Sciweavers

144 search results - page 11 / 29
» Hiding privacy information in video surveillance system
Sort
View
CRV
2005
IEEE
305views Robotics» more  CRV 2005»
14 years 2 months ago
3D Model-Assisted Face Recognition in Video
Face recognition in video has gained wide attention as a covert method for surveillance to enhance security in a variety of application domains (e.g., airports). A video contains ...
Unsang Park, Hong Chen, Anil K. Jain
ISI
2005
Springer
14 years 2 months ago
Selective Fusion for Speaker Verification in Surveillance
This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a metalearning scheme aimed at improving ...
Yosef A. Solewicz, Moshe Koppel
CCS
2011
ACM
12 years 8 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...
ISI
2004
Springer
14 years 2 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
DEXA
2005
Springer
93views Database» more  DEXA 2005»
14 years 2 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer