Visual content privacy protection: A survey

R Zhao, Y Zhang, T Wang, W Wen, Y **ang… - ACM Computing …, 2025 - dl.acm.org
Vision is the most important sense for people, and it is also one of the main ways of
cognition. As a result, people tend to utilize visual content to capture and share their life …

[HTML][HTML] Real time hybrid medical image encryption algorithm combining memristor-based chaos with DNA coding

AS Demirkol, ME Sahin, B Karakaya, H Ulutas… - Chaos, Solitons & …, 2024 - Elsevier
Image encryption is a commonly used method to secure medical data on a public network,
playing a crucial role in the healthcare industry. Because of their complex dynamics …

Mosaic tracking: Lightweight batch video frame awareness multi-target encryption scheme based on a novel discrete tabu learning neuron and yolov5

J Mou, Z Zhang, N Zhou, Y Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With the popularity of surveillance devices, the security of surveillance video has attracted
much attention, and three key issues need to be solved. The videos cannot be synchronized …

An intelligent indoor emergency evacuation system using IoT-enabled WSNs for smart buildings

A Ojha, A **dal, P Chanak - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Recently, the Internet of Things (IoT) has played a vital role in emergency evacuation
systems for smart buildings. Existing emergency evacuation systems do not consider future …

Real-time event-driven road traffic monitoring system using CCTV video analytics

M Tahir, Y Qiao, N Kanwal, B Lee, MN Asghar - IEEE Access, 2023 - ieeexplore.ieee.org
Closed-circuit television (CCTV) systems have become pivotal tools in modern urban
surveillance and traffic management, contributing significantly to road safety and security …

Quality guided metric learning for domain adaptation person re-identification

L Zhang, H Li, R Liu, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Person re-identification is the task of identifying pedestrians across different cameras.
Domain adaptation person re-identification involves transferring knowledge from labeled …

[BOK][B] Evolution and Advances in Computing Technologies for Industry 6.0: Technology, Practices, and Challenges

CKK Reddy, S Doss, SB Khan, A Alqhatani - 2024 - books.google.com
This book provides a comprehensive exploration of Industry 6.0, which marks the
convergence of intelligent systems, machine learning (ML), deep learning, and human …

A novel chaotic map-based encryption scheme for surveillance videos

D Dhingra, M Dua - Physica Scripta, 2023 - iopscience.iop.org
The widespread use of surveillance cameras has initiated privacy concerns among
individuals being captured by these devices. Due to the limited internal storage capacity …

[HTML][HTML] Pixel tampering detection in encrypted surveillance videos on resource-constrained devices

I Aribilola, B Lee, MN Asghar - Internet of Things, 2024 - Elsevier
Encryption (naïve/selective) is recommended to secure the recorded visual content;
however, intruders can still manipulate encrypted data. Visually, tampering attacks on …

Progressive supervised pedestrian detection algorithm for green edge–cloud computing

L She, W Wang, J Wang, Z Lin, Y Zeng - Computer Communications, 2024 - Elsevier
In this paper, we present a novel supervised pedestrian detection algorithm tailored for
Green Edge–Cloud Computing (GECC), aimed at addressing the challenges associated …