Showing 1 - 20 results of 20 for search '"The Hidden Cameras"', query time: 1.09s Refine Results
  1. 1
    by Shih-Shiang Liao, 廖士翔
    Published 2013
    ... the hidden-cameras gathering. This article discussed about the phenomena of news-gathering through hidden...
    Get full text
    Others
  2. 2
  3. 3
    by Chun-Yu Yang, 楊竣宇
    Published 2013
    ... forth to prevent illicit videotaping using hidden cameras. One of the most effective ways to cease...
    Get full text
    Others
  4. 4
  5. 5
    by Savitsky, Matthew Port
    Published 2015
    ..., an infrastructure of hidden cameras documents these interactions between my body, a stranger’s, and material...
    Get full text
  6. 6
    by Cowan, KC Kaye
    Published 2020
    ... others to determine if they are being recorded on their own. To uncover hidden cameras, a wireless camera...
    Get full text
    Others
  7. 7
    ... systems and detection methods for privacy invention such as hidden cameras) The potential architectures...
    Get full text
    Others
  8. 8
    by Racicot, Manon
    Published 2011
    ... was evaluated using hidden cameras. Short term (first two weeks) and medium term (six months later) compliance...
    Get full text
  9. 9
    by Racicot, Manon
    Published 2011
    ... was evaluated using hidden cameras. Short term (first two weeks) and medium term (six months later) compliance...
    Get full text
  10. 10
    by Chu,Yu-Wen, 朱玉汶
    Published 2013
    ... or developed hidden camera. The issue that government and people should concern is the personal privacy...
    Get full text
    Others
  11. 11
    by Pei-Jia QIU, 邱培嘉
    Published 2015
    ... information while users in the login process by using the shoulder-surfing attack and/or the hidden-camera...
    Get full text
    Others
  12. 12
    by Yu-Ting Hsieh, 謝語婷
    Published 2010
    ... in the detection of hidden camera operation. In general, the structure of a video sequence can be divided into four...
    Get full text
    Others
  13. 13
    by Yu-Chang Yeh, 葉育彰
    Published 2013
    ... schemes are vulnerable to login-recording attacks, including the shoulder-surfing attack, the hidden...
    Get full text
    Others
  14. 14
    by Chia-Ju Chang, 張家儒
    Published 2015
    ..., the hidden-camera attack, the spyware attack, and the wiretapping attack. Thus, many PIN-entry methods...
    Get full text
    Others
  15. 15
    by Berliner, Meghan
    Published 2009
    .... The figures are placed in and around the gallery space, and the video originates from a hidden camera...
    Get full text
    Get full text
    Others
  16. 16
    by Damgaard, Andreas
    Published 2015
    ... programs who shows all from training and fitness shows to bloggers with hidden camera and simple news...
    Get full text
    Others
  17. 17
    by Haitham, Seror
    Published 2017
    ... is to use a hidden camera, so-called Record monitoring. Shoulder surfing can be used by an attacker/observer...
    Get full text
    Others
  18. 18
    by CHANG, WEI-LI, 張維里
    Published 2019
    ... authentication schemes are vulnerable to capture attacks, which may be the shoulder-surfing attack, the hidden...
    Get full text
    Others
  19. 19
  20. 20
    ... one of the video screens, while a hidden camera records the eye fixations of children to each video...
    Get full text
    Get full text
    Others