Sciweavers

738 search results - page 3 / 148
» Privacy Protection for Speech Information
Sort
View
COMAD
2008
13 years 9 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
ICMCS
2010
IEEE
160views Multimedia» more  ICMCS 2010»
13 years 8 months ago
A framework for the validation of privacy protection solutions in video surveillance
The issue of privacy protection in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regard...
Frédéric Dufaux, Touradj Ebrahimi
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 7 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
DBSEC
2007
151views Database» more  DBSEC 2007»
13 years 9 months ago
Location Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...