Sciweavers

162 search results - page 16 / 33
» Secure video processing: Problems and challenges
Sort
View
ICICS
2005
Springer
14 years 27 days ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
APSCC
2008
IEEE
14 years 1 months ago
Integration and Implementation of Secured IP Based Surveillance Networks
— This paper presents a method of integration and implementation of transmitting video and audio data from multiple Internet Protocol (IP) surveillance cameras in a wireless sens...
Charles C. Castello, Jeffrey Fan, Te-Shun Chou, Ho...
ICIP
2009
IEEE
13 years 5 months ago
Object detection and tracking for night surveillance based on salient contrast analysis
Night surveillance is a challenging task because of low brightness, low contrast, low Signal to Noise Ratio (SNR) and low appearance information. Most existing models for night su...
Liangsheng Wang, Kaiqi Huang, Yongzhen Huang, Tien...
ICIP
2004
IEEE
14 years 9 months ago
MDC and path diversity in video streaming
Delivering multimedia content over the network pose several challenges that include higher bandwidth and sensitivity to packet losses resulting due to congestion and/or transmissi...
Siva Somasundaram, Koduvayur P. Subbalakshmi, R. N...
AAAI
2012
11 years 9 months ago
A Testbed for Learning by Demonstration from Natural Language and RGB-Depth Video
We are developing a testbed for learning by demonstration combining spoken language and sensor data in a natural real-world environment. Microsoft Kinect RGBDepth cameras allow us...
Young Chol Song, Henry A. Kautz