References
- M. Langheinrich, "Privacy invasions in ubiquitous computing," In Proc. Workshop on Socially-Informed Design of Privacy Enhancing Solutions in Ubiquitous Computing, Oct. 2002
- 이철호, "Privacy protection and RFID," 한국콘텐츠학회 2006 추계종합학술대회 논문집, vol. 4, pp. 443-446, 2006
- A. Westin, "Privacy and freedom," New York: Atheneum, 1967
- Y. Chang, R. Yan, D. Chen, and J. Yang, "People identification with limited labels in privacy-protected video," In Proc. IEEE Int. Conf. Multimedia and Expo, pp. 1005-1008, July 2006
- S. Tansuriyavong, and S. I. Hanaki, "Privacy protection by concealing persons in circumstantial video image," In Proc. Perceptive User Interfaces, pp. 1-4, 2001
- R. Venkatesh Babu, and A. Makur, "Object-based surveillance video compression using foreground motion compensation," IEEE Control, Automation Robotics and Vision, pp. 1-6, Dec. 2006
- F. Matusek, and R. Reda, "Efficient secure storage of privacy enhanced video surveillance data in intelligent video surveillance systems," In Proc. IEEE Int. Symposium on Computer and Information Sciences, vol. 23, pp. 1-5, Oct. 2008
- I. Kitahara, K. Kogure, and N. Hagita, "Stealth vision for protecting privacy," In Proc. Int. Conf. Pattern Recognition, vol. 4, pp. 404-407, 2004
- I. Kitahara, "Interactive video surveillance by using environmental and mobile cameras," IEEE Automation Congress, pp. 1-6, Oct. 2008
- I. Martinez-Ponte, X. Desurmont, J. Meessen, and J. Delaigle, "Robust human face hiding ensuring privacy," In Proc. Int. Workshop on Image Analysis for Multimedia Interactive Services, 2005
- F. Dufaux, M. Ouaret, Y. Abdeljaoued, A. Navarro, F. Vergnenegre, and T. Ebrahimi, "Privacy enabling technology for video surveillance," In Proc. SPIE Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6250, May 2006
- F. Dufaux, and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems," IEEE Trans. Circuits and Systems for Video Technology, vol. 18, no. 8, pp. 1168-1174, Aug. 2008 https://doi.org/10.1109/TCSVT.2008.928225
- J. Schiff, M. Meingast, Deirdre K. Mulligan, S. Sastry, and K. Goldberg, "Respectful cameras: Detecting visual markers in real-time to address privacy concerns," IEEE Intelligent Robots and Systems, pp. 971-978, Oct. 2007
- L. Bourdev, and J. Brandt, "Robust object detection via soft cascade," In Proc. of IEEE Conf. Computer Vision and Pattern Recognition, vol. 2, pp. 236-243, June 2005 https://doi.org/10.1109/CVPR.2005.310
- D. Comaniciu, V. Ramesh, and P. Meer, "Kernel-based object tracking," IEEE Trans. Pattern Analysis Machine Intelligence, vol. 25, no. 5, pp. 564-575, 2003 https://doi.org/10.1109/TPAMI.2003.1195991
- I. Matthews, T. Ishikawa, and S. Baker, "The template update problem," IEEE Trans. Pattern Analysis Machine Intelligence, vol. 26, no. 6, pp. 810-815, 2004 https://doi.org/10.1109/TPAMI.2004.16
- 문해민, 김종구, 임성진, 반성범, "프라이버시 보호기능을 제공하는 RFID 기반 감시카메라 시스템에 관한 연구," 정보통신분야학회 합동학술대회, pp. 235-237, Nov. 2008