Showing 1 - 20 results of 28 for search '"The Hidden Cameras"', query time: 1.39s Refine Results
  1. 1
    by A. Javier Izquierdo-Martín
    Published 2004-05-01
    Subjects: ...hidden-camera pranks...
    Get full text
    Article
  2. 2
    by Shih-Shiang Liao, 廖士翔
    Published 2013
    ... the hidden-cameras gathering. This article discussed about the phenomena of news-gathering through hidden...
    Get full text
    Others
  3. 3
  4. 4
    by Gilles Labarthe
    Published 2016-08-01
    ... — including hidden cameras — and suggests that the notion of “shaming” is one of the keys to understanding...
    Get full text
    Article
  5. 5
    by Chun-Yu Yang, 楊竣宇
    Published 2013
    ... forth to prevent illicit videotaping using hidden cameras. One of the most effective ways to cease...
    Get full text
    Others
  6. 6
  7. 7
    by Savitsky, Matthew Port
    Published 2015
    ..., an infrastructure of hidden cameras documents these interactions between my body, a stranger’s, and material...
    Get full text
  8. 8
    by Cowan, KC Kaye
    Published 2020
    ... others to determine if they are being recorded on their own. To uncover hidden cameras, a wireless camera...
    Get full text
    Others
  9. 9
    ... an irrelevant computer task. Voluntary gaze at the images was covertly recorded via hidden cameras. Participants...
    Get full text
    Article
  10. 10
    ... systems and detection methods for privacy invention such as hidden cameras) The potential architectures...
    Get full text
    Others
  11. 11
    by Racicot, Manon
    Published 2011
    ... was evaluated using hidden cameras. Short term (first two weeks) and medium term (six months later) compliance...
    Get full text
  12. 12
    by Racicot, Manon
    Published 2011
    ... was evaluated using hidden cameras. Short term (first two weeks) and medium term (six months later) compliance...
    Get full text
  13. 13
    ... features described in this article can thus be applied to hidden camera detection. Mini-cameras can...
    Get full text
    Article
  14. 14
  15. 15
    by Chu,Yu-Wen, 朱玉汶
    Published 2013
    ... or developed hidden camera. The issue that government and people should concern is the personal privacy...
    Get full text
    Others
  16. 16
    by Tomasz Dobrogoszcz
    Published 2011-11-01
    ... showing the exterior of their house filmed with a hidden camera, they do not realize that trying to trace...
    Get full text
    Article
  17. 17
    by Pei-Jia QIU, 邱培嘉
    Published 2015
    ... information while users in the login process by using the shoulder-surfing attack and/or the hidden-camera...
    Get full text
    Others
  18. 18
    by Yu-Ting Hsieh, 謝語婷
    Published 2010
    ... in the detection of hidden camera operation. In general, the structure of a video sequence can be divided into four...
    Get full text
    Others
  19. 19
    by Yu-Chang Yeh, 葉育彰
    Published 2013
    ... schemes are vulnerable to login-recording attacks, including the shoulder-surfing attack, the hidden...
    Get full text
    Others
  20. 20
    by Chia-Ju Chang, 張家儒
    Published 2015
    ..., the hidden-camera attack, the spyware attack, and the wiretapping attack. Thus, many PIN-entry methods...
    Get full text
    Others