-
1“... the hidden-cameras gathering. This article discussed about the phenomena of news-gathering through hidden...”
Get full text
Others -
2by Anyfantis, Spiridon NicofotisSubjects: “...Hidden cameras...”
Published 2017
Get full text
Others -
3“... forth to prevent illicit videotaping using hidden cameras. One of the most effective ways to cease...”
Get full text
Others -
4by Arroyo Acuña, Andrea Milagros“... that use hidden cameras, a resource known as "ampay", to generate news content, capturing famous people...”
Published 2019
Get full text
Get full text
Others -
5by Savitsky, Matthew Port“..., an infrastructure of hidden cameras documents these interactions between my body, a stranger’s, and material...”
Published 2015
Get full text
-
6by Cowan, KC Kaye“... others to determine if they are being recorded on their own. To uncover hidden cameras, a wireless camera...”
Published 2020
Get full text
Others -
7by Nakashima, Koji, S.M. Massachusetts Institute of Technology.“... systems and detection methods for privacy invention such as hidden cameras) The potential architectures...”
Published 2021
Get full text
Others -
8by Racicot, Manon“... was evaluated using hidden cameras. Short term (first two weeks) and medium term (six months later) compliance...”
Published 2011
Get full text
-
9by Racicot, Manon“... was evaluated using hidden cameras. Short term (first two weeks) and medium term (six months later) compliance...”
Published 2011
Get full text
-
10“... or developed hidden camera. The issue that government and people should concern is the personal privacy...”
Get full text
Others -
11“... information while users in the login process by using the shoulder-surfing attack and/or the hidden-camera...”
Get full text
Others -
12“... in the detection of hidden camera operation. In general, the structure of a video sequence can be divided into four...”
Get full text
Others -
13“... schemes are vulnerable to login-recording attacks, including the shoulder-surfing attack, the hidden...”
Get full text
Others -
14“..., the hidden-camera attack, the spyware attack, and the wiretapping attack. Thus, many PIN-entry methods...”
Get full text
Others -
15by Berliner, Meghan“.... The figures are placed in and around the gallery space, and the video originates from a hidden camera...”
Published 2009
Get full text
Get full text
Others -
16by Damgaard, Andreas“... programs who shows all from training and fitness shows to bloggers with hidden camera and simple news...”
Published 2015
Get full text
Others -
17by Haitham, Seror“... is to use a hidden camera, so-called Record monitoring. Shoulder surfing can be used by an attacker/observer...”
Published 2017
Get full text
Others -
18“... authentication schemes are vulnerable to capture attacks, which may be the shoulder-surfing attack, the hidden...”
Get full text
Others -
19by Pegoraro, Luiz Fernando Longuim, 1984-“... Intelligence Scale for Children or Adults, 3rd edition, Brazilian version. A High-Definition Hidden Camera Pen...”
Published 2014
Get full text
Get full text
Others -
20by Kolberg, Leticia Schiavon, 1990-“... one of the video screens, while a hidden camera records the eye fixations of children to each video...”
Published 2015
Get full text
Get full text
Others