MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos
暂无分享,去创建一个
Martin Fleury | Yuansong Qiao | Brian Lee | Amna Shifa | Mamoona N. Asghar | Nadia Kanwal | Marco Herbst | Mohammad S. Ansari | M. S. Ansari | M. Fleury | Yuansong Qiao | Brian A. Lee | Amna Shifa | M. Asghar | N. Kanwal | Marco Herbst
[1] Fei Peng,et al. Separable reversible data hiding and encryption for HEVC video , 2017, Journal of Real-Time Image Processing.
[2] Changda Wang,et al. A Lightweight Encryption Method for Privacy Protection in Surveillance Videos , 2018, IEEE Access.
[3] Abdul Razzaq,et al. Ontology based application level intrusion detection system by using Bayesian filter , 2009, 2009 2nd International Conference on Computer, Control and Communication.
[4] Zafar Shahid,et al. Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Céline Hudelot,et al. Building and using fuzzy multimedia ontologies for semantic image annotation , 2014, Multimedia Tools and Applications.
[6] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[7] Zafar Shahid,et al. Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.
[8] Martin Fleury,et al. Ontology-Based Intelligent Security Framework for Smart Video Surveillance , 2018 .
[9] Jan Sher Khan,et al. Chaos based efficient selective image encryption , 2018, Multidimensional Systems and Signal Processing.
[10] Bob Zhang,et al. Background modeling methods in video analysis: A review and comparative evaluation , 2016, CAAI Trans. Intell. Technol..
[11] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[12] Haoxiang Wang,et al. Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings , 2017, Future Gener. Comput. Syst..
[13] David J. Fleet,et al. Performance of optical flow techniques , 1994, International Journal of Computer Vision.
[14] Neil Robinson,et al. Public preferences for internet surveillance, data retention and privacy enhancing services: Evidence from a pan-European study , 2017, Comput. Hum. Behav..
[15] Antonio Sánchez-Esguevillas,et al. A Semantic Autonomous Video Surveillance System for Dense Camera Networks in Smart Cities , 2012, Sensors.
[16] Hari Kalva,et al. Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..
[17] N. F. Noy,et al. Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .
[18] Atta Badii,et al. Skin-based privacy filter for surveillance systems , 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP).
[19] Zhou Wang,et al. Video quality assessment based on structural distortion measurement , 2004, Signal Process. Image Commun..
[20] Hugo Jair Escalante,et al. Towards a Generic Ontology for Video Surveillance , 2017 .
[21] Guillaume-Alexandre Bilodeau,et al. Urban Tracker: Multiple object tracking in urban mixed traffic , 2014, IEEE Winter Conference on Applications of Computer Vision.
[22] Mohammed Ghanbari,et al. Standard Codecs: Image Compression to Advanced Video Coding , 2003 .
[23] Russ Housley,et al. Guidelines for Cryptographic Key Management , 2005, RFC.
[24] Máire O'Neill,et al. Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead , 2015, Signal Process. Image Commun..
[25] Abbas Javed,et al. An Intelligent Real-Time Occupancy Monitoring System with Enhanced Encryption and Privacy , 2018, 2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC).
[26] Shreyas Sen,et al. Self-Optimizing IoT Wireless Video Sensor Node With In-Situ Data Analytics and Context-Driven Energy-Aware Real-Time Adaptation , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[27] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[28] David Sánchez,et al. Semantic adaptive microaggregation of categorical microdata , 2012, Comput. Secur..
[29] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[30] Senem Velipasalar,et al. Cooperative Object Tracking and Composite Event Detection With Wireless Embedded Smart Cameras , 2010, IEEE Transactions on Image Processing.
[31] Giovanni Pau,et al. A fuzzy-based approach for energy-efficient Wi-Fi communications in dense wireless multimedia sensor networks , 2018, Comput. Networks.
[32] Wolfgang Straßer,et al. Smart Camera Based Monitoring System and Its Application to Assisted Living , 2008, Proceedings of the IEEE.
[33] Z. Zivkovic. Improved adaptive Gaussian mixture model for background subtraction , 2004, ICPR 2004.
[34] Darko Kirovski,et al. Multimedia encryption and authentication - techniques and applications , 2006 .
[35] Zhengyou Zhang,et al. A Survey of Recent Advances in Face Detection , 2010 .
[36] Shih-Chia Huang,et al. An Advanced Motion Detection Algorithm With Video Quality Analysis for Video Surveillance Systems , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[37] Mohammed Ghanbari,et al. Sufficient encryption based on entropy coding syntax elements of H.264/SVC , 2015, Multimedia Tools and Applications.
[38] Santanu Chaudhury,et al. An Ontology-based Context-aware IoT Framework for Smart Surveillance , 2018 .
[39] Jitendra Madarkar,et al. Compute-Extensive Background Subtraction for Efficient Ghost Suppression , 2019, IEEE Access.
[40] Jean Meunier,et al. Comparative study of motion detection methods for video surveillance systems , 2017, J. Electronic Imaging.
[41] Adel Alti,et al. Autonomic Semantic-Based Context-Aware Platform for Mobile Applications in Pervasive Environments , 2016, Future Internet.
[42] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[43] Martin Fleury,et al. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes , 2017, J. Vis. Commun. Image Represent..
[44] Cordelia Schmid,et al. Human Detection Using Oriented Histograms of Flow and Appearance , 2006, ECCV.
[45] Saqlain Mirza,et al. AES algorithm using advance key implementation in MATLAB , 2016 .
[46] Helge Janicke,et al. Semantics-aware detection of targeted attacks: a survey , 2017, Journal of Computer Virology and Hacking Techniques.
[47] Vincenzo Loia,et al. Towards an Ontology Design Pattern for UAV Video Content Analysis , 2019, IEEE Access.
[48] Ferdinand van der Heijden,et al. Efficient adaptive density estimation per image pixel for the task of background subtraction , 2006, Pattern Recognit. Lett..
[49] John S. Garofolo,et al. PERFORMANCE EVALUATION PROTOCOL FOR FACE, PERSON AND VEHICLE DETECTION & TRACKING IN VIDEO ANALYSIS AND CONTENT EXTRACTION (VACE-II) CLEAR - CLASSIFICATION OF EVENTS, ACTIVITIES AND RELATIONSHIPS , 2006 .
[50] Mehran Yazdi,et al. New trends on moving object detection in video images captured by a moving camera: A survey , 2018, Comput. Sci. Rev..
[51] Kalpana Goyal,et al. Review of background subtraction methods using Gaussian mixture model for video surveillance systems , 2017, Artificial Intelligence Review.
[52] Martin Fleury,et al. Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics , 2019, Sensors.
[53] Alan C. Bovik,et al. The Essential Guide to Video Processing , 2009, J. Electronic Imaging.
[54] Ioan Marius Bilasco,et al. OVIS: ontology video surveillance indexing and retrieval system , 2017, International Journal of Multimedia Information Retrieval.
[55] Stefanos Zafeiriou,et al. A survey on face detection in the wild: Past, present and future , 2015, Comput. Vis. Image Underst..
[56] Wanqing Li,et al. Human detection from images and videos: A survey , 2016, Pattern Recognit..
[57] Fernando De la Torre,et al. Spatio-temporal Matching for Human Detection in Video , 2014, ECCV.
[58] Francesco Palmieri,et al. Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..
[59] Hai Jin,et al. Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos , 2016, IEEE Transactions on Emerging Topics in Computing.
[60] Hai Jin,et al. Fully Reversible Privacy Region Protection for Cloud Video Surveillance , 2017, IEEE Transactions on Cloud Computing.
[61] Khan A. Wahid,et al. IoT-Guard: Event-Driven Fog-Based Video Surveillance System for Real-Time Security Management , 2019, IEEE Access.
[62] Burak Kantarci,et al. Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.
[63] Shengcai Liao,et al. A Fast and Accurate Unconstrained Face Detector , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[64] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[65] Antonio F. Gómez-Skarmeta,et al. SAFIR: Secure access framework for IoT-enabled services on smart buildings , 2015, J. Comput. Syst. Sci..
[66] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[67] Martin Fleury,et al. Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective , 2019, IEEE Access.
[68] Aakanksha Chowdhery,et al. The Design and Implementation of a Wireless Video Surveillance System , 2015, MobiCom.
[69] Touradj Ebrahimi,et al. A Reliable and Reversible Image Privacy Protection Based on False Colors , 2018, IEEE Transactions on Multimedia.
[70] Frédéric Dufaux,et al. Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded Video Streams , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[71] J. Ferryman,et al. PETS2009: Dataset and challenge , 2009, 2009 Twelfth IEEE International Workshop on Performance Evaluation of Tracking and Surveillance.
[72] Martin Fleury,et al. Multimedia security perspectives in IoT , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[73] Alzubair Hassan,et al. An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment , 2019, Complex..
[74] Shengcai Liao,et al. Face Detection Based on Multi-Block LBP Representation , 2007, ICB.
[75] Mirko Čubrilo,et al. Ontology in Information Security , 2015 .
[76] Daniela Moctezuma,et al. HoGG: Gabor and HoG-based human detection for surveillance in non-controlled environments , 2013, Neurocomputing.
[77] Mohammad Ghanbari,et al. An Efficient Security System for CABAC Bin-Strings of H.264/SVC , 2013, IEEE Transactions on Circuits and Systems for Video Technology.
[78] Hironobu Fujiyoshi,et al. Moving target classification and tracking from real-time video , 1998, Proceedings Fourth IEEE Workshop on Applications of Computer Vision. WACV'98 (Cat. No.98EX201).
[79] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[80] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[81] P. Siano,et al. Iot-based smart cities: A survey , 2016, 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC).