A Content Providing System with Privacy Protection
暂无分享,去创建一个
[1] Noboru Babaguchi,et al. A discrete wavelet transform based recoverable image processing for privacy protection , 2008, 2008 15th IEEE International Conference on Image Processing.
[2] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[3] HoonJae Lee,et al. Mutual Autonomy LFSR Output-Based Cellular Automata (MALO-CA) , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[4] Noboru Babaguchi,et al. Privacy protecting visual processing for secure video surveillance , 2008, 2008 15th IEEE International Conference on Image Processing.
[5] Young Shik Moon,et al. Face Extraction Method Using Edge Orientation and Face Geometric Features , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[6] A. M. Burton,et al. 100% Accuracy in Automatic Face Recognition , 2008, Science.
[7] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[8] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[9] Norihiro Hagita,et al. Stealth vision for protecting privacy , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Zhang Jin,et al. Hierarchical access control for secure group communication , 2006, 2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design.
[12] Yu-Fang Chung,et al. Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm , 2002, Comput. Secur..
[13] Touradj Ebrahimi,et al. Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[14] T.E. Boult,et al. PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).
[15] Liu Gang. Hierarchical Access Control for Secure Group Communication , 2004 .
[16] Toshihisa Tanaka,et al. A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects , 2005, PCM.