Secure and distributed video surveillance via portable devices
暂无分享,去创建一个
Ilsun You | Bruno Carpentieri | Francesco Palmieri | Raffaele Pizzolante | Kangbin Yim | Aniello Castiglione | Arcangelo Castiglione | Andrea Bruno | Pietro Albano
[1] Umberto Ferraro Petrillo,et al. Engineering a secure mobile messaging framework , 2012, Comput. Secur..
[2] Christian W. Probst,et al. Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[3] Sabu Emmanuel,et al. Intelligent Video Surveillance for Monitoring Elderly in Home Environments , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[4] Teddy Ko,et al. A survey on behavior analysis in video surveillance for homeland security applications , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.
[5] John R. Smith,et al. Real-time video surveillance for traffic monitoring using virtual line analysis , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[6] Suman Srinivasan,et al. Airborne traffic surveillance systems: video surveillance of highway traffic , 2004, VSSN '04.
[7] S. Muller-Schneiders,et al. Performance evaluation of a real time video surveillance system , 2005, 2005 IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance.
[8] A. Enis Çetin,et al. Computer vision based method for real-time fire and flame detection , 2006, Pattern Recognit. Lett..
[9] Alfredo De Santis,et al. Do You Trust Your Phone? , 2009, EC-Web.
[10] Umberto Ferraro Petrillo,et al. An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[11] Mei-Juan Chen,et al. Robust image watermark with wavelet transform and spread spectrum techniques , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).
[12] Ilsun You,et al. A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.
[13] Zhizhong Ding,et al. Spread Spectrum Watermark for Color Image Based on Wavelet Tree Structure , 2008, 2008 International Conference on Computer Science and Software Engineering.
[14] Frank Bossen,et al. Digital watermarking of color images using amplitude modulation , 1998, J. Electronic Imaging.
[15] Paulo Cortez,et al. Prediction of Abnormal Behaviors for Intelligent Video Surveillance Systems , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.
[16] Gian Luca Foresti,et al. A distributed sensor network for video surveillance of outdoor environments , 2002, Proceedings. International Conference on Image Processing.
[17] Wolfgang Straßer,et al. Towards secure and privacy sensitive surveillance , 2010, ICDSC '10.
[18] Chao-Ho Chen,et al. An early fire-detection method based on image processing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[19] Takeo Kanade,et al. A System for Video Surveillance and Monitoring , 2000 .
[20] Jiang Wei. Research on the military video surveillance system with conditional access information , 2009 .
[21] David Murakami Wood,et al. The Growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space , 2002 .
[22] Bruno Carpentieri,et al. Copyright Protection for Images on Mobile Devices , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[23] Gerhard C. Langelaar,et al. Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .
[24] A. Enis Çetin,et al. Flame detection in video using hidden Markov models , 2005, IEEE International Conference on Image Processing 2005.
[25] Minghua Chen,et al. Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.
[26] Thou-Ho Chen,et al. An intelligent real-time fire-detection method based on video processing , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[27] Giuseppe Cattaneo,et al. SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[28] Yuliang Zheng,et al. Communication protection in IP-based video surveillance systems , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[29] Mourad Ouaret,et al. Privacy enabling technology for video surveillance , 2006, SPIE Defense + Commercial Sensing.
[30] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.