최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국해양정보통신학회논문지 = The journal of the Korea Institute of Maritime Information & Communication Sciences, v.13 no.9, 2009년, pp.1779 - 1786
문해민 (조선대학교 정보통신공학과) , 반성범 (조선대학교 제어계측로봇공학과)
Due to increased terrors and crimes, the use of surveillance camera systems including CCTV is also increasing. Private information such as faces or behavior patterns can be recorded in CCTV and when it is exposed, it may cause infringement to privacy and crimes. This paper analyses conventional meth...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
M. Langheinrich, "Privacy invasions in ubiquitous computing," In Proc. Workshop on Socially-Informed Design of Privacy Enhancing Solutions in Ubiquitous Computing, Oct. 2002
이철호, "Privacy protection and RFID," 한국콘텐츠학회 2006 추계종합학술대회 논문집, vol. 4, pp. 443-446, 2006
A. Westin, "Privacy and freedom," New York: Atheneum, 1967
Y. Chang, R. Yan, D. Chen, and J. Yang, "People identification with limited labels in privacy-protected video," In Proc. IEEE Int. Conf. Multimedia and Expo, pp. 1005-1008, July 2006
S. Tansuriyavong, and S. I. Hanaki, "Privacy protection by concealing persons in circumstantial video image," In Proc. Perceptive User Interfaces, pp. 1-4, 2001
R. Venkatesh Babu, and A. Makur, "Object-based surveillance video compression using foreground motion compensation," IEEE Control, Automation Robotics and Vision, pp. 1-6, Dec. 2006
F. Matusek, and R. Reda, "Efficient secure storage of privacy enhanced video surveillance data in intelligent video surveillance systems," In Proc. IEEE Int. Symposium on Computer and Information Sciences, vol. 23, pp. 1-5, Oct. 2008
I. Kitahara, K. Kogure, and N. Hagita, "Stealth vision for protecting privacy," In Proc. Int. Conf. Pattern Recognition, vol. 4, pp. 404-407, 2004
I. Kitahara, "Interactive video surveillance by using environmental and mobile cameras," IEEE Automation Congress, pp. 1-6, Oct. 2008
I. Martinez-Ponte, X. Desurmont, J. Meessen, and J. Delaigle, "Robust human face hiding ensuring privacy," In Proc. Int. Workshop on Image Analysis for Multimedia Interactive Services, 2005
F. Dufaux, M. Ouaret, Y. Abdeljaoued, A. Navarro, F. Vergnenegre, and T. Ebrahimi, "Privacy enabling technology for video surveillance," In Proc. SPIE Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6250, May 2006
F. Dufaux, and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems," IEEE Trans. Circuits and Systems for Video Technology, vol. 18, no. 8, pp. 1168-1174, Aug. 2008
J. Schiff, M. Meingast, Deirdre K. Mulligan, S. Sastry, and K. Goldberg, "Respectful cameras: Detecting visual markers in real-time to address privacy concerns," IEEE Intelligent Robots and Systems, pp. 971-978, Oct. 2007
D. Comaniciu, V. Ramesh, and P. Meer, "Kernel-based object tracking," IEEE Trans. Pattern Analysis Machine Intelligence, vol. 25, no. 5, pp. 564-575, 2003
I. Matthews, T. Ishikawa, and S. Baker, "The template update problem," IEEE Trans. Pattern Analysis Machine Intelligence, vol. 26, no. 6, pp. 810-815, 2004
문해민, 김종구, 임성진, 반성범, "프라이버시 보호기능을 제공하는 RFID 기반 감시카메라 시스템에 관한 연구," 정보통신분야학회 합동학술대회, pp. 235-237, Nov. 2008
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.