The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An anonymous biometric access control (ABAC) system is proposed to verify the membership status of a user using biometric signals without knowing his or her true identity. This system is useful in protecting the privacy of authorized users while keeping out potential imposters and attackers...
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very distant locations. As the use of video-conferencing becomes widely prevalent, the privacy concern's raised by this technology becomes an important issue to be addressed. In this paper we propose a real-time privacy preserving...
Visual sensor networks are becoming more and more common. They have a wide-range of commercial and military applications from video surveillance to smart home and from traffic monitoring to anti-terrorism. The design of such a visual sensor network is a challenging problem due to the complexity of the environment, self and mutual occlusion of moving objects, diverse sensor properties and a myriad...
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and controlling of the privacy visual data through two innovations. First, unlike the existing centralized control of privacy data, the proposed system allows individual users to make the final decision on every access to their...
From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preservation require huge amount of information to be hidden inside a compressed video bitstream. Since data hiding disturbs the underlying statistical patterns of the source data, it adversely affects the performance of compression...
In recent years, the number of peer-to-peer (P2P) applications has increased significantly. One important problem in many P2P applications is how to efficiently disseminate data from a single source to multiple receivers on the Internet. A successful model used for analyzing this problem is a graph consisting of nodes and edges, with a capacity assigned to each edge. In some situations however, it...
A common goal in many vision applications is to identify and track human objects with distinctive visual features or "tags". Examples range from identifying distinct soccer player by his jersey number to locating the face of an individual that produces a match in a face recognition system. In this paper, we made two contributions to this "visual tagging" problem. First, we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.