IEEE International Conference on Image Processing 2005 2005
DOI: 10.1109/icip.2005.1530530
|View full text |Cite
|
Sign up to set email alerts
|

Hiding privacy information in video surveillance system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
72
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 109 publications
(73 citation statements)
references
References 3 publications
1
72
0
Order By: Relevance
“…Different frameworks have been proposed to hide the data in the video itself, e.g., as a watermark [17] or as encrypted information in DCT blocks [18]. This information can be retrieved later on request.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Different frameworks have been proposed to hide the data in the video itself, e.g., as a watermark [17] or as encrypted information in DCT blocks [18]. This information can be retrieved later on request.…”
Section: Related Workmentioning
confidence: 99%
“…15: Apply de-identification transformation on the segmented frames using one of the techniques mentioned in Section IV-C. 16: Apply the randomization kernel. 17: end if the corresponding image patch. The voting score for different positions and scales from multiple patches is minimized in a robust manner to combine the vote maps and select the most appropriate candidate.…”
Section: A Detect and Trackmentioning
confidence: 99%
“…Chen et al built a system for people detection, tracking and recognition [11] using gait analysis, face detection and face recognition. As visual privacy is a significant concern of such systems, a number of researchers have explored how to integrate privacy systems into these surveillance systems [48,56,12,10,18]. Others such as Chinomi et al have evaluated different methods for obscuring people in video data [13].…”
Section: Related Workmentioning
confidence: 99%
“…The technique in [11] removes privacy-sensitive information from the video sequence. A perceptually-based compressed-domain watermarking technique is then used to securely embed this data in the video stream.…”
Section: Introductionmentioning
confidence: 99%