Security and privacy protection in visual sensor networks: A survey

T Winkler, B Rinner - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Visual sensor networks (VSNs) are receiving a lot of attention in research, and at the same
time, commercial applications are starting to emerge. VSN devices come with image …

A survey on visual surveillance of object motion and behaviors

W Hu, T Tan, L Wang, S Maybank - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one
of the most active research topics in computer vision. It has a wide spectrum of promising …

An overview of robust digital image watermarking

VS Verma, RK Jha - IETE Technical review, 2015 - Taylor & Francis
This paper presents a thorough literature review of robust digital image watermarking
applied in diverse applications. Researchers have already done lots of noteworthy work in …

[图书][B] Watermarking systems engineering: enabling digital assets security and other applications

M Barni, F Bartolini - 2004 - taylorfrancis.com
The growth of the Internet has fueled the demand for enhanced watermarking and data
hiding technologies and has stimulated research into new ways to implement watermarking …

Digital imaging for cultural heritage preservation

F Stanco, S Battiato, G Gallo - Analysis, Restoration, and …, 2011 - api.taylorfrancis.com
Paintings, frescoes, antique photographic prints, incunabula, old books, handwritten
documents, sculptures, ceramic fragments, and other ancient manufacts constitute the …

Data-hiding codes

P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …

An advanced motion detection algorithm with video quality analysis for video surveillance systems

SC Huang - IEEE transactions on circuits and systems for video …, 2010 - ieeexplore.ieee.org
Motion detection is the first essential process in the extraction of information regarding
moving objects and makes use of stabilization in functional areas, such as tracking …

Multiple image watermarking applied to health information management

A Giakoumaki, S Pavlopoulos… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Information technology advances have brought forth new challenges in healthcare
information management, due to the vast amount of medical data that needs to be efficiently …

Analysis and design of secure watermark-based authentication systems

C Fei, D Kundur, RH Kwong - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
This paper focuses on a coding approach for effective analysis and design of secure
watermark-based multimedia authentication systems. We provide a design framework for …

[图书][B] Cellular neural networks, multi-scroll chaos and synchronization

JAK Suykens, J Vandewalle - 2005 - books.google.com
For engineering applications that are based on nonlinear phenomena, novel information
processing systems require new methodologies and design principles. This perspective is …