Sciweavers

738 search results - page 3 / 148
» Privacy Protection for Speech Information
Sort
View
COMAD
2008
15 years 1 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
ICMCS
2010
IEEE
160views Multimedia» more  ICMCS 2010»
15 years 24 days ago
A framework for the validation of privacy protection solutions in video surveillance
The issue of privacy protection in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regard...
Frédéric Dufaux, Touradj Ebrahimi
EDBT
2008
ACM
154views Database» more  EDBT 2008»
15 years 12 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
DBSEC
2007
151views Database» more  DBSEC 2007»
15 years 1 months ago
Location Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...