The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
Perceptual user interfaces: things that see
Communications of the ACM
Learning Patterns of Activity Using Real-Time Tracking
IEEE Transactions on Pattern Analysis and Machine Intelligence
The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
ECCV '98 Proceedings of the 5th European Conference on Computer Vision-Volume II - Volume II
Using Adaptive Tracking to Classify and Monitor Activities in a Site
CVPR '98 Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
Stealth Vision for Protecting Privacy
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Privacy protecting data collection in media spaces
Proceedings of the 12th annual ACM international conference on Multimedia
Preserving Privacy by De-Identifying Face Images
IEEE Transactions on Knowledge and Data Engineering
Scrambling for Video Surveillance with Privacy
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Privacy preserving: hiding a face in a face
ACCV'07 Proceedings of the 8th Asian conference on Computer vision - Volume Part II
PriSurv: privacy protected video surveillance system using adaptive visual abstraction
MMM'08 Proceedings of the 14th international conference on Advances in multimedia modeling
Hi-index | 0.00 |
This paper presents a method which attains recoverable privacy protection for video content distribution. The method is based on discrete wavelet transform (DWT), which generates scaling coefficients and wavelet coefficients. In our method, scaling coefficients, which can be regarded as a low-resolution image of an original image, are used for producing privacy-protected image. On the other hand, wavelet coefficients, which can be regarded as privacy information, are embedded into the privacy-protected image via information hiding technique. Therefore, privacy protected image can be recovered by authorized viewers if necessary. The proposed method is fully analyzed through experiments from the viewpoints of the amount of the embedded privacy information, the deterioration due to the embedding, and the computational time.