Method for secure background modeling in images

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C382S168000

Reexamination Certificate

active

07372975

ABSTRACT:
A method processes a sequence of input images securely. A sequence of input images are acquired in a client. Pixels in each input image are permuted randomly according to a permutation π to generate a permuted image for each input image. Each permuted image is transferred to a server, which maintains a background image from the permuted images. In the server, each permuted image is combined with the background image to generate a corresponding permuted motion image for each permuted image. Each permuted motion image is transferred to the client and the pixels in each permuted motion image are reordered according to an inverse permutation π−1to recover a corresponding motion image for each input image.

REFERENCES:
patent: 5815572 (1998-09-01), Hobbs
patent: 6957341 (2005-10-01), Rice et al.
patent: 7133185 (2006-11-01), Wen et al.
patent: 2004/0151342 (2004-08-01), Venetianer et al.
patent: WO 2004/052035 (2004-06-01), None
Y.C. Chang and C.J. Lu, “Oblivious Polynomial Evaluation and Oblivious Neural Learning,” In Advances in Cryptology, Asiacrypt '01, Lecture Notes in Computer Science vol. 2248, pp. 369-384, 2001.
C. Clifton, M. Kantarciougly, J. Vaidya, X. Lin, and M. Zhu, “Tools for Privacy Preserving Distributed Data Mining,” In SIGKDD Explorations, 4(2):28-34, 2002.
D. Koller, M. Turitzin, M. Levoy, M. Tarini, G. Croccia, P. Cignoni, and R. Scopingno, “Protected Interactive 3D Graphics Via Remote Rendering,” In SIGGRAPH 2004.
Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” In Advances in Cryptology—Crypto 2000, LNCS 1880, 2000.
M. Naor and B. Pinkas, “Oblivious Polynomial Evaluation,” In Proceedings of the 31stSymposium on Theory of Computer Science (STOC), Atlanta, GA, pp. 245-254, May 1-4, 1999.
S. Romdhani, P. Torr, B. Scholkopf, and A. Blake, “Computationally Efficient Face Detection,” In International Conference on Computer Vision, Vancouver, 2001.
C. Stauffer and E. Grimson, “Learning Patterns of Activity Using Real-Time Tracking,” PAMI, 22(8):747-757, 2000.
P. Viola and M. Jones, “Rapid Object Detection Using a Boosted Cascade of Simple Features,” in IEEE Conference on Computer Vision and Pattern Recognition, Hawaii, 2001.
W. Du and M. Atalla, “Privacy-preserving cooperative scientific computations,” In 14thIEEE Computer Security Foundations Workshop, pp. 273-282, Nova Scotia, Canada, Jun. 11-13, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for secure background modeling in images does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for secure background modeling in images, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for secure background modeling in images will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2765832

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.