Visual privacy protection methods: A survey
JR Padilla-López, AA Chaaraoui… - Expert Systems with …, 2015 - Elsevier
Recent advances in computer vision technologies have made possible the development of
intelligent monitoring systems for video surveillance and ambient-assisted living. By using …
intelligent monitoring systems for video surveillance and ambient-assisted living. By using …
A survey of reversible data hiding in encrypted images–the first 12 years
In the last few years, with the increasing popularity of cloud computing and the availability of
mobile smart devices as well as ubiquitous network connections, more and more users are …
mobile smart devices as well as ubiquitous network connections, more and more users are …
A systematic review of intelligence video surveillance: Trends, techniques, frameworks, and datasets
Video surveillance systems obtain a great interest as application-oriented studies that have
been growing rapidly in the past decade. The most recent studies attempt to integrate …
been growing rapidly in the past decade. The most recent studies attempt to integrate …
Cracking a hierarchical chaotic image encryption algorithm based on permutation
C Li - Signal Processing, 2016 - Elsevier
In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was
proposed, which divides a plain-image of size M× N with T possible value levels into K …
proposed, which divides a plain-image of size M× N with T possible value levels into K …
CNN spatiotemporal features and fusion for surveillance video forgery detection
Surveillance cameras are widely used to provide protection and security; also their videos
are used as strong evidences in the courts. Through the availability of video editing tools, it …
are used as strong evidences in the courts. Through the availability of video editing tools, it …
Wireless video surveillance: A survey
A wireless video surveillance system consists of three major components: 1) the video
capture and preprocessing; 2) the video compression and transmission in wireless sensor …
capture and preprocessing; 2) the video compression and transmission in wireless sensor …
Improved known-plaintext attack to permutation-only multimedia ciphers
Permutation is a commonly used operation in many secure multimedia systems. However, it
is fragile against cryptanalysis when used alone. For instance, it is well-known that …
is fragile against cryptanalysis when used alone. For instance, it is well-known that …
Exposing video inter-frame forgery via histogram of oriented gradients and motion energy image
S Fadl, Q Han, L Qiong - Multidimensional Systems and Signal Processing, 2020 - Springer
Inter-frame forgery is a common type of video forgery to destroy the video evidence. It occurs
in the temporal domain such as frame deletion, frame insertion, frame duplication, and frame …
in the temporal domain such as frame deletion, frame insertion, frame duplication, and frame …
Automated deep learning BLACK-BOX attack for multimedia P-BOX security assessment
Resistance to differential cryptanalysis is a fundamental security requirement for symmetric
block ciphers, and recently, deep learning has attracted the interest of cryptography experts …
block ciphers, and recently, deep learning has attracted the interest of cryptography experts …
JPEG quantization tables for GPS Maps
Y Wiseman - Automatic Control and Computer Sciences, 2021 - Springer
Controlling the quality of the images in JPEG is done by quantization tables. There are two
quantization tables–one for the luminance information and one for the chrominance …
quantization tables–one for the luminance information and one for the chrominance …