Enhancing Privacy Protection in Multimedia Systems
-
Citation: EURASIP Journal on Information Security 2010 2009:710919
-
Compression Independent Reversible Encryption for Privacy in Video Surveillance
One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the ident...
Citation: EURASIP Journal on Information Security 2010 2009:429581 -
Recoverable Privacy Protection for Video Content Distribution
This paper presents a method which attains recoverable privacy protection for video content distribution. The method is based on discrete wavelet transform (DWT), which generates scaling coefficients and wavel...
Citation: EURASIP Journal on Information Security 2010 2009:293031 -
Encrypted Domain DCT Based on Homomorphic Cryptosystems
Signal processing in the encrypted domain (s.p.e.d.) appears an elegant solution in application scenarios, where valuable signals must be protected from a possibly malicious processing device. In this paper, w...
Citation: EURASIP Journal on Information Security 2009 2009:716357 -
One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images
One-time key based phase scrambling is proposed for privacy-protected image matching. The image matching is performed using invisible templates that are protected by phase scrambling. A key for phase scramblin...
Citation: EURASIP Journal on Information Security 2009 2009:841045 -
Anonymous Biometric Access Control
Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine indiv...
Citation: EURASIP Journal on Information Security 2009 2009:865259 -
Video Data Hiding for Managing Privacy Information in Surveillance Systems
From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy informati...
Citation: EURASIP Journal on Information Security 2009 2009:236139