2017
DOI: 10.1109/tmm.2016.2639380
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Cloth Try-On Using Mobile Augmented Reality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 51 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…Wang et al [10] proposed a time machine-like method to relive experiences with virtual reality and protect individual privacy in virtual worlds. Sekhavat et al [13] utilized augmented reality devices to watch physical wearing with the human alternative mode. Compared with standing in front real cameras, this method can protect human body privacy.…”
Section: Network Implementation In Privacy Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al [10] proposed a time machine-like method to relive experiences with virtual reality and protect individual privacy in virtual worlds. Sekhavat et al [13] utilized augmented reality devices to watch physical wearing with the human alternative mode. Compared with standing in front real cameras, this method can protect human body privacy.…”
Section: Network Implementation In Privacy Protectionmentioning
confidence: 99%
“…Moreover, data owners have no awareness about how important their personal data is. For example, the refined 3D model reconstruction reveals personal information, including sex and appearance [9][10][11][12][13][14][15]. 3D sensitive data confirmation, security and privacy problems have attracted extensive attention.…”
Section: Introductionmentioning
confidence: 99%
“…Besides the standard security strategies, such as on-device and network encryption, others will need to be rethought, especially in this new context [102], [103]. For example, researchers have begun considering the specific AR operating system [104] (from underlying platform perspective), the surroundings information collection rules or retention policies [105] (from sensing perspective), the object access governing [106], [107] (from data access perspective), and the trusted renderer [108], [109] (from output perspective). In addition to these technical solutions, the privacy and security challenges for AR systems also call for social, policy, or legal approaches [110].…”
Section: E Privacy and Securitymentioning
confidence: 99%
“…This psychological sense is called "presence" [23][24] in the human computer interaction literature. Lawful and meaningful responses to an individual in a VR environment results in the sense of presence [24,25]. Thus, interactive scenarios in which the content of the VR environment is changed in real-time in response to the behavior of users are more likely to elicit presence.…”
Section: Motivation: Active Vs Passive Vret Scenariosmentioning
confidence: 99%