Search For:

Displaying 1-2 out of 2 total
A Coprime Blur Scheme for Data Security in Video Surveillance
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Christopher Thorpe, Feng Li, Zijia Li, Zhan Yu,David Saunders, Jingyi Yu
Issue Date:December 2013
pp. 3066-3072
This paper presents a novel coprime blurred pair (CBP) model to improve data security in camera surveillance. While most previous approaches have focused on completely encrypting the video stream, we introduce a spatial encryption scheme by strategically b...
 
Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications
Found in: Logic in Computer Science, Symposium on
By Michael O. Rabin, Rocco A. Servedio, Christopher Thorpe
Issue Date:July 2007
pp. 63-76
We present a highly efficient method for proving correctness of computations while preserving secrecy of the input values. This is done in an Evaluator-Prover model which can also be realized by a secure processor. We describe an application to secure auct...
 
 1