Proceedings of the 21st ACM International Conference on Multimedia 2013
DOI: 10.1145/2502081.2502157
|View full text |Cite
|
Sign up to set email alerts
|

Real-time privacy-preserving moving object detection in the cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Hsu et al Hsu et al (2012) proposed a model for extracting SIFT features in ED using the Paillier cryptosystem. Chu et al Chu et al (2013) presented a real-time object detection model for video surveillance. The scheme trans-formed each frame into multiple blocks, and then each block is multiplied by a random matrix.…”
Section: Privacy-preserving Image Processingmentioning
confidence: 99%
“…Hsu et al Hsu et al (2012) proposed a model for extracting SIFT features in ED using the Paillier cryptosystem. Chu et al Chu et al (2013) presented a real-time object detection model for video surveillance. The scheme trans-formed each frame into multiple blocks, and then each block is multiplied by a random matrix.…”
Section: Privacy-preserving Image Processingmentioning
confidence: 99%
“…In contrast, several works proposed to protect the image/video data using block-based transformation algorithms, which provide better efficiency than the homomorphic algorithms. This type of method [1,8,10,17,26] typically decompose the input image/video into equal-sized blocks, and then each block of data is transformed or encrypted separately. As the format of the volume data to some extent resembles the format of the image/video data, the proposed volume data transformation algorithm then adopts a similar mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…It is because of three main reasons: (1) the voxel values in different sub-volumes are transformed separately. (2) The sub-volume permutation makes the determination of neighboring sub-volumes more complex.…”
Section: The Security Level During the Remote Renderingmentioning
confidence: 99%
“…However, traditional video encryption methods which "randomize" all the information cannot support abnormal event detection on the encrypted video. Thus authors of [4], [5] proposed to encrypt videos in a particular way that can preserve some statistical information to facilitate abnormal event detection on the encrypted videos. Whole video encryption typically encrypts the videos in the pixel domain to facilitate abnormal event detection, thus significantly reducing the efficiency of subsequent compression.…”
Section: Introductionmentioning
confidence: 99%