{"id":"https://openalex.org/W2132819096","doi":"https://doi.org/10.1109/icme.2010.5583561","title":"Anonymous subject identification in privacy-aware video surveillance","display_name":"Anonymous subject identification in privacy-aware video surveillance","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2132819096","doi":"https://doi.org/10.1109/icme.2010.5583561","mag":"2132819096"},"language":"en","primary_location":{"id":"doi:10.1109/icme.2010.5583561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2010.5583561","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Multimedia and Expo","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057127971","display_name":"Ying Luo","orcid":"https://orcid.org/0000-0002-7006-2122"},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ying Luo","raw_affiliation_strings":["Center of Visualization and Virtual Environments, University of Kentucky, Lexington, KY, USA","Center for Visualization and Virtual Environments University of Kentucky, Lexington KY 40507"],"affiliations":[{"raw_affiliation_string":"Center of Visualization and Virtual Environments, University of Kentucky, Lexington, KY, USA","institution_ids":["https://openalex.org/I143302722"]},{"raw_affiliation_string":"Center for Visualization and Virtual Environments University of Kentucky, Lexington KY 40507","institution_ids":["https://openalex.org/I143302722"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052252222","display_name":"Shuiming Ye","orcid":null},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shuiming Ye","raw_affiliation_strings":["Center of Visualization and Virtual Environments, University of Kentucky, Lexington, KY, USA","Center for Visualization and Virtual Environments University of Kentucky, Lexington KY 40507"],"affiliations":[{"raw_affiliation_string":"Center of Visualization and Virtual Environments, University of Kentucky, Lexington, KY, USA","institution_ids":["https://openalex.org/I143302722"]},{"raw_affiliation_string":"Center for Visualization and Virtual Environments University of Kentucky, Lexington KY 40507","institution_ids":["https://openalex.org/I143302722"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022090297","display_name":"Sen-ching S. Cheung","orcid":"https://orcid.org/0000-0002-9207-5514"},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sen-ching S. Cheung","raw_affiliation_strings":["Center of Visualization and Virtual Environments, University of Kentucky, Lexington, KY, USA","Center for Visualization and Virtual Environments University of Kentucky, Lexington KY 40507"],"affiliations":[{"raw_affiliation_string":"Center of Visualization and Virtual Environments, University of Kentucky, Lexington, KY, USA","institution_ids":["https://openalex.org/I143302722"]},{"raw_affiliation_string":"Center for Visualization and Virtual Environments University of Kentucky, Lexington KY 40507","institution_ids":["https://openalex.org/I143302722"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057127971"],"corresponding_institution_ids":["https://openalex.org/I143302722"],"apc_list":null,"apc_paid":null,"fwci":1.0114,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.77344054,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"704","issue":null,"first_page":"83","last_page":"88"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8232516646385193},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7601696848869324},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6301133632659912},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5315753221511841},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5023782253265381},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47344326972961426},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.46872958540916443},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.455314964056015},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43027475476264954},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4287245273590088},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41100236773490906},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34945210814476013}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8232516646385193},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7601696848869324},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6301133632659912},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5315753221511841},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5023782253265381},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47344326972961426},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.46872958540916443},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.455314964056015},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43027475476264954},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4287245273590088},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41100236773490906},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34945210814476013},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icme.2010.5583561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2010.5583561","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Multimedia and Expo","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1978311498","https://openalex.org/W1997409447","https://openalex.org/W2103958416","https://openalex.org/W2110132168","https://openalex.org/W2122030676","https://openalex.org/W2124737779","https://openalex.org/W2147327413","https://openalex.org/W2166287856","https://openalex.org/W2496648137","https://openalex.org/W2606090080","https://openalex.org/W3141353839","https://openalex.org/W4230252177","https://openalex.org/W6649573860","https://openalex.org/W6723648262","https://openalex.org/W6736677744"],"related_works":["https://openalex.org/W2391717201","https://openalex.org/W2597534175","https://openalex.org/W2167384606","https://openalex.org/W3162079845","https://openalex.org/W2266640896","https://openalex.org/W1603816591","https://openalex.org/W4361804166","https://openalex.org/W4281980780","https://openalex.org/W188930338","https://openalex.org/W2100785486"],"abstract_inverted_index":{"The":[0],"widespread":[1],"deployment":[2],"of":[3,53,60,178],"surveillance":[4,28],"cameras":[5],"has":[6],"raised":[7],"serious":[8],"privacy":[9,61,133],"concerns.":[10],"Many":[11],"privacy-enhancing":[12],"schemes":[13],"have":[14],"been":[15],"recently":[16],"proposed":[17],"to":[18,38,86,89,112],"identify":[19,31],"selected":[20],"individuals":[21],"and":[22,46],"redact":[23],"their":[24],"images":[25],"in":[26,83,130],"the":[27,33,58,80,93,109,118,123,144,150,156,176],"video.":[29],"To":[30,91],"individuals,":[32],"best":[34],"known":[35],"approach":[36],"is":[37,134],"use":[39],"biometric":[40,81,139,173],"signals":[41,82],"as":[42,162],"they":[43],"are":[44],"immutable":[45],"highly":[47],"discriminative.":[48],"If":[49],"misused,":[50],"these":[51],"characteristics":[52],"biometrics":[54],"can":[55],"seriously":[56],"defeat":[57],"goal":[59],"protection.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66,98],"propose":[67,99],"an":[68],"anonymous":[69],"subject":[70],"identification":[71],"system":[72],"based":[73],"on":[74,169],"homo-morphic":[75],"encryption":[76],"(HE).":[77],"It":[78],"matches":[79],"encrypted":[84],"domain":[85],"provide":[87],"anonymity":[88],"users.":[90],"make":[92],"HE-based":[94],"protocols":[95],"computationally":[96],"scalable,":[97],"a":[100,113,127,170],"complexity-privacy":[101],"tradeoff":[102],"called":[103],"k-Anonymous":[104],"Quantization":[105],"(kAQ)":[106],"which":[107],"narrows":[108],"plaintext":[110],"search":[111],"small":[114],"cell":[115],"before":[116],"running":[117],"intensive":[119],"encrypted-domain":[120],"processing":[121],"within":[122],"cell.":[124,146],"We":[125,147],"validate":[126],"key":[128],"assumption":[129],"kAQ":[131],"that":[132],"better":[135],"preserved":[136],"by":[137,154],"grouping":[138],"patterns":[140],"far":[141],"apart":[142],"into":[143],"same":[145],"also":[148],"improve":[149],"matching":[151],"success":[152],"rate":[153],"replacing":[155],"original":[157],"bounding":[158],"boxes":[159],"with":[160],"e-balls":[161],"basic":[163],"units":[164],"for":[165],"grouping.":[166],"Experimental":[167],"results":[168],"public":[171],"iris":[172],"database":[174],"demonstrate":[175],"validity":[177],"our":[179],"framework.":[180]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
