Image analysis – Applications
Reexamination Certificate
2008-05-13
2008-05-13
Tran, Phuoc (Department: 2624)
Image analysis
Applications
C382S168000
Reexamination Certificate
active
07372975
ABSTRACT:
A method processes a sequence of input images securely. A sequence of input images are acquired in a client. Pixels in each input image are permuted randomly according to a permutation π to generate a permuted image for each input image. Each permuted image is transferred to a server, which maintains a background image from the permuted images. In the server, each permuted image is combined with the background image to generate a corresponding permuted motion image for each permuted image. Each permuted motion image is transferred to the client and the pixels in each permuted motion image are reordered according to an inverse permutation π−1to recover a corresponding motion image for each input image.
REFERENCES:
patent: 5815572 (1998-09-01), Hobbs
patent: 6957341 (2005-10-01), Rice et al.
patent: 7133185 (2006-11-01), Wen et al.
patent: 2004/0151342 (2004-08-01), Venetianer et al.
patent: WO 2004/052035 (2004-06-01), None
Y.C. Chang and C.J. Lu, “Oblivious Polynomial Evaluation and Oblivious Neural Learning,” In Advances in Cryptology, Asiacrypt '01, Lecture Notes in Computer Science vol. 2248, pp. 369-384, 2001.
C. Clifton, M. Kantarciougly, J. Vaidya, X. Lin, and M. Zhu, “Tools for Privacy Preserving Distributed Data Mining,” In SIGKDD Explorations, 4(2):28-34, 2002.
D. Koller, M. Turitzin, M. Levoy, M. Tarini, G. Croccia, P. Cignoni, and R. Scopingno, “Protected Interactive 3D Graphics Via Remote Rendering,” In SIGGRAPH 2004.
Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” In Advances in Cryptology—Crypto 2000, LNCS 1880, 2000.
M. Naor and B. Pinkas, “Oblivious Polynomial Evaluation,” In Proceedings of the 31stSymposium on Theory of Computer Science (STOC), Atlanta, GA, pp. 245-254, May 1-4, 1999.
S. Romdhani, P. Torr, B. Scholkopf, and A. Blake, “Computationally Efficient Face Detection,” In International Conference on Computer Vision, Vancouver, 2001.
C. Stauffer and E. Grimson, “Learning Patterns of Activity Using Real-Time Tracking,” PAMI, 22(8):747-757, 2000.
P. Viola and M. Jones, “Rapid Object Detection Using a Boosted Cascade of Simple Features,” in IEEE Conference on Computer Vision and Pattern Recognition, Hawaii, 2001.
W. Du and M. Atalla, “Privacy-preserving cooperative scientific computations,” In 14thIEEE Computer Security Foundations Workshop, pp. 273-282, Nova Scotia, Canada, Jun. 11-13, 2001.
Avidan Shmuel
Butman Ayelet
Butman Moshe
Brinkman Dirk
Mitsubishi Electric Research Laboratory, Inc.
Mueller Clifton D.
Tran Phuoc
Vinokur Gene V.
LandOfFree
Method for secure background modeling in images does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for secure background modeling in images, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for secure background modeling in images will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2765832