Search
Now showing items 1-9 of 9
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes
(Elsevier, 2017-05)
Selective encryption masks all of the content without completely hiding it, as full encryption would do at a cost in encryption delay and increased bandwidth. Many commercial applications of video encryption do not even ...
SLEPX: an efficient lightweight cipher for visual protection of scalable HEVC extension
(IEEE, 2020-10-12)
This paper proposes a lightweight cipher scheme aimed at the scalable extension of the High Efficiency Video Coding (HEVC) codec, referred to as the Scalable HEVC (SHVC) standard. This stream cipher, S ymmetric Cipher for ...
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
(IEEE, 2018-03-12)
Owing to the exceptional growth of information exchange over open communication
channels within the public Internet, confidential transmission of information has become a vital current
concern for organizations and ...
MuLViS: multi-level encryption based security system for surveillance videos
(IEEE, 2020-09-18)
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, ...
Trace model for cyclic behavior in wireless LANS.
(Pakistan Association for the Advancement of Science, 2018-09)
: For the estimation of cycle time in WLANs different parameters were used to
analyze the cyclic behavior like packet loss cycle, successful packet cycle and collision cycle. This
paper proposes a model to control all ...
Towards estimation of emotions from eye pupillometry with low-cost devices
(IEEE, 2021-01-11)
Emotional care is important for some patients and their caregivers. Within a clinical or home care situation, technology can be employed to remotely monitor the emotional response of such people. This paper considers ...
Fuzzy‑logic threat classification for multi‑level selective encryption over real‑time video streams.
(Springer, 2020-04-22)
This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a method to auto-detect three different
confidentiality levels for videos streamed from heterogeneous, mobile devices via web edge servers, ...
Visual surveillance within the EU general data protection regulation: a technology perspective.
(IEEE, 2019-08-23)
From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ...