Forensic image recognition is an important tool in many areas of law enforcement where an agency wants to prosecute possessors of illegal images. The recognition of illegal images that might have undergone human imperceptible changes (e.g., a JPEG-recompression) is commonly done by computing a perceptual image hash function of a given image and then matching this hash with perceptual hash values in a database of previously collected illegal images. To prevent privacy violation, agencies should only learn about images that have been reliably detected as illegal and nothing else. In this work, we argue that the prevalent presence of separate departments in such agencies can be used to enforce the need-to-know principle by separating duties am...
In this dissertation, we investigate the privacy protection schemes for the visual data against deep...
PhotoDNA is a perceptual fuzzy hash technology designed and developed by Microsoft. It is deployed b...
Abstract—In the context of sharing video surveillance data, a significant threat to privacy is face ...
Forensic image recognition is an important tool in many areas of law enforcement where an agency wan...
International audienceThis paper proposes to study the impact of image selective encryption on both ...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Forensic image recognition tools are used by law enforcement agencies all over the world to automati...
Visual content like digital images and videos are helpful in forensic investigation, which usually p...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
[[abstract]]A new and efficient scheme to protect confidential images is proposed in this paper. The...
To achieve automatic recommendation of privacy settings for image sharing, a new tool called iPrivac...
In the context of sharing video surveillance data, a significant threat to privacy is face recogniti...
In the context of sharing video surveillance data, a significant threat to privacy is face recogni...
Stricter policies, laws and regulations for companies on the handling of private information arise c...
PhotoDNA is a perceptual fuzzy hash technology designed and developed by Microsoft. It is deployed b...
In this dissertation, we investigate the privacy protection schemes for the visual data against deep...
PhotoDNA is a perceptual fuzzy hash technology designed and developed by Microsoft. It is deployed b...
Abstract—In the context of sharing video surveillance data, a significant threat to privacy is face ...
Forensic image recognition is an important tool in many areas of law enforcement where an agency wan...
International audienceThis paper proposes to study the impact of image selective encryption on both ...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Forensic image recognition tools are used by law enforcement agencies all over the world to automati...
Visual content like digital images and videos are helpful in forensic investigation, which usually p...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
[[abstract]]A new and efficient scheme to protect confidential images is proposed in this paper. The...
To achieve automatic recommendation of privacy settings for image sharing, a new tool called iPrivac...
In the context of sharing video surveillance data, a significant threat to privacy is face recogniti...
In the context of sharing video surveillance data, a significant threat to privacy is face recogni...
Stricter policies, laws and regulations for companies on the handling of private information arise c...
PhotoDNA is a perceptual fuzzy hash technology designed and developed by Microsoft. It is deployed b...
In this dissertation, we investigate the privacy protection schemes for the visual data against deep...
PhotoDNA is a perceptual fuzzy hash technology designed and developed by Microsoft. It is deployed b...
Abstract—In the context of sharing video surveillance data, a significant threat to privacy is face ...