Search results for: data anonymization - Bridge of Knowledge

Search

Search results for: data anonymization

Search results for: data anonymization

  • Automated anonymization of sensitive data on production unit

    The article presents an approach to data anonymization with the use of generally available tools. The focus is put on the practical aspects of using open-source tools in conjunction with programming libraries provided by suppliers of industrial control systems. This universal approach shows the possibilities of using various operating systems as a platform for process data anonymization. An additional advantage of the described...

    Full text available to download

  • Reversible Video Stream Anonymization for Video Surveillance Systems Based on Pixels Relocation and Watermarking

    Publication

    A method of reversible video image regions of interest anonymization for applications in video surveillance systems is described. A short introduction to theanonymization procedures is presented together with the explanation of its relation to visual surveillance. A short review of state of the art of sensitive data protection in media is included. An approach to reversible Region of Interest (ROI) hiding in video is presented,...

    Full text to download in external service

  • Visual Data Encryption for Privacy Enhancement in Surveillance Systems

    Publication

    In this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...

    Full text to download in external service

  • Simple gait parameterization and 3D animation for anonymous visual monitoring based on augmented reality

    Publication

    The article presents a method for video anonymization and replacing real human silhouettes with virtual 3D figures rendered on a screen. Video stream is processed to detect and to track objects, whereas anonymization stage employs animating avatars accordingly to behavior of detected persons. Location, movement speed, direction, and person height are taken into account during animation and rendering phases. This approach requires...

    Full text available to download

  • Augmented Reality for Privacy-Sensitive Visual Monitoring

    Publication

    - Year 2014

    The paper presents a method for video anonymization and replacing real human silhouettes with virtual 3D figures rendered on the screen. Video stream is processed to detect and to track objects, whereas anonymization stage employs fast blurring method. Substitute 3D figures are animated accordingly to behavior of detected persons. Their location, movement speed, direction, and person height are taken into account during the animation...

    Full text to download in external service