An Intelligent Real-Time Occupancy Monitoring System with Enhanced Encryption and Privacy
暂无分享,去创建一个
[1] Wang Fulai. A universal algorithm to generate pseudo-random numbers based on uniform mapping as homeomorphism , 2010 .
[2] Thomas Stütz,et al. A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Xingyuan Wang,et al. Cryptanalysis and improvement on a cryptosystem based on a chaotic map , 2009, Comput. Math. Appl..
[4] Seong Oun Hwang,et al. A secure image encryption scheme based on chaotic maps and affine transformation , 2015, Multimedia Tools and Applications.
[5] K. Plataniotis,et al. Privacy Protected Surveillance Using Secure Visual Object Coding , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[6] Yu Zhang,et al. Breaking a chaotic image encryption algorithm based on perceptron model , 2011, Nonlinear Dynamics.
[7] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[8] Seong Oun Hwang,et al. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices , 2016, Neural Computing and Applications.
[9] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[10] Xinyu Zhang,et al. Real-time vehicle detection and tracking using improved histogram of gradient features and Kalman filters , 2018 .
[11] Pierre Gouton,et al. A Video-Based Real-Time Vehicle Counting System Using Adaptive Background Method , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.
[12] Touradj Ebrahimi,et al. Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[13] X. Liao,et al. A novel block cryptosystem based on iterating a chaotic map , 2006 .
[14] Kahlil Muchtar,et al. Moving object detection in the encrypted domain , 2016, Multimedia Tools and Applications.
[15] Aura Conci,et al. Video-Based Distance Traffic Analysis: Application to Vehicle Tracking and Counting , 2011, Computing in Science & Engineering.
[16] Ming Li,et al. Cryptanalysis and Improvement of Chaos-Based Image Encryption Scheme with Circular Inter-Intra-Pixels Bit-Level Permutation , 2017 .
[17] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[18] Adrian-Viorel Diaconu,et al. Circular inter-intra pixels bit-level permutation and chaos-based image encryption , 2016, Inf. Sci..
[19] Sheng Liyuan,et al. Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties , 2005 .
[20] K. P. Subbalakshmi,et al. Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.
[21] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[22] Safya Belghith,et al. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms , 2017 .
[23] Seong Oun Hwang,et al. An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes , 2015, Wirel. Pers. Commun..