Towards a Lawfully Secure and Privacy Preserving Video Surveillance System, Proceedings of the 11th International Conference on E-Commerce and Web Technologies (Lecture Notes in Business In-formation Processing, p.7384, 2010. ,
DOI : 10.1007/978-3-642-15208-5_7
Ensuring privacy and condentiality in digital video surveillance systems, Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, p.245267, 2012. ,
DOI : 10.4018/978-1-61350-501-4.ch010
Towards secure and privacy sensitive surveillance, Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC '10, p.126132, 2010. ,
DOI : 10.1145/1865987.1866008
Insiders and insider threats -an overview of denitions and mitigation techniques, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, p.427, 2011. ,
Spread Spectrum Watermark for Color Image Based on Wavelet Tree Structure, 2008 International Conference on Computer Science and Software Engineering, p.695, 2008. ,
DOI : 10.1109/CSSE.2008.958
Robust image watermark with wavelet transform and spread spectrum techniques Conference Record of the Thirty-Fourth Asilomar Conference on, Signals, Systems and Computers, p.1850, 2000. ,
Techniques for data hiding, IBM Systems Journal, vol.35, issue.3.4, p.336, 1996. ,
DOI : 10.1147/sj.353.0313
Digital watermarking of color images using amplitude modulation, Journal of Electronic Imaging, vol.7, p.326332, 1998. ,
Copyright Protection for Images on Mobile Devices, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing ,
DOI : 10.1109/IMIS.2012.73
Copy protection for multimedia data based on labeling techniques, 17th Symposium on Information Theory in the Benelux, 1996. ,