2016
DOI: 10.1007/978-3-319-27671-7_47
|View full text |Cite
|
Sign up to set email alerts
|

Private Video Foreground Extraction Through Chaotic Mapping Based Encryption in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…A scheduling algorithm is proposed to control the activity of sensor nodes according to the redundancy level and criticality of each node. Some other works prefer to do all the processing on a cloud server or multiple cloud servers [21], [22]. In those approaches the security topic is also taken into consideration and the processing is very efficient since it is done on cloud servers.…”
Section: Related Workmentioning
confidence: 99%
“…A scheduling algorithm is proposed to control the activity of sensor nodes according to the redundancy level and criticality of each node. Some other works prefer to do all the processing on a cloud server or multiple cloud servers [21], [22]. In those approaches the security topic is also taken into consideration and the processing is very efficient since it is done on cloud servers.…”
Section: Related Workmentioning
confidence: 99%
“…After that, rich literatures have been proposed in this field. The cryptographic tools such as secret sharing (SS) [3], security multi-party computation (SMC) [4], homomorphic encryption (HE) [5], garbed circuit (GC) [6], Chaotic System (CS) [7] are heavily used. Plenty of computer vision applications have been modified to the privacy preserving or secure versions such as private face detection [8], face recognition [4], content based image retrieval [9], visual media search on public datasets [10], intelligent video surveillance [3,5,6,7].…”
Section: Introductionmentioning
confidence: 99%