Chaos-cryptography based privacy preservation technique for video surveillance
暂无分享,去创建一个
H. T. Mouftah | Abdulmotaleb El-Saddik | M. Anwar Hossain | Eiji Okamoto | Sk. Md. Mizanur Rahman | M. A. Hossain | A. El Saddik | S. Rahman | Hussein Mouftah | Eiji Okamoto
[1] Touradj Ebrahimi,et al. Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[2] Isabel Martinez-Ponte,et al. ROBUST HUMAN FACE HIDING ENSURING PRIVACY , 2004 .
[3] Pierre L'Ecuyer,et al. TestU01: A C library for empirical testing of random number generators , 2006, TOMS.
[4] Eun-Soo Kim,et al. Practical image encryption scheme by real‐valued data , 1996 .
[5] J.-C. Yeo,et al. Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation , 2000 .
[6] Sharath Pankanti,et al. Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .
[7] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[8] L. Sweeney,et al. Preserving Privacy by De-identifying Facial Images , 2003 .
[9] Abir Awad,et al. A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods , 2010, IACR Cryptol. ePrint Arch..
[10] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[11] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[12] Bahram Javidi,et al. Experimental demonstration of the random phase encoding technique for image encryption and security verification , 1996 .
[13] Osama S. Farag Allah,et al. Encryption quality analysis of the RC5 block cipher algorithm for digital images , 2006 .
[14] Mohan Trivedi,et al. The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Renato da Veiga Guadagnin,et al. Practical Procedures to Improve Face Recognition Based on Eigenfaces and Principal Component Analysis 1 , 2001 .
[17] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[18] Xuanqin Mou,et al. Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.
[19] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[20] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[21] Touradj Ebrahimi,et al. Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[22] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[23] Xuejia Lai,et al. On the design and security of block ciphers , 1992 .
[24] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[25] Alireza Jolfaei,et al. Survey: Image Encryption Using A5/1 and W7 , 2010 .
[26] Jiun-In Guo,et al. A new image encryption algorithm and its VLSI architecture , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).
[27] H. T. Mouftah,et al. A real-time privacy-sensitive data hiding approach based on chaos cryptography , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[28] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[29] Rached Tourki,et al. A Modified AES Based Algorithm for Image Encryption , 2007 .
[30] ALIREZA JOLFAEI,et al. An image encryption approach using chaos and stream cipher , 2010 .
[31] M. Hénon. A two-dimensional mapping with a strange attractor , 1976 .
[32] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[33] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[34] Rainer Lienhart,et al. An extended set of Haar-like features for rapid object detection , 2002, Proceedings. International Conference on Image Processing.
[35] A. Pisarchik,et al. Image encryption with chaotically coupled chaotic maps , 2008 .
[36] Alireza Jolfaei,et al. A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1 , 2010, 2010 International Conference on Artificial Intelligence and Computational Intelligence.
[37] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[38] Nidal Nasser,et al. Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks , 2008, Secur. Commun. Networks.
[39] Jiun-In Guo,et al. A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[40] Svetha Venkatesh,et al. Dynamic privacy assessment in a smart house environment using multimodal sensing , 2008, TOMCCAP.
[41] Nicu Sebe,et al. Special section from the ACM multimedia conference 2007 , 2008, TOMCCAP.
[42] Minghua Chen,et al. Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.