Privacy-preserving photo sharing based on a secure JPEG
暂无分享,去创建一个
[1] Sharath Pankanti,et al. Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.
[2] Refik Molva,et al. Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks , 2012, SNS '12.
[3] Gerald Friedland,et al. Cybercasing the Joint: On the Privacy Implications of Geo-Tagging , 2010, HotSec.
[4] Touradj Ebrahimi,et al. Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Blase Ur,et al. Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.
[6] João Paulo Pesce,et al. Privacy attacks in social media using photo tagging networks: a case study with Facebook , 2012, PSOSM '12.
[7] Touradj Ebrahimi,et al. Using warping for privacy protection in video surveillance , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[8] Mor Naaman,et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.
[9] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[10] Touradj Ebrahimi,et al. MPEG-7 camera , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[11] Mc Mohan Aa Rao D Kishore,et al. Security and Privacy in Big Data , 2017 .
[12] Andrew C. Gallagher,et al. Understanding images of groups of people , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[13] Kien A. Hua,et al. A general framework for managing and processing live video data with privacy protection , 2011, Multimedia Systems.
[14] Kiyoshi Tanaka,et al. DCT based scalable scrambling method with reversible data hiding functionality , 2010, 2010 4th International Symposium on Communications, Control and Signal Processing (ISCCSP).
[15] X. Tian,et al. A Scrambling Algorithm of Image Encryption Based on Rubik's Cube Rotation and Logistic Sequence , 2011, 2011 International Conference on Multimedia and Signal Processing.
[16] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[17] Volker Gruhn,et al. Utilizing Social Networking Platforms to Support Public Key Infrastructures , 2007, SECRYPT.
[18] Touradj Ebrahimi,et al. Toward a secure JPEG , 2006, SPIE Optics + Photonics.
[19] Ping Guan,et al. A novel digital image encryption method based on one-dimensional random scrambling , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[20] Nalini Venkatasubramanian,et al. Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.
[21] Hideki Noda,et al. Protection of privacy in JPEG files using reversible information hiding , 2012, 2012 International Symposium on Intelligent Signal Processing and Communications Systems.
[22] Heather Richter Lipford,et al. Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.
[23] Touradj Ebrahimi,et al. Using face morphing to protect privacy , 2013, 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance.
[24] Minghua Chen,et al. Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.
[25] Takeshi Kumaki,et al. Hierarchical image-scrambling method with scramble-level controllability for privacy protection , 2013, 2013 IEEE 56th International Midwest Symposium on Circuits and Systems (MWSCAS).
[26] Lujo Bauer,et al. Toward strong, usable access control for shared distributed data , 2014, FAST.
[27] Zhenjun Tang,et al. Secure Image Encryption without Size Limitation Using Arnold Transform and Random Strategies , 2011, J. Multim..
[28] グレゴリー・ゴードン・ローズ,et al. Of social network-based pki authentication , 2012 .