Skip to main content

Enhancing Privacy Protection in Multimedia Systems

  1. One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the ident...

    Authors: Paula Carrillo, Hari Kalva and Spyros Magliveras
    Citation: EURASIP Journal on Information Security 2010 2009:429581
  2. This paper presents a method which attains recoverable privacy protection for video content distribution. The method is based on discrete wavelet transform (DWT), which generates scaling coefficients and wavel...

    Authors: Guangzhen Li, Yoshimichi Ito, Xiaoyi Yu, Naoko Nitta and Noboru Babaguchi
    Citation: EURASIP Journal on Information Security 2010 2009:293031
  3. Signal processing in the encrypted domain (s.p.e.d.) appears an elegant solution in application scenarios, where valuable signals must be protected from a possibly malicious processing device. In this paper, w...

    Authors: Tiziano Bianchi, Alessandro Piva and Mauro Barni
    Citation: EURASIP Journal on Information Security 2009 2009:716357
  4. One-time key based phase scrambling is proposed for privacy-protected image matching. The image matching is performed using invisible templates that are protected by phase scrambling. A key for phase scramblin...

    Authors: Izumi Ito (EURASIP Member) and Hitoshi Kiya (EURASIP Member)
    Citation: EURASIP Journal on Information Security 2009 2009:841045
  5. Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine indiv...

    Authors: Shuiming Ye, Ying Luo, Jian Zhao and Sen-ChingS Cheung
    Citation: EURASIP Journal on Information Security 2009 2009:865259
  6. From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy informati...

    Authors: JithendraK Paruchuri, Sen-chingS Cheung and MichaelW Hail
    Citation: EURASIP Journal on Information Security 2009 2009:236139