8 research outputs found

    De-identification for privacy protection in multimedia content : A survey

    Get PDF
    This document is the Accepted Manuscript version of the following article: Slobodan Ribaric, Aladdin Ariyaeeinia, and Nikola Pavesic, ‘De-identification for privacy protection in multimedia content: A survey’, Signal Processing: Image Communication, Vol. 47, pp. 131-151, September 2016, doi: https://doi.org/10.1016/j.image.2016.05.020. This manuscript version is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License CC BY NC-ND 4.0 (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way.Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio-video surveillance. Each of these can potentially provide the means for privacy intrusion. De-identification is one of the main approaches to privacy protection in multimedia contents (text, still images, audio and video sequences and their combinations). It is a process for concealing or removing personal identifiers, or replacing them by surrogate personal identifiers in personal information in order to prevent the disclosure and use of data for purposes unrelated to the purpose for which the information was originally obtained. Based on the proposed taxonomy inspired by the Safe Harbour approach, the personal identifiers, i.e., the personal identifiable information, are classified as non-biometric, physiological and behavioural biometric, and soft biometric identifiers. In order to protect the privacy of an individual, all of the above identifiers will have to be de-identified in multimedia content. This paper presents a review of the concepts of privacy and the linkage among privacy, privacy protection, and the methods and technologies designed specifically for privacy protection in multimedia contents. The study provides an overview of de-identification approaches for non-biometric identifiers (text, hairstyle, dressing style, license plates), as well as for the physiological (face, fingerprint, iris, ear), behavioural (voice, gait, gesture) and soft-biometric (body silhouette, gender, age, race, tattoo) identifiers in multimedia documents.Peer reviewe

    A physical implementation of the Turing machine accessed through Web

    Get PDF
    A Turing machine has an important role in education in the field of computer science, as it is a milestone in courses related to automata theory, theory of computation and computer architecture. Its value is also recognized in the Computing Curricula proposed by the Association for Computing Machinery (ACM) and IEEE Computer Society. In this paper we present a physical implementation of the Turing machine accessed through Web. To enable remote access to the Turing machine, an implementation of the client-server architecture is built. The web interface is described in detail and illustrations of remote programming, initialization and the computation of the Turing machine are given. Advantages of such approach and expected benefits obtained by using remotely accessible physical implementation of the Turing machine as an educational tool in the teaching process are discussed

    Experimental Evaluation of Matching-Score Normalization Techniques on Different Multimodal Biometric Systems,” in

    No full text
    Abstract-The goal of this work is experimental evaluation of matching-score normalization techniques for the following three multimodal biometric systems: a verification system based on the fusion of face and palmprint principal line features, an identification system based on eigenfingers and finger-geometry, and an identification system based on eigenpalm and eigenfinger features. The following normalization techniques are tested: Bayes-based normalization and several heuristic techniques (min-max, zscore, median-MAD, double-sigmoid, tanh, and piecewiselinear). The results of evaluation are represented by means of system performance (expressed by ROC, EER and minTER) and F-statistics

    Impact of ultra-thin-layer material parameters on the suppression of carrier injection in rectifying junctions formed by interfacial charge layers

    No full text
    Pure amorphous boron (PureB) deposition on Si is used to fabricate ultrashallow low-saturation-current p+n-like diodes even at process temperatures where the boron is not expected to diffuse into the bulk Si. It has been proposed that the bonding of the B atoms to the Si creates a monolayer of fixed negative charge that attracts holes to the interface. In this paper, an investigation using semiconductor simulation tools is performed starting from an all-Si test structure where suppression of electron injection from an n-Si bulk was achieved by introducing a large concentration of negative fixed charge that attracts holes to the interface between a thin-film top-layer and the bulk. This introduces a barrier which lowers the electron saturation current density of the simulated diode to become comparable to or lower than the saturation current density of holes injected into the bulk. The material properties of the top-layer such as electron mobility and tunneling mass, bandgap and electron affinity are individually varied from default Si-values to values typical for amorphous boron layers indicating that a critical concentration of negative fixed charge is always needed for suppression of the electron injection

    Reverse breakdown and light-emission patterns studied in Si PureB SPADs

    No full text
    The relationship between light-emission patterns from silicon avalanche-mode light-emitting diodes (AMLEDs), and avalanche breakdown was investigated using photodiodes fabricated in pure boron (PureB) technology. The quality of the diodes ranged from high-quality, low dark-current devices with abrupt breakdown characteristics that were suitable for operation as single-photon avalanche diodes (SPADs), to diodes with gradually increasing reverse currents before actual breakdown. The reverse I-V characteristics were measured and correlated to light-emission data obtained simultaneously using a PureB photodetector, and inspected using a camera with which distinct emission patterns could be identified. When increasing the voltage far past breakdown, light emission invariably becomes dominant at the photodiode periphery. Based on the examination of a large variety of anode geometries, it is concluded that the most efficient light emission per consumed power is achieved with defect-free narrow-anode diodes that also are applicable as low-dark-count-rate SPADs

    Introducing Open Data Concepts to STEM Students Using Real-World Open Datasets

    No full text
    While open data concepts become more important in our society, education about its benefits and technical issues is still behind the practice. Students of STEM disciplines should be introduced to open data during their education. The Open Computing course, completely redesigned in the new Computing curriculum, introduces open data concepts, providing both the basics and advanced topics, from technical to social and legal viewpoints. Among the several educational activities, one was particularly useful for understanding the needs and implications of using open data: a synchronous group activity where students had to choose a societal issue, find and analyze two open datasets that would help gaining insight into this issue, assess interdisciplinarity approaches and stakeholders, and finally propose the added value emerging from the solution. In a short amount of time needed, this activity - which tackled multiple aspects of the problem - brought a clearer insight into the topic, building upon the conventional lectures. Students highly graded such an approach to their education, where they had to construct their knowledge by the group experience. A similar group activity appeared to be useful in the con of open data PhD training and might also be used in other disciplines and domains.</p
    corecore