Learn More
This paper presents an overview of the Visual Privacy Task (VPT) of MediaEval 2014, its objectives, related dataset, and evaluation approaches. Participants in this task were required to implement a privacy filter or a combination of filters to protect various personal information regions in video sequences as provided. The challenge was to achieve an(More)
In this paper, we describe a privacy filter proposed for the Visual Privacy T ask (VPT) 2013, as a case study to validate the efficacy of the User-Intimate Requirements and Evaluation Methodology (UI-REF). T his comprises an automated objective evaluation phase supported by a subjective user study to cross-validate and complement the results of the(More)
The Internet has a tremendous technological expanding power. It has the capability to transform not only the way people accept and adopt knowledge but also to change traditional methodology and architecture of education system around the world, mainly with the method of teaching and student interaction in and with subject materials and all related relevant(More)
D. (2011) Maybe it becomes a buddy, but do not call it a robot Seamless cooperation between companion robotics and smart homes. Disclaimer UWE has obtained warranties from all depositors as to their title in the material deposited and as to their right to deposit such material. UWE makes no representation or warranties of commercial utility, title, or(More)
With the growing need for privacy-aware and privacy-respecting CCTV systems, it becomes crucial to develop workflows and architectures that can support and enhance privacy protection. Recent advances in image processing enable the automation of many surveillance tasks, increasing the risks of privacy infringements. Fortunately, image processing and pattern(More)
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes a policy model to specify what information flow is permitted in a computational system. The security definition, which is based on a general notion of information lattices, allows(More)