{"id":"https://openalex.org/W2963070890","doi":"https://doi.org/10.1109/tcsvt.2019.2929855","title":"Efficient Privacy-Preserving Anomaly Detection and Localization in Bitstream Video","display_name":"Efficient Privacy-Preserving Anomaly Detection and Localization in Bitstream Video","publication_year":2019,"publication_date":"2019-07-19","ids":{"openalex":"https://openalex.org/W2963070890","doi":"https://doi.org/10.1109/tcsvt.2019.2929855","mag":"2963070890"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2019.2929855","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039773159","display_name":"Jianting Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Guo","raw_affiliation_strings":["School of Data Science and Computer, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data Science and Computer, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069998992","display_name":"Peijia Zheng","orcid":"https://orcid.org/0000-0003-0979-8613"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peijia Zheng","raw_affiliation_strings":["School of Data Science and Computer, Guangdong Provincial Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data Science and Computer, Guangdong Provincial Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I4210104064","display_name":"Shenzhen Academy of Robotics","ror":"https://ror.org/01h027j09","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210104064"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","Peng Cheng Laboratory, Shenzhen, China","Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":["https://openalex.org/I4210104064"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.303,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":24,"citation_normalized_percentile":{"value":0.889673,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"30","issue":"9","first_page":"3268","last_page":"3281"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.86869156},{"id":"https://openalex.org/keywords/macroblock","display_name":"Macroblock","score":0.6380335},{"id":"https://openalex.org/keywords/image-encryption","display_name":"Image Encryption","score":0.583665},{"id":"https://openalex.org/keywords/motion-vector","display_name":"Motion vector","score":0.57586986},{"id":"https://openalex.org/keywords/color-image-encryption","display_name":"Color Image Encryption","score":0.573928},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly Detection","score":0.555587},{"id":"https://openalex.org/keywords/optical-encryption","display_name":"Optical Encryption","score":0.533649},{"id":"https://openalex.org/keywords/outlier-detection","display_name":"Outlier Detection","score":0.531609}],"concepts":[{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.86869156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8440244},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8311901},{"id":"https://openalex.org/C124828224","wikidata":"https://www.wikidata.org/wiki/Q2632668","display_name":"Macroblock","level":3,"score":0.6380335},{"id":"https://openalex.org/C2779020251","wikidata":"https://www.wikidata.org/wiki/Q3555171","display_name":"Motion vector","level":3,"score":0.57586986},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.44442984},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4378923},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4306388},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35377786},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33251572},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.31532076},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21929356},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19821459},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.15504485},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2019.2929855","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61502547"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1636202"},{"funder":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province","award_id":"2015A030310319"},{"funder":"https://openalex.org/F4320329801","funder_display_name":"Shenzhen Research and Development Program","award_id":"JCYJ20160328144421330"}],"datasets":[],"versions":[],"referenced_works_count":43,"referenced_works":["https://openalex.org/W1563686443","https://openalex.org/W1613782521","https://openalex.org/W179458199","https://openalex.org/W1931450083","https://openalex.org/W1967815760","https://openalex.org/W1981470744","https://openalex.org/W1983642991","https://openalex.org/W1989964267","https://openalex.org/W1990024502","https://openalex.org/W1995443851","https://openalex.org/W2001877080","https://openalex.org/W2003120523","https://openalex.org/W2004022907","https://openalex.org/W2008558077","https://openalex.org/W2010680383","https://openalex.org/W2012931101","https://openalex.org/W2015461918","https://openalex.org/W2026418062","https://openalex.org/W2038402918","https://openalex.org/W2047016883","https://openalex.org/W2049633694","https://openalex.org/W2050770647","https://openalex.org/W2050947749","https://openalex.org/W2097363716","https://openalex.org/W2101557488","https://openalex.org/W2109389234","https://openalex.org/W2110934250","https://openalex.org/W2115252128","https://openalex.org/W2122361470","https://openalex.org/W2125105611","https://openalex.org/W2127218421","https://openalex.org/W2129297265","https://openalex.org/W2164261375","https://openalex.org/W2164489414","https://openalex.org/W2171126197","https://openalex.org/W2505094182","https://openalex.org/W2523200020","https://openalex.org/W2587789887","https://openalex.org/W2754279782","https://openalex.org/W2805132145","https://openalex.org/W2963061824","https://openalex.org/W2963215781","https://openalex.org/W2963541464"],"related_works":["https://openalex.org/W839483973","https://openalex.org/W4235543306","https://openalex.org/W2561526249","https://openalex.org/W2353219348","https://openalex.org/W2351614030","https://openalex.org/W2142809368","https://openalex.org/W2131406966","https://openalex.org/W2102834173","https://openalex.org/W2100067270","https://openalex.org/W1575533963"],"abstract_inverted_index":{"In":[0,25],"cloud":[1,23],"computing,":[2],"videos":[3],"may":[4],"be":[5],"in":[6,21,36],"an":[7,18,37,57,116],"encrypted":[8,14,38,62,70],"format":[9],"to":[10,97],"protect":[11],"privacy.":[12],"Therefore,":[13],"video":[15,39,47,63,111,130],"processing":[16],"is":[17,125],"important":[19],"application":[20],"secure":[22],"computing.":[24],"this":[26],"paper,":[27],"we":[28,55,72,138],"focus":[29],"on":[30],"parameter":[31],"estimation":[32],"and":[33,50,86,92,105,157],"anomaly":[34,58],"detection":[35,59,104,158],"bitstream.":[40],"By":[41],"analyzing":[42],"the":[43,51,69,80,83,87,135],"common":[44],"properties":[45],"of":[46,76],"encoding":[48],"frameworks":[49],"format-compliant":[52,66],"encryption":[53,131],"schemes,":[54],"propose":[56,94],"scheme":[60,107,124],"for":[61,143],"bitstream":[64],"with":[65,128],"encryption.":[67],"From":[68],"bitstream,":[71],"extract":[73],"three":[74,100],"types":[75],"complementary":[77],"features,":[78],"i.e.,":[79],"macroblock":[81,84],"sizes,":[82],"partitions,":[85],"motion":[88],"vector":[89],"difference":[90],"magnitude,":[91],"then":[93],"a":[95,140],"method":[96,152],"combine":[98],"these":[99],"features.":[101],"The":[102,146],"proposed":[103],"localization":[106],"does":[108],"not":[109],"involve":[110],"decryption,":[112],"full":[113],"decompression,":[114],"or":[115],"interactive":[117],"protocol,":[118],"which":[119],"makes":[120],"it":[121],"efficient.":[122],"Our":[123],"also":[126],"compatible":[127],"different":[129],"methods.":[132],"To":[133],"accelerate":[134],"running":[136,155],"time,":[137],"develop":[139],"parallel":[141],"implementation":[142],"our":[144,151],"scheme.":[145],"experimental":[147],"results":[148],"show":[149],"that":[150],"achieves":[153],"good":[154],"time":[156],"rate":[159],"performance.":[160]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2963070890","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2024-11-30T14:00:34.378709","created_date":"2019-07-30"}