2020
DOI: 10.1016/j.imavis.2019.103859
|View full text |Cite
|
Sign up to set email alerts
|

Skin detection and lightweight encryption for privacy protection in real-time surveillance applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 39 publications
0
13
0
Order By: Relevance
“…Skin detection has been a long-standing challenge in the field of computer vision, and it has been used in many studies that involve decision-making about humans [ 33 , 38 ]. Several survey papers have explored various methods for skin detection [ 19 , 32 ].…”
Section: Proposed Solutionmentioning
confidence: 99%
“…Skin detection has been a long-standing challenge in the field of computer vision, and it has been used in many studies that involve decision-making about humans [ 33 , 38 ]. Several survey papers have explored various methods for skin detection [ 19 , 32 ].…”
Section: Proposed Solutionmentioning
confidence: 99%
“…In the method, the mean of the pixels located in the detected target In general, a mosaic block has a rectangular shape in which all pixels have the same color. In this study, a mosaic is generated in the unit of blocks [54,56] rather than the unit of pixels. In this case, it is important to let the mosaic overlap a detected target object region properly in terms of position and size.…”
Section: Blocking Through Mosaic Processingmentioning
confidence: 99%
“…Apart from awareness of data usage among users, [11], [12] demonstrated how fragile an individuals' privacy is under state-of-the-art technology-enabled video surveillance. [6] states that any kind of human skin (face, skin tone) under the surveillance footage can behave as a feature that can lead to revealing the provenance of both, the video and people in the footage. There are many possibilities to mitigate some of the video privacy issues by using techniques like distorting images, adding noise, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Also, surveillance systems should be proofed to reduce the risk of privacy infringement [4], which can for instance be achieved by employing visual anonymization techniques. While detection of individuals is simplified with current deep learning systems [6], applying visual modifications to the input (e.g., added noise) may confuse the neural network into making wrong predictions [7]. Besides, many of the available tracking technologies for real-time behavioral analysis (e.g., occupancy detection and in-store analytics [8]) are resourceand maintenance-heavy because of accuracy and correctness concerns.…”
Section: Introductionmentioning
confidence: 99%