Elhadad et al., 2020 - Google Patents
A steganography approach for hiding privacy in video surveillance systemsElhadad et al., 2020
- Document ID
- 13838659943518035867
- Author
- Elhadad A
- Hamad S
- Khalifa A
- Abulkasim H
- Publication year
- Publication venue
- Digital Media Steganography
External Links
Snippet
In today's environment, video surveillance systems have become widely used in almost all facilities, either public or private. At any given time, individuals can be observed and captured on video without their knowledge and/or permission. This can happen in public …
- 238000000034 method 0 abstract description 66
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00711—Recognising video content, e.g. extracting audiovisual features from movies, extracting representative key-frames, discriminating news vs. sport content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/169—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hassaballah et al. | A novel image steganography method for industrial internet of things security | |
Mstafa et al. | A new video steganography scheme based on Shi-Tomasi corner detector | |
Himeur et al. | A robust and secure key-frames based video watermarking system using chaotic encryption | |
Zhang et al. | Hiding privacy information in video surveillance system | |
Elhadad et al. | A steganography approach for hiding privacy in video surveillance systems | |
Koubaa et al. | Collusion, MPEG4 compression and frame dropping resistant video watermarking | |
Abbasi Aghamaleki et al. | Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects | |
Cheung et al. | Protecting and managing privacy information in video surveillance systems | |
Rashwan et al. | Understanding trust in privacy-aware video surveillance systems | |
Elhadad et al. | High capacity information hiding for privacy protection in digital video files | |
Dhingra et al. | A novel chaotic map-based encryption scheme for surveillance videos | |
Li et al. | Recoverable privacy protection for video content distribution | |
Vybornova | A new watermarking method for video authentication with tamper localization | |
Baaziz et al. | Security and privacy protection for automated video surveillance | |
Ling et al. | Watermarking for image authentication | |
Prasanth Vaidya et al. | A robust and blind watermarking for color videos using redundant wavelet domain and svd | |
Saikia | Perceptual hashing in the 3D-DWT domain | |
Sowmya et al. | Video authentication using watermark and digital signature—a study | |
Dufaux et al. | Smart video surveillance system preserving privacy | |
Kumar et al. | Robust approach of video steganography using combined keypoints detection algorithm against geometrical and signal processing attacks | |
Zhang et al. | Privacy preserving video surveillance using pedestrian tracking mechanism | |
Deshpande et al. | Review of robust video watermarking algorithms | |
Hammami et al. | Regions Based Semi-fragile Watermarking Scheme for Video Authentication. | |
Soppari et al. | Study of digital watermarking algorithms for digital rights management and their attacks | |
Kumar et al. | Digital video steganography: an overview |