureshi,et al. Object-Video Streams for Preserving Privacy in Video Surveillance , 2009, 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance.
[137] Mohan Trivedi,et al. The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.
[138] Gary J. Sullivan,et al. HD Photo: a new image coding technology for digital photography , 2007, SPIE Optical Engineering + Applications.
[139] Prasant Mohapatra,et al. Securing Multimedia Content Using Joint Compression and Encryption , 2013, IEEE MultiMedia.
[140] Rong Yan,et al. People Identification with Limited Labels in Privacy-Protected Video , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[141] Fanny Coudert,et al. When video cameras watch and screen: Privacy implications of pattern recognition technologies , 2010, Comput. Law Secur. Rev..
[142] Wenjuan Ma,et al. An effective method for removing large object , 2011, 2011 4th International Congress on Image and Signal Processing.
[143] Touradj Ebrahimi,et al. UHD video dataset for evaluation of privacy , 2014, 2014 Sixth International Workshop on Quality of Multimedia Experience (QoMEX).
[144] Michael A. Caloyannides. Society cannot function without privacy , 2003, IEEE Security & Privacy Magazine.
[145] Noboru Babaguchi,et al. Privacy protecting visual processing for secure video surveillance , 2008, 2008 15th IEEE International Conference on Image Processing.
[146] James L. Crowley,et al. CoMedi: using computer vision to support awareness and privacy in mediaspaces , 1999, CHI EA '99.
[147] Yongdong Zhang,et al. Prediction restricted H.264/AVC video scrambling for privacy protection , 2010 .
[148] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[149] Frank Vahid,et al. Privacy perception and fall detection accuracy for in-home video assistive monitoring with privacy enhancements , 2012, SIGHIT Rec..
[150] Min Wu,et al. Multimedia Data Hiding , 2003, Springer New York.
[151] Shwetak N. Patel,et al. BlindSpot: Creating Capture-Resistant Spaces , 2009, Protecting Privacy in Video Surveillance.
[152] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[153] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[154] Lucas Pereira,et al. Image replacement through texture synthesis , 1997, Proceedings of International Conference on Image Processing.
[155] Andrew W. Senior,et al. Privacy Protection in a Video Surveillance System , 2009, Protecting Privacy in Video Surveillance.
[156] Scott E. Hudson,et al. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.
[157] Marco Zennaro,et al. Large-scale privacy protection in Google Street View , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[158] Jianping Fan,et al. A novel approach for privacy-preserving video sharing , 2005, CIKM '05.
[159] Toshihisa Tanaka,et al. A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects , 2005, PCM.
[160] Touradj Ebrahimi,et al. Subjective study of privacy filters in video surveillance , 2012, 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP).